tag:blogger.com,1999:blog-68136454684153913862024-03-13T09:57:21.657-07:00MousePad Computer ServiceMousePad Computer Servicehttp://www.blogger.com/profile/16192787666879800016noreply@blogger.comBlogger4125tag:blogger.com,1999:blog-6813645468415391386.post-65987398980760200102022-04-04T12:51:00.000-07:002022-04-04T12:51:19.190-07:00What's a HEIC file?<p> </p><table border="0" cellpadding="0" cellspacing="0" class="templateContainer" style="background-color: #fafafa; border-collapse: collapse; border: 1px none; color: black; max-width: 600px !important; text-size-adjust: 100%; width: 100%px;"><tbody><tr><td id="templateHeader" style="background: none center center / cover no-repeat rgb(255, 255, 255); border-bottom: 0px; border-top: 0px; padding-bottom: 0px; padding-top: 9px; text-size-adjust: 100%;" valign="top">Posted on <a href="https://mailchi.mp/forever.com/sunday-solutions-13feb22-1589662?e=271d319b42">forever.com</a>:<br /><br /><table border="0" cellpadding="0" cellspacing="0" class="mcnImageBlock" style="border-collapse: collapse; min-width: 100%; text-size-adjust: 100%; width: 100%px;"><tbody class="mcnImageBlockOuter"><tr><td class="mcnImageBlockInner" style="padding: 9px; text-size-adjust: 100%;" valign="top"><table align="left" border="0" cellpadding="0" cellspacing="0" class="mcnImageContentContainer" style="border-collapse: collapse; min-width: 100%; text-size-adjust: 100%; width: 100%px;"><tbody><tr><td class="mcnImageContent" style="padding: 0px 9px; text-size-adjust: 100%;" valign="top"><a class="" href="https://www.forever.com/?utm_source=mc_email&utm_medium=email&utm" style="text-size-adjust: 100%;" target="_blank" title=""><img align="left" alt="" class="mcnImage" src="https://gallery.mailchimp.com/d3ac06e7e82c880c9d2247c14/images/4cba790e-6be2-4dc8-8d22-26bd029a190a.jpg" style="border: 0px; display: inline !important; height: auto; max-width: 325px; outline: none; padding-bottom: 0px; text-decoration-line: none; vertical-align: bottom;" width="325" /></a></td></tr></tbody></table></td></tr></tbody></table></td></tr><tr><td id="templateBody" style="background: none center center / cover no-repeat rgb(255, 255, 255); border-bottom: 2px solid rgb(234, 234, 234); border-top: 0px; padding-bottom: 10px; padding-top: 10px; text-size-adjust: 100%;" valign="top"><table border="0" cellpadding="0" cellspacing="0" class="mcnImageBlock" style="border-collapse: collapse; min-width: 100%; text-size-adjust: 100%; width: 100%px;"><tbody class="mcnImageBlockOuter"><tr><td class="mcnImageBlockInner" style="padding: 0px; text-size-adjust: 100%;" valign="top"><table align="left" border="0" cellpadding="0" cellspacing="0" class="mcnImageContentContainer" style="border-collapse: collapse; min-width: 100%; text-size-adjust: 100%; width: 100%px;"><tbody><tr><td class="mcnImageContent" style="padding: 0px; text-align: center; text-size-adjust: 100%;" valign="top"><a class="" href="https://www.forever.com/" style="text-size-adjust: 100%;" target="_blank" title=""><img align="center" alt="" class="mcnImage" src="https://mcusercontent.com/d3ac06e7e82c880c9d2247c14/_compresseds/4e157c1d-a7e7-6999-cbf9-b7ef7dc7ec54.jpg" style="border: 0px; display: inline !important; height: auto; max-width: 5131px; outline: none; padding-bottom: 0px; text-decoration-line: none; vertical-align: bottom;" width="600" /></a></td></tr></tbody></table></td></tr></tbody></table><table border="0" cellpadding="0" cellspacing="0" class="mcnTextBlock" style="border-collapse: collapse; min-width: 100%; text-size-adjust: 100%; width: 100%px;"><tbody class="mcnTextBlockOuter"><tr><td class="mcnTextBlockInner" style="padding-top: 9px; text-size-adjust: 100%;" valign="top"><table align="left" border="0" cellpadding="0" cellspacing="0" class="mcnTextContentContainer" style="border-collapse: collapse; max-width: 100%; min-width: 100%; text-size-adjust: 100%; width: 100%px;"><tbody><tr><td class="mcnTextContent" style="color: #202020; font-family: Helvetica; font-size: 16px; line-height: 24px; padding: 0px 18px 9px; text-size-adjust: 100%; word-break: break-word;" valign="top"><span style="color: #006666;"><strong><span style="font-size: 26px;">What's a HEIC file?</span></strong></span></td></tr></tbody></table></td></tr></tbody></table><table border="0" cellpadding="0" cellspacing="0" class="mcnTextBlock" style="border-collapse: collapse; min-width: 100%; text-size-adjust: 100%; width: 100%px;"><tbody class="mcnTextBlockOuter"><tr><td class="mcnTextBlockInner" style="padding-top: 9px; text-size-adjust: 100%;" valign="top"><table align="left" border="0" cellpadding="0" cellspacing="0" class="mcnTextContentContainer" style="border-collapse: collapse; max-width: 100%; min-width: 100%; text-size-adjust: 100%; width: 100%px;"><tbody><tr><td class="mcnTextContent" style="color: #202020; font-family: Helvetica; font-size: 16px; line-height: 24px; padding: 0px 18px 9px; text-size-adjust: 100%; word-break: break-word;" valign="top">If you're using an iPhone or iPad (and iOS 11 or later), <a href="https://forever1.zendesk.com/hc/en-us/articles/360055766692-What-is-a-HEIC-formatted-photo-" style="color: #007c89; text-size-adjust: 100%;" target="_blank">you've probably seen a HEIC file</a>...even if you didn't realize it! That's because HEIC, which is Apple's version of a<strong> "high-efficiency image format"</strong>,<strong> </strong>compresses photos into smaller files without sacrificing quality, which a JPG tends to do. This helps the storage on your phone fill up less quickly.<br /><br />That being said, HEIC files haven't become the most compatible files (yet). Thankfully, there are many online programs where you can reformat your HEIC files as JPGs or PNGs. Or, <a href="https://forever1.zendesk.com/hc/en-us/articles/360056214151-How-do-I-turn-off-HEIC-on-my-iPhone-" style="color: #007c89; text-size-adjust: 100%;" target="_blank">you can adjust your iOS settings to capture photos in JPG rather than HEIC</a>. </td></tr></tbody></table></td></tr></tbody></table><table border="0" cellpadding="0" cellspacing="0" class="mcnTextBlock" style="border-collapse: collapse; min-width: 100%; text-size-adjust: 100%; width: 100%px;"><tbody class="mcnTextBlockOuter"><tr><td class="mcnTextBlockInner" style="padding-top: 9px; text-size-adjust: 100%;" valign="top"><table align="left" border="0" cellpadding="0" cellspacing="0" class="mcnTextContentContainer" style="border-collapse: collapse; max-width: 100%; min-width: 100%; text-size-adjust: 100%; width: 100%px;"><tbody><tr><td class="mcnTextContent" style="color: #202020; font-family: Helvetica; font-size: 16px; line-height: 24px; padding: 0px 18px 9px; text-size-adjust: 100%; word-break: break-word;" valign="top"><strong>1. Go to "Settings" on your iPhone or iPad.</strong><br /><strong>2. Select "Camera."<br />3. Then, select "Formats."<br />4. Make sure "Most Compatible" is selected, rather than "High Efficiency."</strong><br /><br />And that's it! Any new photos you take will be captured & stored as JPGs. <br /><br /><strong>PS:</strong> The FOREVER App automatically converts HEIC to JPG during the upload process via your mobile device. (This is not true from your desktop, though!)</td></tr></tbody></table></td></tr></tbody></table></td></tr></tbody></table>MousePad Computer Servicehttp://www.blogger.com/profile/16192787666879800016noreply@blogger.com0tag:blogger.com,1999:blog-6813645468415391386.post-9998105994459148672016-06-03T07:36:00.002-07:002016-06-03T07:36:10.214-07:00FBI/Internet Crime Complaint Center Offers Some Tools to Battle E-mail & Tech Support Fraudsters<span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;"><span itemprop="publisher" itemscope="" itemtype="http://schema.org/Organization"><span itemprop="name">Network World</span></span> <span class="divider">|</span> <span content="2016-06-02T10:14-0700" itemprop="datePublished">Jun 2, 2016 10:14 AM PT </span></span></span><br />
<br />
<span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;"><span content="2016-06-02T10:14-0700" itemprop="datePublished"> </span>Not that summer time has anything to do with it but the FBI’s Internet Crime Complaint Center (IC3) warned that e-mail extortion campaigns and the tedious tech support scams have heated up in recent weeks.</span></span><br />
<br />
<br />
<span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">The IC3 said the recent uptick in email extortion comes from the data breaches at organizations like Ashley Madison, the IRS, Anthem and many others where tons personal information was stolen.</span></span><br />
<span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">In the extortion e-mail scam, attempted victims are told that personal information, such as their name, phone number, address, credit card information, and other personal details, will be released to the recipient's social media contacts, family, and friends if a ransom is not paid. The recipient is instructed to pay in Bitcoin, a virtual currency that provides a high degree of anonymity to the transactions. The recipients are typically given a short deadline. The ransom amount ranges from 2 to 5 bitcoins or approximately $250 to $1,200.</span></span><br />
<br />
<span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">The IC3 offered the following examples of the extortion e-mails:</span></span><br />
<ul>
<li><span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">“Unfortunately your data was leaked in a recent corporate hack and I now have your information. I have also used your user profile to find your social media accounts. Using this I can now message all of your friends and family members.”</span></span></li>
<li><span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">“If you would like to prevent me from sharing this information with your friends and family members (and perhaps even your employers too) then you need to send the specified bitcoin payment to the following address.”</span></span></li>
<li><span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">“If you think this amount is too high, consider how expensive a divorce lawyer is. If you are already divorced then I suggest you think about how this information may impact any ongoing court proceedings. If you are no longer in a committed relationship then think about how this information may affect your social standing amongst family and friends.”</span></span></li>
<li><span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">“We have access to your Facebook page as well. If you would like to prevent me from sharing this dirt with all of your friends, family members, and spouse, then you need to send exactly 5 bitcoins to the following address.”</span></span></li>
<li><span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">“We have some bad news and good news for you. First, the bad news, we have prepared a letter to be mailed to the following address that details all of your activities including your profile information, your login activity, and credit card transactions. Now for the good news, You can easily stop this letter from being mailed by sending 2 bitcoins to the following address.”</span></span></li>
</ul>
<span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">The IC3 said that fraudsters quickly use the news release of a high-profile data breach to initiate an extortion campaign. The FBI suspects multiple individuals are involved in these extortion campaigns based on variations in the extortion emails. The FBI said it does not condone the payment of extortion demands as the funds will facilitate continued criminal activity, including potential organized crime activity and associated violent crimes.</span></span><br />
<br />
<br />
<span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">Meanwhile another long-time scam is seeing increased activity. The IC3 said that it is seeing an increase in complaints related to technical support scams, where the subject claims to be an employee (or an affiliate) of a major computer software or security company offering technical support to the victim.</span></span><br />
<div class="related-promo-wrapper">
<div class="promo apart">
<span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;"><br /></span></span></div>
</div>
<aside class="nativo-promo tablet desktop"></aside><span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">“Recent complaints indicate some subjects are claiming to be support for cable and Internet companies to offer assistance with digital cable boxes and connections, modems, and routers. The subject claims the company has received notifications of errors, viruses, or security issues from the victim's internet connection. Subjects are also claiming to work on behalf of government agencies to resolve computer viruses and threats from possible foreign countries or terrorist organizations. From January 1, 2016, through April 30, 2016, the IC3 received 3,668 complaints with adjusted losses of $2,268,982,” the agency stated.</span></span><br />
<span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">The IC3 offered some examples of how this scam is initiated:</span></span><br />
<ul>
<li><span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">Telephone: This is the traditional contact method. Victims receive a “cold” call from a person who claims the victim's computer is sending error messages and numerous viruses were detected. Victims report the subjects have strong foreign accents.</span></span></li>
<li><span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">Pop-up message: The victim receives an on-screen pop-up message claiming viruses are attacking the device. The message includes a phone number to call to receive assistance.</span></span></li>
<li><span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">Locked screen on a device (Blue Screen of Death): Victims report receiving a frozen, locked screen with a phone number and instructions to contact a (phony) tech support company. Some victims report being redirected to alternate websites before the BSOD occurs. This has been particularly noticed when the victim was accessing social media and financial websites.</span></span></li>
<li><span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">Pop-up messages and locked screens are sometimes accompanied by a recorded, verbal message to contact a phone number for assistance.</span></span></li>
</ul>
<br />
<br />
<span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">The IC3 said that an increasingly reported variation of the scam occurs when the subject contacts the victim offering a refund for tech support services previously rendered because the company has closed.</span></span><br />
<span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">“The victim is convinced to allow the subject access to their device and to log onto their online bank account to process the refund. The subject then has control of the victim's device and bank account. With this access, the subject appears to have “mistakenly” refunded too much money to the victim's account, and requests the victim wire the difference back to the subject company.</span></span><br />
<span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">In reality, the subject transferred funds among the victim's own accounts (checking, savings, retirement, etc.) to make it appear as though funds were deposited. The victim wires their own money back to the company, not finding out until later that the funds came from one of their own accounts. The refunding and wiring process can occur multiple times, which results in the victim losing thousands of dollars, the IC3 stated.</span></span><br />
<span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">Victims are increasingly reporting subjects are becoming hostile, abusive, and utilizing foul language and threats when being challenged by victims, the IC3 stated. Microsoft, which is often used as a key part of the scammers’ invective said at a congressional hearing last year that an estimated 3.3 million people a year are hit with the scam at an annual cost of $1.5 billion. This translates to a victim nearly every 10 seconds, with an average loss of $454 per consumer.</span></span><br />
<span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">The IC3 offered advice for fending off these attacks:</span></span><br />
<ul>
<li><span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">Recognize the attempt and cease all communication with the subject.</span></span></li>
<li><span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">Resist the pressure to act quickly. The subjects will urge the victim to fast action in order to protect their device. The subjects create a sense of urgency to produce fear and lure the victim into immediate action.</span></span></li>
<li><span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">Do not give unknown, unverified persons remote access to devices or accounts. A legitimate software or security company will not directly contact individuals unless the contact is initiated by the customer.</span></span></li>
<li><span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">Ensure all computer anti-virus, security, and malware protection is up to date. Some victims report their anti-virus software provided warnings prior to the attempt.</span></span></li>
<li><span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">If a victim receives a pop-up or locked screen, shut down the device immediately. Victims report that shutting down the device and waiting a short time to restart usually removes the pop-up or screen lock.</span></span></li>
</ul>
MousePad Computer Servicehttp://www.blogger.com/profile/16192787666879800016noreply@blogger.com0tag:blogger.com,1999:blog-6813645468415391386.post-79250730180421501142015-04-30T08:48:00.000-07:002015-04-30T08:48:24.680-07:00REPORT UNSOLICITED COMMERCIAL E-MAIL ("SPAM")<em>The following can be found on the US Department of Justice's (DOJ) website at: </em><a href="http://www.justice.gov/doj/spam"><em><span style="font-family: Arial, Helvetica, sans-serif; font-size: x-small;">http://www.justice.gov/doj/spam</span></em></a><br />
<br />
<br />
<div class="node__content" style="-webkit-text-stroke-width: 0px; background-color: #f8f9f4; box-sizing: border-box; color: #171e24; font-size-adjust: none; font-stretch: normal; font: 13px/18.2px Georgia, serif; letter-spacing: normal; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;">
<div class="field field--name-field-page-body field--type-text-long field--label-hidden" style="box-sizing: border-box; margin: 0px 0px 1em;">
<div class="field__items" style="box-sizing: border-box;">
<div class="field__item even" style="box-sizing: border-box;">
<div style="box-sizing: border-box; color: #171e24; margin: 0px 0px 1em;">
Many consumers receive a variety of unsolicited commercial e-mail (also known as "spam") in their offices or at home. While people don't always like getting spam, much of it has a legitimate business purpose. Unsolicited e-mails, however, are often the initial means for criminals, such as operators of fraudulent schemes, to contact and solicit prospective victims for money, or to commit identity theft by deceiving them into sharing bank and financial account information.</div>
<div style="box-sizing: border-box; color: #171e24; margin: 0px 0px 1em;">
The following information, e-mail addresses and contacts noted below are provided for your reference if you have received a particular type of unsolicited email and would like to report or forward it on to law enforcement authorities.</div>
<div class="contenthdr" style="box-sizing: border-box;">
<strong style="box-sizing: border-box; font-weight: bold;">Internet Fraud</strong></div>
<div class="contenthdr" style="box-sizing: border-box;">
</div>
<div class="contenthdrh2" style="box-sizing: border-box;">
<strong style="box-sizing: border-box; font-weight: bold;"><em style="box-sizing: border-box;">Hurricane Katrina Relief Fraud</em></strong></div>
<div class="contenthdrh2" style="box-sizing: border-box;">
</div>
<div style="box-sizing: border-box; color: #171e24; margin: 0px 0px 1em;">
The<span class="Apple-converted-space"> </span><a href="http://www.justice.gov/katrina/Katrina_Fraud/index.html" style="box-sizing: border-box; color: #a6824b; text-decoration: none;">Hurricane Katrina Fraud Task Force</a><span class="Apple-converted-space"> </span>was established by Attorney General Alberto Gonzales to combat all types of fraud relating to Hurricane Katrina and its aftermath, with an initial emphasis on charity fraud, identity theft, insurance fraud, and procurement and government-benefit fraud. See the<span class="Apple-converted-space"> </span><a href="http://www.justice.gov/katrina/Katrina_Fraud/index.html" style="box-sizing: border-box; color: #a6824b; text-decoration: none;">Hurricane Katrina Fraud Task Force Web Site</a><span class="Apple-converted-space"> </span>for more information.</div>
<div class="contenthdrh2" style="box-sizing: border-box;">
<strong style="box-sizing: border-box; font-weight: bold;"><em style="box-sizing: border-box;">Africa-Based Investment Schemes</em></strong></div>
<div class="contenthdrh2" style="box-sizing: border-box;">
</div>
<div style="box-sizing: border-box; color: #171e24; margin: 0px 0px 1em;">
An increasing volume of spam consists of e-mail from a person who represents himself or herself as having some African affiliation, and who is soliciting you to help him or her transfer illegally obtained or questionable funds out of a nation in Africa. (Some more recent e-mails purport to involve moving money out of Afghanistan.) These solicitations are fraudulent, and may violate one or more federal criminal laws.</div>
<blockquote style="box-sizing: border-box;">
<div style="box-sizing: border-box; color: #171e24; margin: 0px 0px 1em;">
Do not send any money or financial account information if you receive one of these e-mails (or a letter or fax of a similar nature). See the<span class="Apple-converted-space"> </span><a href="http://www.secretservice.gov/criminal.shtml" style="box-sizing: border-box; color: #a6824b; text-decoration: none;">U.S. Secret Service Financial Crimes Division web page</a><span class="Apple-converted-space"> </span>for more information.<br style="box-sizing: border-box;" />If you have responded to one of these online solicitations and have lost money, please contact the<span class="Apple-converted-space"> </span><a href="http://www.ic3.gov/" style="box-sizing: border-box; color: #a6824b; text-decoration: none;">Internet Crime Complaint Center</a>, a joint venture of the FBI and the National White Collar Crime Center, and use the<a href="http://www.ic3.gov/complaint/" style="box-sizing: border-box; color: #a6824b; text-decoration: none;">ICCC's online complaint form</a>.</div>
</blockquote>
<div class="contenthdrh2" style="box-sizing: border-box;">
<strong style="box-sizing: border-box; font-weight: bold;"><em style="box-sizing: border-box;">Medical Products and Devices</em></strong></div>
<div class="contenthdrh2" style="box-sizing: border-box;">
</div>
<div style="box-sizing: border-box; color: #171e24; margin: 0px 0px 1em;">
To report e-mail that involves possibly fraudulent claims about medical devices or products (for example, so-called "miracle" cures) please email the Food and Drug Administration at<span class="Apple-converted-space"> </span><a class="mailto" href="mailto:webcomplaints@ora.fda.gov" style="box-sizing: border-box; color: #a6824b; text-decoration: none;">webcomplaints@ora.fda.gov</a><span class="mailto" style="background: url("http://www.justice.gov/sites/all/modules/contrib/extlink/extlink_s.png") no-repeat -20px 50%; box-sizing: border-box; height: 10px; padding-right: 12px; width: 10px;"></span><div class="element-invisible" style="box-sizing: border-box; clip: rect(1px, 1px, 1px, 1px); height: 1px; overflow: hidden; position: absolute !important;">
Email links icon</div>
.<br />
<div class="contenthdrh2" style="box-sizing: border-box;">
<strong style="box-sizing: border-box; font-weight: bold;"><em style="box-sizing: border-box;">Financial Investments</em></strong></div>
<div class="contenthdrh2" style="box-sizing: border-box;">
</div>
<div style="box-sizing: border-box; color: #171e24; margin: 0px 0px 1em;">
Report investment-related spam e-mails to the U.S. Securities and Exchange Commission using the<span class="Apple-converted-space"> </span><a href="https://denebleo.sec.gov/TCRExternal/disclaimer.xhtml" style="box-sizing: border-box; color: #a6824b; text-decoration: none;">SEC Tips, Complaints and Referrals Portal</a></div>
<div class="contenthdrh2" style="box-sizing: border-box;">
<strong style="box-sizing: border-box; font-weight: bold;"><em style="box-sizing: border-box;">General</em></strong></div>
<div class="contenthdrh2" style="box-sizing: border-box;">
</div>
<div style="box-sizing: border-box; color: #171e24; margin: 0px 0px 1em;">
If you want to report other possible online crime, including online fraud (for example, "get-rich-quick" schemes or online auction fraud) whether or not you have lost money, please use the<span class="Apple-converted-space"> </span><a href="http://www.ic3.gov/complaint/" style="box-sizing: border-box; color: #a6824b; text-decoration: none;">ICCC's online complaint form</a>.</div>
<div class="contenthdr" style="box-sizing: border-box;">
<strong style="box-sizing: border-box; font-weight: bold;">Other Types of Unsolicited Commercial E-Mail</strong></div>
<div class="contenthdr" style="box-sizing: border-box;">
</div>
<div style="box-sizing: border-box; color: #171e24; margin: 0px 0px 1em;">
For more information about reporting unsolicited e-mail that does not fall into any of the above categories, see the Federal Trade Commission's<span class="Apple-converted-space"> </span><a href="http://www.ftc.gov/spam/" style="box-sizing: border-box; color: #a6824b; text-decoration: none;">Spam E-mail web site</a>.</div>
<div style="box-sizing: border-box; color: #171e24; margin: 0px 0px 1em;">
To file a complaint about a violation of the National Do Not Call Registry or to register your telephone number on the Registry, please go to<span class="Apple-converted-space"> </span><a href="http://www.donotcall.gov/" style="box-sizing: border-box; color: #a6824b; text-decoration: none;">www.donotcall.gov</a>.</div>
<div class="contenthdr" style="box-sizing: border-box;">
Fact Sheets from the<span class="Apple-converted-space"> </span><a href="http://www.us-cert.gov/" style="box-sizing: border-box; color: #a6824b; text-decoration: none;">U.S. Computer Emergency Readiness Team</a><span class="Apple-converted-space"> </span>(US-CERT)</div>
<div style="box-sizing: border-box; color: #171e24; margin: 0px 0px 1em;">
<a href="http://www.us-cert.gov/cas/tips/ST04-007.html" style="box-sizing: border-box; color: #a6824b; text-decoration: none;">Reducing Spam</a><br style="box-sizing: border-box;" /><a href="http://www.us-cert.gov/reading_room/emailscams_0905.pdf" style="box-sizing: border-box; color: #a6824b; text-decoration: none;">Recognizing and Avoiding E-mail Scams</a><br style="box-sizing: border-box;" /><a href="http://www.us-cert.gov/cas/tips/ST04-014.html" style="box-sizing: border-box; color: #a6824b; text-decoration: none;">Avoiding Social Engineering and Phishing Attacks</a></div>
</div>
</div>
</div>
</div>
</div>
<div class="node__updated" style="-webkit-text-stroke-width: 0px; background-color: #f8f9f4; box-sizing: border-box; color: #999999; float: right; font-size-adjust: none; font-stretch: normal; font: italic 12px/18.2px Georgia, serif; letter-spacing: normal; padding-top: 5px; text-align: right; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px;">
Updated April 20, 2015</div>
MousePad Computer Servicehttp://www.blogger.com/profile/16192787666879800016noreply@blogger.com0tag:blogger.com,1999:blog-6813645468415391386.post-16681192051427018852015-02-18T14:50:00.000-08:002015-02-18T14:50:20.268-08:006 Tips for Avoiding Viruses, MalWare and Other Unwanted Programs<b>1. Know which Anti-Virus software that you are running</b><div>
<i><br /></i></div>
<div>
<i>Do not be tricked by messages from different programs on the screen prompting to scan your computer. Know the name of your installed Anti-Virus software (AVG, Symantec/Norton, McAfee, Kaspersky, Sophos, Webroot, etc.)</i></div>
<div>
<br /></div>
<div>
<b>2. Do not click on ads that you see on websites</b></div>
<div>
<i><br /></i></div>
<div>
<i>Often, a website that you trust can be compromised to display messages to the side (or even pop up) that tell you that your computer is running slow or that you could be infected with SpyWare. Clicking on these links could result in AdWare, Fake Anti-Virus programs or other types of MalWare being installed on your computer.</i></div>
<div>
<br /></div>
<div>
<b>3. Try to avoid installing "special" viewers in order to play certain videos that you find online</b></div>
<div>
<i><br /></i></div>
<div>
<i>Most videos require Adobe Flash Player (www.adobe.com), Adobe ShockWave Player (www.adobe.com), Java (www.java.com) or Microsoft Silverlight (www.microsoft.com) to view them. If you are prompted to install another viewer or to update one of these viewers, go directly to the publisher's site to get the installation/update (do not allow the video to install it.</i></div>
<div>
<br /></div>
<div>
<b>4. Remember "Nothing is Free"</b></div>
<div>
<i><br /></i></div>
<div>
<i>Everything has a price. If you are downloading free software or digital content (music, videos, movies,…), be sure to scan it with your Anti-Virus software before attempting to install/play it. If an installation is required, please read each screen before accepting wwhat is being requested (many times, you are agreeing to receive ads for daily deals, share your personal information or even give control of your Internet browsing to additional programs that will also be installed).</i></div>
<div>
<br /></div>
<div>
<b>5. Use a reputable source to acquire software/content</b></div>
<div>
<i><br /></i></div>
<div>
<i>Purchase your security and performance tuning software from a retailer that you trust, consult with a professional and see what they recommend or do some research and see what objective people are saying.</i></div>
<div>
<br /></div>
<div>
<b>6. Do not be extorted by fake Anti-Virus programs</b></div>
<div>
<i><br /></i></div>
<div>
<i>There are some so-called "free" security scans out there that have been know to block access to all of your files unless you pay to "activate" their premium features. Do not pay a "ransom to get your files back (are you really comfortable giving them your credit card information?).</i></div>
<div>
<br /></div>
MousePad Computer Servicehttp://www.blogger.com/profile/16192787666879800016noreply@blogger.com0