Retrieving Email Headers Message MS Outlook

Last Updated: 12th December, 2017, 6:20 PMI often ask for email headers when something phishy turns up in someone’s email messages. It’s really quite simple to get this information. Follow the steps below to accomplish this task. This applies to Outlook 2013 and  2016. Your mileage may vary if using a version older than these. Open the suspect message in it’s own windows by double-clicking on the message in question., Click on the File tab and then click on the properties button. When you perform #2 you’ll see another window open that look like this: As you can see in the image above there’s a section labeled Internet headers. Place your cursor in that area, hold… Read More

Continue Reading

Sophisticated Web Attack Fake Support Scam

Last Updated: 11th December, 2017, 2:01 PMWhy is there a British woman speaking on my computer? That’s the question I was suddenly asked during a remote session not too long ago. I was actively working on one of two laptops while the client was getting the other one ready. I was taken aback at the question because it was completely out of context and didn’t make any sense. So, the client put their phone closer to the computer and I could hear the voice clearly stating that the there was a problem and the computer’s browser was being redirected to a Microsoft support site for immediate assistance with the problem. And… Read More

Continue Reading

Google Home vs Internet Radio Streaming Sites

Last Updated: 11th December, 2017, 10:19 AMAs a network administrator I really don’t like Internet Radio Streaming sites. My two biggest complaints about them are these: 1. They incredible bandwidth hogs. 2. Some of them are crawling with bugs and other malware hidden to the user. (Those ads you see all over them? That’s typically one of the places they hide the malware, or it’s sometimes injected directly into the stream; mostly without the sites owner/operator’s knowledge.) They’re so pernicious! Any site where you see ads that site owner is getting paid to place those ads all over their web sites. Often, in my opinion, in the most annoying places.… Read More

Continue Reading

Bitdefender: Value Added Functionality Without The Added Cost

Last Updated: 9th December, 2017, 3:51 PMSome Anti-Virus vendors include things like Content Filtering as an add-on that they refer to as a value-added module, while other vendors like Bitdefender believe that its so important that they add this to their package as a necessity. Its a value-added feature without the added cost.

Continue Reading

Perimeter Security

Last Updated: 9th December, 2017, 1:59 PMI think my most favorite perimeter security device or (PSD) is the SonicWALL. A perimeter security device is a device that literally sits on your network between the Internet connection and the rest of your network. All traffic to and from the network goes through this device on its way in from the Internet and out of your network to the Internet.

Continue Reading

Switching Users Windows 7 and Windows 10

Last Updated: 2nd December, 2017, 5:25 PMScenario: You come in to the office and sit down at your workstation on Monday morning, but when you go to your computers login screen there’s another users’ username on the screen; usually the network administrator’s username. That’s a pretty good indicator that the network admin was working on your computer remotely making sure things are working correctly by doing some necessary program upgrades/updates, fixing a problem on your computer, or performing work that can only be done after regular office hours. Most Network Administrators I know, including myself, don’t keep track of or store user passwords. User passwords, unless for something very specific… Read More

Continue Reading

Edge Browser Another Look

Last Updated: 27th November, 2017, 1:55 PMIf you’re like me, when you’re really busy there’s nothing sweeter than a fast, light-weight, full-featured web browser to help you get things done. For me, Google Chrome used to be that browser. However, recently a client and I were talking about planning out some technology changes in their environment, and the subject of Microsoft’s Edge Browser came up because it’s part of Windows 10.

Continue Reading

Ransomware A Very Real Threat

Last Updated: 25th November, 2017, 4:46 PMFrom Wikipedia, the free encyclopedia Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion, in which it encrypts the victim’s files, making them inaccessible, and demands a ransom payment to decrypt them. Recently, someone asked me if this was a real thing. My response was, “it’s absolutely a real thing!” What bothered me about this question… Read More

Continue Reading

How To Put Internet Explorer in Compatibilty Mode

Last Updated: 4th March, 2014, 12:50 PMIt didn’t used to be an issue, however as IE 8 became 9 and then 10 and now Internet Explorer 11, Internet Explorer’s compatibility mode is quickly becoming a critical part of the browsers’ list of functions. The fact that a web browser needs a feature such as compatibility mode bothers me. It suggests that something just isn’t right somewhere. Microsoft isn’t playing by the same rules as the rest of the internet world – no surprise there – however their last two IE versions even have problems with some of their server platform software such as Small Business Server 2011 and it’s remote… Read More

Continue Reading