Archive for January, 2017

Email Hack Methods – Server Hack

Email Hack Methods – Server Hack

So far, we’ve talked about the ways email passwords can be stolen while under your control.  Today, we’re going to address the one way of having your email password taken in which you have zero control – a server hack....

By on Jan 17, 2017

Category: Email, Security

Email Hack Methods – Answering Questions

Email Hack Methods – Answering Questions

We’ve been looking at the various ways your email password can be hacked.  Besides being stolen, figured out or given away through social engineering, another method to get your password is for a hacker to successfully answer your security...

By on Jan 17, 2017

Category: Email, Security

Email Hack Methods – Social Engineering

Email Hack Methods – Social Engineering

  You’ve probably heard that a chain is only as strong as its weakest link.  Unfortunately, when it comes to protecting our email accounts, we, the users of email, are usually the weakest link.  We often fall prey to...

By on Jan 17, 2017

Category: Email, Security

Email Hack Methods – Figuring Out Your Password

Email Hack Methods – Figuring Out Your Password

As we mentioned in yesterday’s post, getting into your email account depends on obtaining your password.  We talked about ways your password might be stolen (http://www.4kcc.com/blog2/?p=946).  Today, we ‘re going to look at ways a hacker (or anyone else...

By on Jan 11, 2017

Category: Email, Security

Email Hack Methods – Stealing Your Password

Email Hack Methods – Stealing Your Password

For someone to gain entry to your email account, they must have access to your password.  These next blog postings are going to look at the various ways bad guys can get your password.  Today, we start with stealing...

By on Jan 10, 2017

Category: Email, Security

Email Hack Methods – Intro

Email Hack Methods – Intro

There’s no question about it – email hacking has been in the news a lot in the past few weeks and months.  Between the DNC (Democratic National Committee) and Yahoo, there’s been plenty of talk regarding the unsavory access...

By on Jan 09, 2017

Category: Email, Security

Social Media In A Tragedy

Social Media In A Tragedy

  Yesterday, a shooting took place not too far from here – at the Fort Lauderdale Airport.  Our thoughts and prayers go out to the families of the five people who needlessly lost their lives.  For the eight others...

By on Jan 07, 2017

Category: Social Media

Not All Snags Are Bad

Not All Snags Are Bad

One of the most useful tools we have on our computers at Keystone Computer Concepts Snagit.  Whether you run a small business, head up some committee at church or the VFW, Snagit will make things easier.  It’s a little...

By on Jan 05, 2017

Category: Software

Resize Photos

Resize Photos

      One of the most common questions we are asked is “How can I resize a photo?  It takes too long to send or upload.”  Modern cameras often take photos which are large in file size –...

By on Jan 04, 2017

Category: Photos, Software

Speed vs. Security

Speed vs. Security

When it comes to the Internet, we all love SPEED!  We want to visit websites faster then we did yesterday.  We purchase new computing devices and we want our email faster and we want to surf the Web at...

By on Jan 03, 2017

Category: Security

Recent Comments

Links

Archive