<?xml version="1.0" encoding="utf-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://computeradvisoryservices.com/blog/x5feed.php" rel="self" type="application/rss+xml" />
		<title><![CDATA[12 Scams of Christmas]]></title>
		<link>https://computeradvisoryservices.com/blog/</link>
		<description><![CDATA[]]></description>
		<language>EN</language>
		<lastBuildDate>Thu, 04 Jul 2013 08:36:29 +0000</lastBuildDate>
		<generator>Incomedia WebSite X5 Professional</generator>
		<item>
			<title><![CDATA[WATCH OUT, ONLINE IDENTITY THEFT ON THE RISE… SAFEGUARD YOUR PASSWORDS]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=Security_Issues"><![CDATA[Security Issues]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_kfkq40rd"><p style="text-align: left;"><span class="ff1 fs20">Identity theft has always been a concern, but with more and more details of our private lives openly accessible on the Internet, it is at unprecedented levels and it is easier than ever for cybercriminals to steal somebody's identity. <br /><br />There have been many reports of identity theft against individuals or companies. The abuse of identity details, such as dates of birth, postcodes and internet logins, now accounts for two thirds of all frauds. But because there are no specific agencies that could do tracking, victims often end up pursuing the long process of resetting their passwords in their PCs, bank accounts, and other areas where they have stored personal data, often daunting tasks. As such, data on how many victims there are or how much has been lost to identity theft remains elusive.<br /><br />The public should be more vigilant in protecting personal details to prevent identity theft, a developer of secure content and threat management solution has said, citing an annual study performed by California-based Javelin Strategy and Research. The study showed that in the US alone, around 12.6 million people fell victim to identity theft in 2012, losing at least $21 billion. Identity theft is an act wherein a person or a group of persons wrongfully obtain and utilize personal and often crucial information from other people, often for financial gains. <br /><br />It's important to be careful what we share too. Some online services require us to provide personal details to reset passwords. Criminals can use this password reset method to convince the website that it's actually you and get into your account. <br />Identity Theft on the Internet<br /><br />The internet is a hotbed for identity information. Whether someone lurking over a user’s shoulder at a coffee shop, or a hacker cracking passwords, information entered on the internet can be targeted.<br /><br />Your passwords are the most common way to prove your identity when using websites, email accounts and your computer itself (via User Accounts). The use of strong passwords is therefore essential in order to protect your security and identity. The best security in the world is useless if a malicious person has a legitimate user name and password.<br /><br />Passwords are commonly used in conjunction with your username. However, on secure sites they may also be used alongside other methods of identification such as a separate PIN and/or memorable information. In some cases you will also be asked to enter only certain characters of your password, for additional security.<br /><br />Groups will send out spam emails that lure inexperienced users into promising deals asking for information and not follow up. Internet identity thieves are hard to identify because of the anonymity they are allowed. Legal Yogi can give tips to prevent identity theft on the internet, taking action, and recovery. <br /><br /><b>Information Sought by Thieves</b></span><span class="ff1 fs20"><br /><br />Any number providing service access is at risk. Such numbers, experts report, include social security numbers, phone or utility account numbers, bank and credit account numbers, student ID numbers, driver’s license and passport numbers, professional license numbers, and insurance numbers.<br /><br /><b>The Risk of Using Weak Passwords</b></span><span class="ff1 fs20"><br /><br />• &nbsp;&nbsp;&nbsp;People impersonating you to commit fraud and other crimes, including <br />• &nbsp;&nbsp;&nbsp;Accessing your bank account<br />• &nbsp;&nbsp;&nbsp;Purchasing items online with your money<br />• &nbsp;&nbsp;&nbsp;Impersonating you on social networking and dating sites<br />• &nbsp;&nbsp;&nbsp;Sending emails in your name<br />• &nbsp;&nbsp;&nbsp;Accessing the private information held on your computer<br /></span></p></div>]]></description>
			<pubDate>Thu, 04 Jul 2013 08:36:29 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=kfkq40rd</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/kfkq40rd</guid>
		</item>
		<item>
			<title><![CDATA[Maintaining Your Privacy on the Internet]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=Security_Issues"><![CDATA[Security Issues]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_t577oikb"><p style="text-align: left;"><span class="fs24 cf3 ff1">As technology advances, trying to maintain privacy on the Internet has become increasingly difficult. Nowadays there are so many different ways to be tracked online. Many everyday activities now involve computers and the Internet. Cell phones, emails, web browsers, search engines, and social media sites are just a few examples of technologies that produce digital footprints as a natural byproduct of using them.<br /><br />These digital footprints we leave all over the internet can still be kept safe and far from cyber scammers’ reach if we remain very vigilant and continuously practice safe browsing tactics.<br /><br />Here are a few tips to control and maintain your privacy when using the Internet:<br /><br /><b>1. &nbsp;&nbsp;&nbsp;&nbsp;Tweak Your Social Media Privacy Settings</b><br /> If you’re aiming to be more conscious of your Internet privacy, the default settings for your social media profiles could use some tweaking. We’ve previously written about some ways to improve your privacy online with a list of Facebook privacy settings that you should pay close attention to, and also mentioned how to enable Twitter’s Do Not Track settings. In addition to updating your social media privacy settings, it’s a good idea to log off sites like Facebook and Twitter whenever you’re not using them.<br /><br /><b>2. &nbsp;&nbsp;&nbsp;&nbsp;Block Third-Party Cookies</b><br /><br /> As you surf the web, web sites follow your every move. Through the use of “cookies” – files that record your actions – they can tell the last time you visited a site, what your user name is, whether you should be logged in automatically, and much more. Web browsers are beginning to include features that allow you to block third-party tracking, which has gained traction in recent years.<br /><br />How to block third party cookies on:<br /><br /><b>Internet Explorer</b><br />1. &nbsp;&nbsp;&nbsp;Click the &quot;Tools&quot; menu<br />2. &nbsp;&nbsp;&nbsp;Click &quot;Internet Options&quot;<br />3. &nbsp;&nbsp;&nbsp;Select the &quot;Privacy&quot; tab<br />4. &nbsp;&nbsp;&nbsp;Click &quot;Advanced&quot;<br />5. &nbsp;&nbsp;&nbsp;Check the box &quot;Override automatic cookie handling&quot;<br /><br /><b>Google Chrome on Windows</b><br />1. &nbsp;&nbsp;&nbsp;Select the Wrench (spanner) icon at the top right<br />2. &nbsp;&nbsp;&nbsp;Select &quot;Settings&quot;<br />3. &nbsp;&nbsp;&nbsp;Select the &quot;Show advanced settings&quot; <br />4. &nbsp;&nbsp;&nbsp;Select &quot;Content settings&quot; under &quot;Privacy&quot; and click &quot;Close&quot;<br /><br /><b>Firefox on Windows</b><br />1. &nbsp;&nbsp;&nbsp;Click the &quot;Tools&quot; menu<br />2. &nbsp;&nbsp;&nbsp;Click &quot;Options...&quot;<br />3. &nbsp;&nbsp;&nbsp;Select the &quot;Privacy&quot; menu<br />4. &nbsp;&nbsp;&nbsp;Make sure &quot;Keep until&quot; is set to &quot;they expire&quot;<br />5. &nbsp;&nbsp;&nbsp;Option 1: To enable third party cookies for ALL sites: Make sure &quot;Accept third-party cookies&quot; is checked<br /><br /><b><span class="imUl">OR</span></b><br /><br />Option 2: To only enable third-party cookies for only your preferred websites: Click &quot;Exceptions&quot; then add URL and click &quot;Allow&quot; and then click &quot;Close&quot;.<br /><br /><br /><b>3. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Block Third-Party Flash Content</b><br /><br /> Most people are aware that their web browser stores cookies. However, most people are not aware that Flash Player has its own method of using cookies, and that the information in these cookies can be shared among websites. Head over to this web page, which displays your Flash security and privacy settings, and make some changes to keep these cookies off your computer. Uncheck “Allow third-party Flash content to store data on your computer” to block these cookies from being stored. (Note: the downside to unchecking this setting is that it may prevent Flash content from playing on some websites.)<br /><br /><br />When it comes to maintaining privacy and security on the Internet, most of us want balance and transparency. Only in rare cases would people want their entire computer so locked it becomes a hassle to execute normal tasks. Other users may be fine with sharing some information with services they trust. But while we wait for better privacy laws to catch up with new advances in technology and protect us against intrusive data mining practices, use these tips to avoid letting your data get in the wrong hands.<br /><br /><b>4. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Unlink Your Accounts</b><br /> This is one of those things that got Mat Honan in such a heap of trouble when his account was hacked earlier this year. Linking accounts may be super convenient, but it also makes it super convenient for people to put information together about you. Whenever sites ask you to log in with some other site’s authentication, particularly a social network’s authentication, they’re likely to be tracking your data.<br /><br /><br /><br /><br /><br /></span><span class="ff2 fs20"><br /></span></p></div>]]></description>
			<pubDate>Mon, 06 May 2013 11:53:30 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=t577oikb</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/t577oikb</guid>
		</item>
		<item>
			<title><![CDATA[How to maintain your privacy on Social Networking Sites]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=Social_Media"><![CDATA[Social Media]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_9oa0t5h9"><p style="text-align: left;"><span class="ff1 fs20">Social networking sites are growing in popularity at an exponential rate. They have become a common occurrence in our daily lives — among all generations. For example, Facebook with over 1 billion active users is now the biggest social media website amongst other giants such as Twitter, Google+, Linkedin, Pinterest and the list goes on. While they are a great way to stay in touch with old friends, find new friends, keep family up-to-date, post pictures, and so on; they are also now very popular places for people who have bad intentions.<br /><br />Just think about what your account may contain — email address, home address, date of birth, pictures — the list goes on. That's valuable information to cyber criminals and scammers. Facebook and Twitter’s global surge in popularity has encouraged spammers and other online criminals to take advantage of the tiny URL links used within Twitter to target unsuspecting users. New Facebook scams seem to make emerge on a daily basis.<br /><br />So what can you do to stay safe one these kinds of sites? Here is our top 10 list of the ways you can restore or maintain your privacy on social networking sites.<br /><b><br />1. &nbsp;&nbsp;&nbsp;Check your privacy settings</b></span><span class="ff1 fs20"><br /><br />Make sure you know what information is being shared publicly — and what information can be accessed by applications. You may be sharing more than you intended. Keep in mind that without taking the precaution of adjusting your privacy settings, when you visit partner sites, they may able to obtain information from your Facebook account, including your name, profile photo and your interests. For more information on Facebook settings, please visit Data Use Policy <br /><b><br /></b></span><span class="ff1 fs20">2. &nbsp;&nbsp;&nbsp;Create strong passwords<br /><br />Create complex passwords that are at least 10 characters long by mixing letters, symbols and numbers (don't just use words that can be found in a dictionary). You'll also want to avoid reusing the same passwords for different sites — if the password is breached or cracked, the cyber criminal would then have access to all of your accounts. If you are using a public computer, make sure it doesn't store your email address and password. It's easy to accidently choose 'remember me', so don't forget to look over the privacy settings on your browser. <br /><br />3. &nbsp;&nbsp;&nbsp;Think twice about who you add, follow, or connect with<br /><br />It's a good rule of thumb is to only connect and share with people that you know in real life. By 'friending' people online that are strangers, you open yourself up to added privacy and security risks. According to a study from Cloudmark, nearly 40 percent of new Facebook profiles are fake, created by malware writers and spammers.<br /><br />4. &nbsp;&nbsp;&nbsp;Think before you post Always remember, once shared online, your information is no longer private.<br /><br />Personal information like date of birth, home address, and email address can be used for a variety of scams and even identity theft. And just think how valuable it would be for the bad guys to get a hold of your dates and details of trips, vacations and time spent away from home.<br /><br />5. &nbsp;&nbsp;&nbsp;Be careful what you click Never, ever click on suspicious links, even if they look enticing.<br /><br />A lot of scams and malware in the social network world is spread through links and rogue applications. You may have seen recent posts such as &quot;I just got the Dislike button, so now I can dislike all of your dumb posts lol!!&quot; or &quot;Student attacked his teacher and nearly killed him&quot; with a link attached to it. Take caution when clicking on links — even if it comes from a friend. Many of these applications are given access to post items — without you knowing — when you install them.<br /><br />6. &nbsp;&nbsp;&nbsp;Limit your use of applications and extras (like games and quizzes) Software applications that are available for download to run on the site may not undergo any type of security approval, verification, or review. These applications can potentially be leveraged by cyber thieves to compromise your information. What's more, you may be handing over private information in your profile to the applications developers when you install the new app, even if you use privacy settings.<br /><br />7. &nbsp;&nbsp;&nbsp;Monitor your kids<br /><br />Networking sites can potentially open up children and young adults to many unfavorable aspects of the Internet — including bullying, online predators, and cyber scams. Make sure to prepare kids with information that can help them to make safe decisions, and to have an open dialogue about safe and appropriate web use.<br /><br />8. &nbsp;&nbsp;&nbsp;Take action if you see suspicious activity<br /><br />There are several ways to report potential spam or scams. Check your social network of choice for more details. If you think your account may have been compromised, immediately change your password. If status updates are appearing on your Facebook page that you didn't make, you may have a rogue application. Remove the suspicious application from your Facebook profile as well as the related message from your status, News Feed, and your Likes and Interests in the &quot;Edit my Profile&quot; menu.<br /><br />9. &nbsp;&nbsp;&nbsp;Keep up with the latest scams and social engineering trends<br /><br />This is easier said than done, but a little caution and awareness can go a long way in making sure you don't fall for online ploys, which are becoming increasingly targeted and believable. Here at Lavasoft, we have a number of resources available for you to turn to in order to make the process quicker and easier: read easy-to-understand safety tips in the Lavasoft Security Center, check the Lavasoft company blog and Malware Labs blog for your daily dose of security news, and follow Lavasoft on Facebook or Twitter to stay up-to-date on online issues.<br /><br />10. &nbsp;&nbsp;&nbsp;Have basic security software in place and keep it up-to-date<br /><br />Protecting your PC with anti-virus, anti-spyware and a firewall (and making sure the software is always up-to-date) is critical in keeping safe from malware and online scams. &nbsp;Also make sure that your computer is up-to-date with the latest security patches.<br /></span></p></div>]]></description>
			<pubDate>Thu, 04 Apr 2013 10:13:12 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=9oa0t5h9</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/9oa0t5h9</guid>
		</item>
		<item>
			<title><![CDATA[Lets Spring Clean our Computers]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=General"><![CDATA[General]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_qnj5a28t"><p style="text-align: left;"><span class="cf3 ff1 fs20">It's</span><span class="ff1 fs20"> springtime! It's the familiar time to tackle the grime that's built up in our homes over the winter months. You may know all the tricks when it comes to scrubbing, polishing, and organizing your house. Confused when it comes to your PC? Freshen up your computer with our roundup of 11 time-tested cleaning tricks, on the inside and out.<br /><br />There are two aspects to thoroughly clean you PC: There's the physical cleaning, or manually cleaning actual gunk out of your computer, and the digital cleaning, or using tools to get the Windows operating system back in fighting shape after gaining all that holiday weight.<br /><br />On the Outside (Physical Cleaning)<br />Tackle cleaning the outside of your PC by taking a look at these four main areas, below. (Remember, to be safe, turn off and unplug your computer before cleaning).<br /><br />1. &nbsp;&nbsp;&nbsp;Your desktop - First and foremost, dust your desktop and workplace area. It's important to do this on a regular basis to keep grime from clogging the air vents behind your PC.<br /><br />2. &nbsp;&nbsp;&nbsp;Your monitor - Use a soft cloth and monitor cleaning spray to remove buildup.<br /><br />3. &nbsp;&nbsp;&nbsp;Your keyboard - Gently turn your keyboard upside down and let loose any dust, crumbs and grime that may have fallen between keys. Use a cotton swab or compressed air for additional cleanup between the keys.<br /><br />4. &nbsp;&nbsp;&nbsp;Your mouse - Clean the top and bottom of your mouse with a soft cloth, and the inner components with a cotton swab. (Some PC pros recommend slightly dampening your cloth with rubbing alcohol for added cleanliness. If you go this route, be sure not to over-saturate and to thoroughly dry before replacing the mouse cover or components.)<br /><br />On the Inside (Digital Cleaning)<br />The steps necessary to put a shine on the inner workings of your computer. Whether you’re using a laptop or a desktop PC, here are the main cleaning tips we recommend:<br /><br />5. &nbsp;&nbsp;&nbsp;Back up all your important data. The last thing you want is to accidentally delete your family photos or the projects you’ve worked so hard on. You could use a program that syncs files with other computers or save them on external hard disks, but the safest way to store your data is on a safe online drive.<br /><br />6. &nbsp;&nbsp;&nbsp;Update with the latest patches. Check the status of your operating system, security software, and all other applications that you use to ensure that you're up-to-date. To be in top shape, your computer needs an updated operating system and fully patched programs. It’s not just about performance and speed. It’s about computer security, too. Outdated programs are responsible for vulnerabilities and secret entryways into your system, all of which can be used by hackers and malware to compromise your internet security. You can get these critical patches and updates from the manufacturer’s website yourself. Or you can save time and effort by having a piece of software known as a vulnerability scanner that automatically detects outdated programs and points you to the necessary updates. Some internet security suites come with this time-saving tool.<br /><br />7. Get rid of the clutter in your system. Start with the most visible places – your desktop and the system tray or taskbar in the bottom right corner. You’ve probably gathered a whole collection of files, photos and MP3s on your desktop, but do you really need them there? Take your time and neatly arrange them into specialized folders. And what about the small icons you see in your taskbar? They all start up when you turn on your computer and that takes time and resources. A simple right-click will remove or turn off the ones you don’t actually need on a daily basis.<br /><br />8. Remove the programs you don’t use. Old programs always seem to find a comfy spot in your system to relax after you’ve forgotten about them. The rule here is “Trash whatever you haven’t used in over a year”. Otherwise, you’re just wasting space and slowing down your work. &nbsp;Deleting the files won’t do it, though. You need to uninstall them from the Control Panel or using their own uninstall kit.<br /><br />9. Reorganize your hard drive. The information you use on your computer every day gets stored onto the hard drive in bits and pieces, wherever it can find a place. This saves valuable time on given tasks, but it does have long-term consequences. When the information gets too disorganized, your computer has to work overtime to find it. You can put back the order in your hard drive by using the defrag tool that comes with your operating system (Start &gt; All Programs &gt; Accessories &gt; System Tools &gt; Disk Defragmenter).<br /><br />10. Update your software. To be in top shape, your computer needs an updated operating system and fully patched programs. Software is never actually “finished”, but continuously improved and patched. No program is perfect, so providers work hard even after they’ve sold it to you. And it’s not just about performance and speed. It’s about computer security, too. Outdated programs are responsible for vulnerabilities and secret entryways into your system, all of which can be used by hackers and malware to compromise your internet security. You can get these critical patches and updates from the manufacturer’s website yourself. Or you can save time and effort by having a piece of software known as a vulnerability scanner that automatically detects outdated programs and points you to the necessary updates. Some internet security suites come with this time-saving tool.<br /><br />11. Clear your cache of temporary files. Every browsing session leaves behind small files in your Temporary Internet Files folder. So you can imagine how, over time, a huge collection of such items can affect your browsing speed and reduce the free space on your hard drive. You can get rid of them directly from your web browser or you can leave this task to a special tune up tool that comes with some internet security programs.<br /><br />Happy spring cleaning!<br /></span></p></div>]]></description>
			<pubDate>Thu, 04 Apr 2013 10:11:51 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=qnj5a28t</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/qnj5a28t</guid>
		</item>
		<item>
			<title><![CDATA[8 Things You Can Do to Protect Yourself Against Fraud]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=Security_Issues"><![CDATA[Security Issues]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_2r50rkrg"><p style="text-align: justify;"><span class="ff1 fs20">Fraud can happen to anyone, anywhere and anytime. Chances are you have received a few fraudulent emails, ambiguous phone calls, encountered fake online ads, questionable posts on social networking sites or maybe someone has come knocking at your door? Avoid becoming a victim! March is International Fraud Prevention Month and is a good time to practice new strategies.<br /><br />Here are 8 things you can do this month to help protect yourself and others:<br /><br /><b>1. Brush up on common scams and warning signs</b></span><span class="ff1 fs20"><br />There are different types of scams around us. The list goes on, it gets longer every year and the schemes themselves get more sophisticated. Experts still say your best bet for avoiding them is to be aware of the tactics and the red flags. Go to websites like Scambusters.org to track the latest scams and tips for prevention.<br /><br /><b>2. Keep personal information confidential</b></span><span class="ff1 fs20"><br />Don’t give out personal information over the phone, through email or over the Internet unless you initiated the contact and know who you’re dealing with. Don’t include personal information like credit card details in regular, unencrypted email or enter it on an unencrypted website as your information won’t be secure.<br /><br /><b>3. Change your passwords and PINs</b></span><span class="ff1 fs20"><br />When was the last time you changed the PIN on your debit card or the password for online banking? Make it a point to give your access information an update this month<br />We know it can be hard to keep track of all those passwords and PINs, but experts recommend changing them at least twice a year, even if your accounts haven’t been compromised. Be sure to skip obvious choices like “password” or “1234″ and avoid using names, words and dates that someone could guess. Throw in a few numbers and symbols too for the strongest passwords.<br /><br /><b>4. Order your credit reports</b></span><span class="ff1 fs20"><br />Already keeping tabs on your financial statements? That’s a good start since they are often the first place people spot unauthorized activity. Unfortunately, if someone is using your information to commit identity fraud like taking out a loan or applying for credit cards, it won’t necessarily show up on your financial statements. &nbsp;</span><span class="ff1 fs20">That’s why experts recommend another important check: your credit report. Experts say we should order one at least once a year to make sure the information is correct and there’s no unusual activity.<br /><br /><b>5. Shred unneeded documents</b></span><span class="ff1 fs20"><br />Experts warn that any document containing sensitive data should go through the paper shredder before it hits the recycling bin. That includes items like receipts, bank statements, old tax returns and even junk mail containing your address, like credit card preapprovals. Get a jump start on spring cleaning this March and safely get rid of the paper clutter around your home. But before you get shredder happy, make sure you know how long you need to keep certain items.<br /><br /><b>6. Watch out for unusual transactions</b></span><span class="ff1 fs20"><br />Be wary of unexpected offers or requests that are too good to be true such as “you’ve inherited a large sum of money but in order to claim it, send us a deposit first”. You should also never agree to conduct financial transactions on behalf of strangers.<br /><br /><b>7. Talk to your loved ones about fraud</b></span><span class="ff1 fs20"><br />Scammers will target anyone regardless of their age or social status, and even well-educated people have been caught. However, experts warn that &nbsp;some groups like seniors, children and teens are generally more vulnerable to certain kinds of fraud. The solution? Talk to your family members and friends about fraud and how to avoid it. You may also want to come up with strategies that everyone in your household can follow. An important part of this dialogue should also be letting your loved ones know they can talk about any problems they encounter. Experts warn many victims are too embarrassed to talk about what happened, and crooks may repeatedly target them following that initial success.<br /><br /><b>8. Report it</b></span><span class="ff1 fs20"><br />If you’re caught, report it. Unfortunately not all victims of fraud get justice, but reporting the crime to the police helps in other ways too. It allows the authorities to keep tabs on the threats and warn others, for instance. Often, those warnings we see in the news are a result of someone reporting the crime. Depending on the type of fraud, you’ll also need to notify other organizations to stop further crimes. For instance, if you’re caught by identity theft, you should contact the credit-reporting bureaus, your financial institutions and any agency that issues identification (like your driver’s licence or passport). Criminals don’t just use your information once — they can make a tidy profit selling it.</span><span class="ff0 fs20"><br /></span></p></div>]]></description>
			<pubDate>Tue, 05 Mar 2013 09:20:31 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=2r50rkrg</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/2r50rkrg</guid>
		</item>
		<item>
			<title><![CDATA[Will Facebook Remain Relevant?]]></title>
			<author><![CDATA[John Jantsch]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=General"><![CDATA[General]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_y76c642d"><p style="text-align: left;"><span class="ff1 fs20">With over a billion users, a place in the everyday life of over 60% of Internet users and a track record as one of the fastest growing companies in history, the title of this post may seem odd.<br /><br />But, like every white-hot phenomenon, Facebook must continue to evolve to remain relevant in the lives of those that built it. There are already signs that people are growing weary of the behavior the social network fostered.<br /><br />The Facebook generation is growing up and the next wave of high school and college age folks don’t think it’s all that cool. Vine and Instagram seem so much hipper right now.<br /><br />So, is the future of Facebook a sure one?<br /><br />My guest for today’s episode of the Duct Tape Podcast thinks Facebook has something that other companies lack – a leader with a long-term vision.<br /><br />In Think Like Zuck: The Five Business Secrets of Facebook’s Improbably Brilliant CEO Mark Zuckerberg, social media innovator at Intel, Ekaterina Walter outlines how 19-year-old Mark Zuckerberg revolutionized the Internet and why he may continue to do so.<br /><br />Walter contends that Zuckerberg possesses the traits that have driven other leaders such as Bill Gates, Steve Jobs, and Jeff Bezos, to create innovation and breakthroughs over and over again.<br /><br />Most notably she stresses Zuckerberg’s uncanny long view. In the face of mounting pressures to produce profit for shareholders, a place on the world leadership stage and constant criticism for decisions on innovation and privacy, Zuckerberg has remained passionate about the long-term path for Facebook and that, Walters suggests, is why she would not bet against Facebook.<br /><br />Throughout Think Like Zuck Walters illustrates the nature of five traits that are shared by brilliant leaders and signal the healthy traits of any leader.<br /><br />The five traits or P’s are:<br /><br /> &nbsp;&nbsp;&nbsp;Passion — Keep your energy and commitment fully charged by pursuing something you believe in.<br /> &nbsp;&nbsp;&nbsp;Purpose — Don’t just create a great product, drive a meaningful movement.<br /> &nbsp;&nbsp;&nbsp;People — Build powerful teams that can execute your vision.<br /> &nbsp;&nbsp;&nbsp;Product — Create a product that is innovative, that breaks all the rules, that changes everything.<br /> &nbsp;&nbsp;&nbsp;Partnerships — Build powerful partnerships with people who fuel imagination and energize execution.<br /><br />It’s funny how many recent works, including my last book, The Commitment Engine, have explored the relevancy of things like passion and purpose in business.<br /><br />There is little denying the impact these traits bring to the story and culture of a business and, love the idea or hate it, Mark Zuckerberg is a shining example of what it takes.</span><span class="ff0 fs20"><br /></span></p></div>]]></description>
			<pubDate>Mon, 11 Feb 2013 18:01:10 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=y76c642d</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/y76c642d</guid>
		</item>
		<item>
			<title><![CDATA[Love is in the Air ............Or is it?]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=Security_Issues"><![CDATA[Security Issues]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_j5plz9y4"><p style="text-align: left;"><span class="ff1 fs20">Valentine’s Day is typically a day when couples rejoice their everlasting love for each other while single people mock and pretend that it is just another normal day.<br /><br />Scam artists and cybercriminals are looking to turn romance into profit and are out to trick the love fools and the love skeptics alike, with a range of devilish scams, rip-offs and tricks to get their hands of your personal information. Now that Valentine's Day is fast approaching, they are possibly taking over your computer in the process.<br />We all know that social media is jam-packed with scams but these seasonal scams tend to be disregarded because they normally get hidden underneath the madness. Valentine’s Day scams are often associated with ambiguous e-cards and shady URLs. Since cybercriminals are constantly trying to find loopholes or vulnerabilities to exploit, and new threats are emerging every day on the web. They are definitely getting more and more creative.<br /><br />A recent report from the Internet Crime Complaint Center (IC3) reinforces the fact that people looking for love online need to remain vigilant about who they choose to communicate with and how they do so. There have been circumstances where people have been victimized from the online dating scams. Typically, it would start off when singles are usually contacted online by someone (scammers in this case) who appears to be interested in them.<br /><br />The scammers will continue an online relationship for months. Once they have gained the victim's trust they will begin asking for money. They will play on every sympathy possible, to get the target to dig into their pocket book. As most of the profiles claim to be from underdeveloped or war torn countries they will use guilt as a means to pick the victim’s pocket.<br /><br />In order to protect yourself against online dating scams, always remember not to fall for a person who claims to be in love with you at first sight. Scammers usually use emotional ties to increase the chances of getting your money. Also, be very careful about giving out personal information to someone you have met online. It could be ANYONE posing as someone else.<br /><br />The Better Business Bureau recently published an article which elaborates more on such scams. Someone who pretends to be someone they’re not, using social media or online dating websites is known in the urban dictionary as a “catfish,” and their activities are referred to as, “catfishing.” Or “catphishing” spelled with a ‘ph’ as a nod to classic phishing scams. Catfish (or catphish) are looking for romantic attention, personal information and/or financial support by way of deception. They put a lot of time and effort into building a fake persona and relationship with their victim(s).<br /><br />Here are some other examples of the threats that are expected to surface during Valentine’s Day this year.<br /><b><br />Valentine’s-themed spam mails or banners.</b></span><span class="ff1 fs20"><br /><br />Be careful of which links you click today, spammers will target those who've left their gift-buying until the last minute. Only pay for a gift online when you know and trust the source or well-known retailers or otherwise your credit card details could fall prey to scammers.<br /><br /><b>Watch that V-Day e-cards.<br /></b></span><span class="ff1 fs20"><br />So, someone does love you after all, and they've sent you a nice card. Or have they? It could actually be a phishing attempt to steal your information or infect your computer with spyware. Remember to only open those emails sent by people whom you trust. Ignore those secret admirer messages!!!!<br /><br /><b>Unsafe search.</b></span><span class="ff1 fs20"><br /><br />Desperately looking for a last minute gift? Be wary of online offers for typically Valentines-y gifts that seem too good to be true. They most likely are. Gold prices are going through the roof at the moment, thanks the global maelstrom of financial events, so be wary of anyone offering a crazy deal.<br /><br /><b>Lovely malware.</b></span><span class="ff1 fs20"><br /><br />Tempted to download a sweet cupid-themed video, wallpaper, song, or a Valentine’s Day Facebook profile theme? Be wary. Scammers prey on the soppy-hearted, due, as previously mentioned to their dark hearts made of shattered dreams. That cute little download could pack a nasty bit of malware.<br /><br />One of the easiest ways to avoid such heartache and safe from all these hysterias is by making sure that your computer is protected with the newest version antivirus/antimalware software. </span><span class="ff0 fs20"><br /></span></p></div>]]></description>
			<pubDate>Thu, 07 Feb 2013 09:32:56 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=j5plz9y4</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/j5plz9y4</guid>
		</item>
		<item>
			<title><![CDATA[Pros and cons of shopping online]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=General"><![CDATA[General]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_0938083t"><p style="text-align: left;"><span class="ff1 fs20">Pros<br /><br />• If you live in remote areas or are unable to shop in the traditional manner, online shopping can open up new opportunities.<br />• Product selection may be greater than in a traditional store.<br />• You can research a product that you are interested in, find the price, the availability, and if you choose, purchase the item online. &nbsp;You also can choose to use your research to purchase at a local store.<br />• The Internet is always open: 24 hours a day, seven days a week.<br /><br />Cons<br /><br />• There are thousands more choices available online than you would find in your local stores, </span><span class="ff1 fs20">which can be confusing.<br />• You can spend hours online searching through page after page and still not find what you<br />are looking for.<br />• Shopping online includes seeing the product, which means waiting for images to load. Even </span><span class="ff1 fs20">with a fast modem, this can be a time consuming process. <br />• Prices may not be better than from a traditional store. (Watch for shipping costs above the </span><span class="ff1 fs20">quoted price.)<br /><br />Cookies<br /><br />Cookies are bits of information that your browser picks up at Web sites and stores on your hard drive. A cookie often functions as a small digital ID badge. Cookies can be used to track your browsing patterns and allow Web sites to target advertising based on these patterns. Cookies cannot carry viruses. They cannot snoop around your hard drive and gather information about you. They can store information you have provided so the site can be customized for you the next time you visit.<br /><br /> <br />Protecting Your Privacy<br /><br />Harris Interactive reports that 50 percent of online users in the U.S. feel that they do not have the control they want over how personal information is collected and used by companies.<br />• Look for the security symbol before giving personal information.<br />• Provide personal information only if you know who’s collecting it, why, and how it will be used (including if the information will be shared with others)<br />• Check out the company’s Privacy Statement for your choices about the information you are providing them. Can you opt-out of any information gathering?<br />• Look for an explanation of how your financial and personal information is safeguarded when it is sent and when the information is stored at the company<br /><br />Tips for paying online<br /><br />• Start small.<br />• Use a separate credit or charge card.<br />• Keep a printed record of your purchase.<br /><br />Beware of stock fraud<br /><br />Scam artists are using e-mail to manipulate stock prices. In one approach, individuals promote the stock via e-mail and then sell after the price has risen. In another approach, individuals distribute false information to depress the price and sell the stock short.<br /><br />Online auctions<br /><br />A Harris Interactive survey states that more than 35 million Americans shopped at online auctions in 2000 and 41 percent of those surveyed experienced problems with their online auction purchase. &nbsp;This doesn’t mean you shouldn’t buy and sell at an online auction. Instead, follow these simple rules<br />• Understand how the auction works<br />• Check out the seller (is it an individual or business, are they located in the U.S. or in another country?)<br />• Get a physical address and other identifying information<br />• Ask about delivery, returns, warranties, and service<br />• Be wary of claims about collectibles<br />• Use common sense to guide you<br />• Pay the safest way (avoid cash; pay with a credit card if possible)<br />• Consider using an Escrow Service to hold your money<br />• Let the auction site know if you have a problem and also report any suspected fraud to the Internet Fraud Watch (www. fraud.org/info/repoform.htm &nbsp;The Internet Fraud Watch has a web site on tips to protect yourself from Online auction fraud located at http://www.fraud.org/internet/ inttip/aucttip.htm<br /><br />Shopping from home<br /><br /></span><span class="ff1 fs20">You can buy most goods and services from your own home in lots of ways such as using the internet, over the phone, on TV shopping channels, on your doorstep or from a catalogue. In all these situations you may not be in a shop - but you are still a consumer, and you have rights.<br />Specific rules apply if you are buying online or buying goods or services on your doorstep. These rules are in addition to your consumer rights.<br /><br /></span><span class="ff1 fs20">Distance selling<br />Unlike in a shop, when you buy something from home, there is a distance between you and the seller. This type of selling is called &quot;distance selling&quot; and there are EU rules on how distance selling works. These rules are additional benefits to your consumer rights when buying goods and help balance out some of the disadvantages of shopping at a distance. <br />So, if you order goods from home and they are faulty, the same rights apply as if you had bought them in a shop. Or if the seller gives you a false or misleading description of something, you may also be entitled to a refund.<br /><br /></span><span class="ff1 fs20">Most ways to shop from home fall under the distance selling rules, such as ordering an item over the phone, buying from a mail order catalogue or buying from a TV shopping channel.<br />When you agree to buy something through distance selling, you have a ‘distance contract’ with the seller. Before you complete the purchase, the seller must give you specific information in a clear manner:<br />• The identity of the supplier and their address<br />• A description of what you are buying<br />• The price, including any taxes<br />• The delivery costs if any<br />• The arrangements for payment and delivery<br />• Details of how to cancel the order, &nbsp;if this applies<br />• The cost of ordering by distance selling, where the cost is not already known to you – for example, the cost of a premium rate phone call if you have to order this way<br />• How long the offer or price remains valid for<br />• The minimum length of the contract, if it is on an ongoing basis, for example, a digital TV subscription.<br />Also, you should be given more information either before your order is delivered, or when it is delivered, including:<br />• Confirmation of your order in a ‘durable form’, for example letter, email or fax, that includes the information listed above<br />• Written information on how to cancel<br />• A geographical address where you can send complaints to – not a PO box number<br />• Details of any guarantees or after-sales services<br />• Details of how and when to end a contract, if there is no end date or if it lasts for longer than a year<br />These distance selling rules do not apply to:<br />• Financial services, like banking or insurance <br />• Items bought using a public payphone<br />• Auctions where the seller is another consumer <br /><br /></span><span class="ff1 fs20">The 'cooling off' period<br />When you buy an item &nbsp;by phone or catalogue you are given a &quot;'cooling off; period of at least seven working days starting from the date you received your purchase. Before the end of the seven days you must decide if you want to keep the goods, or cancel the order and return the goods and get a refund.<br /><br /></span><span class="ff1 fs20">During this cooling off period you don't have to give a reason for returning the goods. But remember, if you cancel in this way rather than returning faulty goods, you may have to pay for the cost of returning the item.<br /><br /></span><span class="ff1 fs20">The 7 working days can be extended to a maximum of three months if the seller fails to give you the information required under Distance Selling Rules.<br /><br /></span><span class="ff1 fs20">Things not covered by the 'cooling off' period<br />Your right to cancel does not apply to certain types of goods and services:<br />• Customised or perishable goods, for example, a football shirt with your name printed on it<br />• Newspapers, magazines or periodicals<br />• Audio or video recordings which has been unsealed or used by the consumer<br />• Computer software which has been unsealed or used by the consumer<br />• Gaming or lottery services<br />• Services which have begun with your consent before the end of the cooling-off period<br />• Goods or services where the price is determined by price fluctuations on the financial market which are not controlled by the supplier<br /><br /></span><span class="ff1 fs20">'Substitute' goods<br />If you order something and it is not available, the supplier must let you know and refund you within 30 days. A supplier can give you a 'substitute' equivalent product if they don’t have what you ordered originally, but only if you agreed to this in the contract - so read the terms and conditions carefully. If you are not happy with the substitute goods, you can return them.<br /><br /></span><span class="ff1 fs20">Faulty goods &amp; refunds<br />If you buy something through distance selling and it turn out to be faulty, then generally your consumer rights are the same as if you bought it in a shop.<br />If what you bought is damaged or faulty in any way you should complain to the seller in writing immediately - by email, fax or letter - and ask for a refund or replacement. If you have to return an item because it is faulty, the seller is liable for any return shipping costs.<br /><br /></span><span class="ff1 fs20">If the refund is not provided within 30 days of cancellation and you paid for the goods using a credit or debit card, your card provider may agree to reverse the transaction. This is called a chargeback. Contact your provider (the bank or credit card company who issued the card) immediately and give them details of your transaction.<br /><br /></span><span class="ff1 fs20">Customs and excise<br />You legally have to pay import charges like customs or excise duties on items you buy from outside the EU. But you can import consignments of most goods not exceeding a value of €22 from outside the EU without having to pay import charges. Excise duty is also due on alcohol, tobacco, perfume and certain other products imported from the EU.<br />Value Added Tax (VAT) must also be paid on imported items at the same rate that applies in Ireland for similar goods.<br /><br /></span><span class="ff0 fs20"><br /></span></p></div>]]></description>
			<pubDate>Tue, 08 Jan 2013 17:45:05 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=0938083t</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/0938083t</guid>
		</item>
		<item>
			<title><![CDATA[11 myths of business growth debunked]]></title>
			<author><![CDATA[Robert Craven]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=General"><![CDATA[General]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_r2mgz9b4"><p style="text-align: justify;"><span class="ff2 cf0 fs24">I love the myths that seem to manifest themselves in the small business community. Potentially there is a whole book of myths that have been propagated, promoted and sold to a relatively innocent yet willing audience of wannabe millionaires. Dare I say, lambs to the slaughter!<br /><br /><b>&quot;Get rich quick&quot;</b><br />I have never come across a real 'get rich quick scheme', one that actually delivers on its promise. I know they exist in name but they just don't do what it says on the tin! If they were that good then why would you be privy to the special knowledge (most of which is actually freely available on the internet, if you know where to look!). I suspect they just want your paltry fee. The get rich quick scheme ironically has you as the victim. Just think what 100 people paying the so-called guru &#163;10,000 creates (not for you but) for the guru. So, tell me, who does get rich quick?<br /><br /><b>&quot;It's a bit like MLM or pyramid selling but I’ll be OK because I’m in early&quot;</b><br />I am a pretty optimistic person but the number of people showing me &quot;photos of big houses and the Ferrari that Fred who got in early now owns&quot; who subsequently write and complain that they have &quot;made no money quite yet&quot;makes me wonder who is making the money. Again, like get rich quick, Fred will have taken &#163;100 or &#163;1,000 from 100 people etc etc. Just do the sums. And I am sure that the product is a world-beating multi-use, environmentally friendly blah, blah, blah... They always are.<br /><br /><b>Too good to be true</b><br />See the two above. As my mother always says: &quot;If it looks like it is too good to be true, then it probably is.&quot;<br /><br /><b>Talent = success</b><br />Look around yourself at the next meeting. Ever wonder why people who are seriously more stupid are doing so well despite you having all that education and training? Well, success does not go hand-in-hand with talent. Some people just understand how to make money (Jack the Lads) and some people simply put in the hard hours that eventually pay off. Intelligence is not enough. <br /><br /><b>Success = money</b><br />As the joke goes: &quot;If you want to know what God thinks of money then look at who he gives it to.&quot; Seriously, there is not a graph that equates more happiness with more money. In fact, quite the reverse. Money may be a simple metric but it does not reflect success or happiness; it simply reflects your ability to inherit or make or keep it. Not the same as happiness at all.<br /><br /><b>The secret – the Law of Attraction</b><br />Why would obsessively focusing on something make it actually happen? Yes, have a vision and a dream. Yes, become single-minded and focused on it. Yes, envision working towards it and seeing it happen before your eyes. However, wake up and smell the coffee: now you need to take action to make it happen. The key words are YOU and TAKE ACTION. Belief is belief but action is action!!!! And results speak for themselves. <br /><br />Create a niche, Google ads, squeeze pages, videos, testimonials and automate...<br />&quot;But I joined the programme, paid my &#163;10,000 then we created the niche, ran the Google ads, sent people to the squeeze page, showed them the videos and testimonials, sent them the long double-money-back guarantee letters, automated the heck out of it and yet... and yet we have only had 53 views...&quot; Again, perfectly respectable and earnest wannabe entrepreneurs fall for the marketing pitch of people who are great at selling what they sell and show you their secret. Please, despite the weasel words and snake oil, the basics always have to be in place: great product, an appetite to buy, great, compelling marketing, right time, right place.<br /><br /><b>Social media works</b><br />Sometimes! Show me the money!<br /><br /><b>Networking really works</b><br />Sometimes! Show me the money!<br /><br /><b>Create a money-machine – enjoy a four-hour work week</b><br />Yes, you can automate and monetise every process but the idea of a four-hour-workweek is a marketing creation – it doesn't mean one actually lives it! It is simply something to aspire to or work towards...<br /><br /><b>A world without myths?</b><br />I am afraid that for 99.9% of the population the normal laws of money and physics apply: you know, inputs/outputs, cause/effect, supply/demand. <br /><br />There are no magic bullets, no short-cuts, no universal solutions, no real secrets. There's just a lot of common sense and tried and tested methods and approaches that will work over time. The trick is to weed out the woo-woo mumbo-jumbo from what actually works. And what will work for you.<br /><br />Create a product or service that people want or need, that solves a problem, hurt, itch or complaint, that has a defined and accessible customer base. You need to demonstrate your overt benefit, the real reason to believe that you will deliver and why you are different. You also need to deliver remarkable legendary service, &nbsp;be prepared to pivot if things aren't working, be bold, move fast, be decisive, be prepared to fail (a bit) and enjoy the journey!<br /><br />Of course, there are some short cuts and cunning ways to speed up and fast-track the process. Of course, some been-there-done-it people can help you achieve more and faster and avoid the pitfalls and classic early/first-time errors. Just be realistic.</span><span class="ff0 fs20"><br /></span></p></div>]]></description>
			<pubDate>Wed, 19 Dec 2012 11:49:03 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=r2mgz9b4</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/r2mgz9b4</guid>
		</item>
		<item>
			<title><![CDATA[Christmas Online Shopping Tips And Tactics]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=Security_Issues"><![CDATA[Security Issues]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_v496n673"><p style="text-align: left;"><span class="ff1 fs20">You already know that there are numerous scams circulating around during this holiday season, now it’s time for you to stay safe and protect your computer as you browse and buy on the Web. Lavasoft has compiled the ultimate Christmas online shopping tip list, just for you....<br /><br /><b>Avoid Phishing Attacks</b></span><span class="ff1 fs20"><br />Before typing your username and password to enter a site, make sure the website address is correct. Do not click on links from e-mails you receive. Microsoft acknowledged in October that over 10,000 Live Hotmail accounts were compromised by a phishing scam.<br /><br /><b>Don’t Trust “Scareware”<br /></b></span><span class="ff1 fs20">Do not click on advertisements claiming you might be infected with a virus. Rogue ads recently started popping up on sites like The New York Times that purport you have a virus only to trick you into downloading malware. Rely on your system anti-virus for this.<br /><br /><b>Beware Who You Friend<br /></b></span><span class="ff1 fs20">Fake profiles have become very popular on social networking sites like Facebook. Holiday time is an excuse for people to purport they want to get back in touch. Protect the privacy of your profile by rejecting anyone you do not know. Do not post your full birth date including the year.<br /><br /><b>Don’t Shop Using Public Computers<br /></b></span><span class="ff1 fs20">If buying something online, use your own computer. Don’t use public computers while on vacation at hotels or airports. Public computers can have keyloggers that record your information as you type it.<br /><br /><b>Create Complex Passwords<br /></b></span><span class="ff1 fs20">When creating passwords at stores, use upper and lower case with numbers. Use at least seven characters and don’t choose a word from a dictionary. Passwords can be guessed very quickly by hacker programs. If you need help remembering all your different passwords, use a Password Vault or Manager to secure them all.<br /><br /><b>Always Update Definitions<br /></b></span><span class="ff1 fs20">Anti-malware programs such as anti-virus or anti-spyware can only detect malware for which they have definitions. Download the latest definitions whenever they are available to prevent brand new attacks.<br /><br /><b>Install Latest Software Upgrades<br /></b></span><span class="ff1 fs20">Upgrade your operating system, web browsers, and media applications with the latest versions. Hackers are always looking for ways to create new holes in existing software so they can steal your data. Software vendors patch these holes with upgrades. A recent banking Trojan stole money after infecting web browsers.<br /><br /><b>Don’t Give Personal Information Over Live Chat<br /></b></span><span class="ff1 fs20">When shopping online you might see a Live Chat window appear letting you ask questions to a customer representative. Never give them your credit card number or other personal details.<br /><br /><b>Use Onetime Credit Cards<br /></b></span><span class="ff1 fs20">If you aren’t familiar with a store, use a virtual credit card that expires after one use. Some websites masquerade as shops but really just steal your credit card numbers. <br /><br /><b>Protect Your Identity<br /></b></span><span class="ff1 fs20">Do not keep unprotected copies of your identity on your computer. Most people have typed their Social Security Number into an application or credit card number into an e-mail but forgot it was saved in their computer. Use Identity Finder Free or manually search your computer to find and protect anything that could be used to commit identity fraud if seen by a hacker.<br /><br />Remember to always stay secure and a step ahead of the cyber criminals this holiday season!<br /></span><span class="ff0 fs20"><br /></span></p></div>]]></description>
			<pubDate>Wed, 05 Dec 2012 20:23:44 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=v496n673</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/v496n673</guid>
		</item>
		<item>
			<title><![CDATA[Beware… The 12 Christmas Online Scams]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=Security_Issues"><![CDATA[Security Issues]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_pg92r75l"><p style="text-align: left;"><span class="fs20"><span class="ff1 cf0"><br /></span></span><span class="ff1 fs20"><br />As the holiday shopping season approaches, cybercriminals are readying their scam list and checking it twice. And this year, no platform is off limits.<br /><br />Cybercriminals save their best schemes for the holidays, they say, dressing online scams to steal personal information and money in festive, seasonal wrapping. There are likely to be more online scam victims during those busy shopping and travelling December days than at any other time during the year.<br /><br />According to new study conducted by Harris Interactive and McAfee, about 70% of U.S. consumers plan to shop online during the holidays and one in four will shop on a mobile device. This presents a huge opportunity for cybercriminals to lure unsuspecting victims.<br /><br />McAfee has put together a list detailing the 12 Christmas online scams that will be most prevalent this holiday season.<br /><br /><b>1. &nbsp;&nbsp;&nbsp;Social media scams</b></span><span class="ff1 fs20"><br />Cybercriminals know social media networks are a good place to catch you off guard because we’re all “friends,” right? Scammers use channels, like Facebook and Twitter, just like email and websites to scam consumers during the holidays. Be careful when clicking or liking posts, while taking advantage of raffle contests, and fan page deals that you get from your “friends” that advertise the hottest Holiday gifts, installing apps to receive discounts, and your friends’ accounts being hacked and sending out fake alerts. Twitter ads and special discounts utilize blind, shortened links, many of which could easily be malicious.<br /><br /><b>2. &nbsp;&nbsp;&nbsp;Malicious Mobile Apps</b></span><span class="ff1 fs20"><br />As smartphone users we are app crazy, downloading over 25 billion apps for Android devices alone! But as the popularity of applications has grown, so have the chances that you could download a malicious application designed to steal your information or even send out premium-rate text messages without your knowledge.<br /><br /><b>3. &nbsp;&nbsp;&nbsp;Travel Scams</b></span><span class="ff1 fs20"><br />Before you book your flight or hotel to head home to see your loved ones for the holidays, keep in mind that the scammers are looking to hook you with too-good-to-be-true deals. Phony travel webpages, sometimes using your preferred company, with beautiful pictures and rock-bottom prices are used to get you to hand over your financial details.<br /><br /><b>4. &nbsp;&nbsp;&nbsp;Holiday Spam/Phishing</b></span><span class="ff1 fs20"><br />Soon many of these spam emails will take on holiday themes. Cheap Rolex watches and pharmaceuticals may be advertised as the “perfect gift” for that special someone.<br /><br /><b>5. &nbsp;&nbsp;&nbsp;iPhone 5, iPad Mini and other hot holiday gift scams</b></span><span class="ff1 fs20"><br />The kind of excitement and buzz surrounding Apple’s new iPhone 5 or iPad Mini is just what cybercrooks dream of when they plot their scams. They will mention must-have holiday gifts in dangerous links, phony contests (example: “Free iPad”) and phishing emails as a way to grab computer users’ attention to get you to reveal personal information or click on a dangerous link that could download malware onto your machine.<br /><br /><b>6. &nbsp;&nbsp;&nbsp;Skype Message Scare</b></span><span class="ff1 fs20"><br />People around the world will use Skype to connect with loved ones this holiday season, but they should be aware of a new Skype message scam that attempts to infect their machine, and even hold their files for ransom.<br /><br /><b>7. &nbsp;&nbsp;&nbsp;Bogus gift cards</b></span><span class="ff1 fs20"><br />Cybercriminals can't help but want to get in on the action by offering bogus gift cards online. Be wary of buying gift cards from third parties; just imagine how embarrassing it would be to find out that the gift card you gave your mother-in-law was fraudulent!<br /><br /><b>8. &nbsp;&nbsp;&nbsp;Holiday SMiShing</b></span><span class="ff1 fs20"><br /> “SMiSishing” is phishing via text message. Just like with email phishing, the scammer tries to lure you into revealing information or performing an action you normally wouldn’t do by pretending to be a legitimate organization.<br /><br /><b>9. &nbsp;&nbsp;&nbsp;Phony E-tailers</b></span><span class="ff1 fs20"><br />Phony e-commerce sites, that appear real, try to lure you into typing in your credit card number and other personal details, often by promoting great deals. But, after obtaining your money and information, you never receive the merchandise, and your personal information is put at risk.<br /><br /><b>10. &nbsp;&nbsp;&nbsp;Fake charities</b></span><span class="ff1 fs20"><br />This is one of the biggest scams of every holiday season. As we open up our hearts and wallets, the bad guys hope to get in on the giving by sending spam emails advertising fake charities.<br /><br /><b>11. &nbsp;&nbsp;&nbsp;Dangerous e-cards</b></span><span class="ff1 fs20"><br />E-Cards are a popular way to send a quick “thank you” or holiday greeting, but some are malicious and may contain spyware or viruses that download onto your computer once you click on the link to view the greeting.<br /><br /><b>12. &nbsp;&nbsp;&nbsp;Phony classifieds</b></span><span class="ff1 fs20"><br />Online classified sites may be a great place to look for holiday gifts and part-time jobs, but beware of phony offers that ask for too much personal information or ask you to wire funds via Western Union, since these are most likely scams.</span><span class="ff0 fs20"><br /></span></p></div>]]></description>
			<pubDate>Wed, 05 Dec 2012 20:14:58 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=pg92r75l</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/pg92r75l</guid>
		</item>
		<item>
			<title><![CDATA[Four Stepts to Dominating Search Engine Results]]></title>
			<author><![CDATA[Tim Priebe]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=Web"><![CDATA[Web]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_06u1ui40"><p style="text-align: left;"><span class="ff1 fs20">If you are in business, there are potential customers out there using search engines to try to find you.<br /><br />I’m going to give you one major tip with four steps to maximize your search presence.<br /><br />First, let’s talk briefly about some advantages to search engine optimization (SEO). SEO is the process of setting up your site to make it easy for search engines to scan and creating content that brings in your target audience. The end result should be getting people on your website.<br /><br />In 2005, I helped David and Kim, a missionary couple going to Nicaragua, put together a website. The “product” they were selling was themselves and their mission work. I told them to blog regularly to ensure they would stay visible in the rankings. From 2005 until 2009, they blogged several times a month.<br /><br />Although they’ve been back in the States for years, their website is still on the first page of searches for phrases you use when searching for missionaries in Nicaragua. And I didn’t even use any special industry SEO tricks on their site.<br /><br />What does that mean for you? If your website is set up relatively well, you can increase its rankings just by blogging frequently.<br /><br />The following four steps will help maximize the return on your time invested in blogging.<br /><br />1. Set up a Facebook page, a Twitter account and a LinkedIn account.<br /><br />It’s no secret that Facebook, Twitter and LinkedIn rank highly in search engines. While it may take time to set them up initially, it will help you dominate the search engine results. Link these social networks back to your website and people will be able to find you.<br /><br />2. Set up a blog on your website.<br /><br />Your blog needs to be on the same domain as the rest of your website. If not, your website’s search engines rankings will receive zero benefit.<br /><br />3. Set up your blog entries to automatically be pushed out to Facebook, Twitter and LinkedIn.<br /><br />This will help your rankings on every site you have a presence on. I recommend the NetworkedBlogs app on Facebook, twitterfeed.com for Twitter, and the built in RSS field on LinkedIn.<br /><br />4. Blog frequently.<br /><br />This step will take an ongoing commitment. Blogging on a regular basis, preferably weekly, makes a huge difference. Search engines love sites that are updated frequently and are constantly growing.<br /><br />Following these steps will significantly increase your website’s search engine ranking. That’s all David and Kim did. Don’t settle for just having your website listed when your company can dominate the listings!<br /><br />What are you waiting for? Start blogging today so your customers can find you.</span><span class="ff0 fs20"><br /></span></p></div>]]></description>
			<pubDate>Thu, 15 Nov 2012 08:40:51 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=06u1ui40</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/06u1ui40</guid>
		</item>
		<item>
			<title><![CDATA[Set Up Windows Firewall]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=Security_Issues"><![CDATA[Security Issues]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_93jo1k3f"><p style="text-align: left;"><span class="ff1 fs20">When it comes to securing your PC, be sure to enable a firewall. A firewall is used to prevent unwanted connections being made to your PC. Malware, such a worms, can scan a machine to see if certain ports are open and if so will attempt to access your machine via those open ports.<br /><br /><br />Windows comes pre-installed with a basic firewall and while you can’t configure it too much, it’s certainly worthwhile making sure that it’s enabled.<br /><br /><br />Ad-Aware Pro includes a powerful two-way firewall, but if you’re using Ad-Aware Free it’s a good idea to make sure that Windows Firewall is enabled even if you’re behind a router.<br /><br /><br />Once your firewall has been enabled, you can test your systems firewall defenses with ShieldsUp!!, a free scanning tool available at www.grc.com to check that it is secure.<br /><br /><b><span class="imUl">To enable Windows Firewall:<br /><br />Windows 8</span></b></span><span class="ff1 fs20"><br /><br /> &nbsp;&nbsp;&nbsp;Type Firewall at the Start screen and click on Windows Firewall under the Settings results<br /> &nbsp;&nbsp;&nbsp;Click Turn Windows Firewall on or off on the left panel<br /> &nbsp;&nbsp;&nbsp;In both the Private and Public network location settings sections:<br /> &nbsp;&nbsp;&nbsp;Select Turn on Windows Firewall<br /> &nbsp;&nbsp;&nbsp;Check Notify me when Windows Firewall blocks a new app<br /> &nbsp;&nbsp;&nbsp;Click OK<br /><br /> <br /><b><span class="imUl">Windows 7 &amp; Windows Vista</span></b></span><span class="ff1 fs20"><br /><br /> &nbsp;&nbsp;&nbsp;Click Start -&gt; Run -&gt; Type firewall.cpl into the Run command box<br /> &nbsp;&nbsp;&nbsp;Click OK<br /> &nbsp;&nbsp;&nbsp;Click Turn Windows Firewall on or off on the left panel<br /> &nbsp;&nbsp;&nbsp;In both the Private and Public network location settings sections:<br /> &nbsp;&nbsp;&nbsp;Select Turn on Windows Firewall<br /> &nbsp;&nbsp;&nbsp;Check Notify me when Windows Firewall blocks a new app<br /> &nbsp;&nbsp;&nbsp;Click OK<br /><br /> <br /><b><span class="imUl">Windows XP</span></b></span><span class="ff1 fs20"><br /><br /> &nbsp;&nbsp;&nbsp;Click Start -&gt; Run -&gt; Type firewall.cpl into the Run command box<br /> &nbsp;&nbsp;&nbsp;Click OK<br /> &nbsp;&nbsp;&nbsp;Set Windows Firewall to On<br /> &nbsp;&nbsp;&nbsp;Click OK<br /><br /><br /></span></p></div>]]></description>
			<pubDate>Mon, 05 Nov 2012 11:44:40 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=93jo1k3f</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/93jo1k3f</guid>
		</item>
		<item>
			<title><![CDATA[The Big Three Email Nuisances: Spam, Phishing and Spoofing]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=General"><![CDATA[General]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_d1yk0r53"><p style="text-align: left;"><span class="ff1 fs20">We have to admit that cyber criminals and scammers are very artistic and inventive individuals. They seem to always find a way or two in trying to trick computer users into falling to their traps.<br /><br />For most of us, these three terms seem to denote the same thing. However, they are very different from each other. Let’s take a look at their definitions.<br /><br /><b><span class="imUl">Spam</span></b></span><span class="ff1 fs20"><br /><br />Also known as unsolicited bulk e-mail messages or any email messages irrespective of content that is unwanted or unrequested by the recipient. Spam messages are mostly commercial advertising, although chain letters, political mailings and other forms of non-commercial mailings are often included under the same categorization. A large portion of spam has also been found to be comprised of ads for products of dubious quality and services of questionable legality.<br /><br />There are two types of spam: intentional and unintentional.<br /><br /> &nbsp;&nbsp;&nbsp;Intentional spam comes from spammers who are soliciting products or attempting to commit fraud.<br /> &nbsp;&nbsp;&nbsp;Unintentional spam originates from computers that are infected with a virus or worm that activates e-mail distribution processes in the background. The virus or worm attempts to send bulk messages from the infected computer without the awareness of the computer owner.<br /><br /><br /><b><span class="imUl">Phishing</span></b></span><span class="ff1 fs20"><br /><br />Phishing is a special type of spam that is intended to trick you into entering your personal or account information for the purpose of breaching your account and committing identity theft or fraud.<br /><br />Typically, a false e-mail message is delivered to you. The e-mail appears to come from a legitimate source, for example eBay, your bank, government departments etc. The message may contain a legitimate corporation's logo, and appear to be sent from the corporation's e-mail address. The message may ask you to click a link in the message to update your account, or run a software program to upgrade your computer.<br /><br />Although the message looks legitimate, it is really trying to compel you to submit your personal and confidential information, which will be used to steal your credentials. Normally you are asked to enter information such as your name, date of birth, place of birth, social security number, mother's maiden name, bank account number, and bank account PIN. Web sites that are frequently spoofed by phishers include PayPal, eBay, MSN, Yahoo, BestBuy, and America Online.<br /><br /><b><span class="imUl">Spoofing</span></b></span><span class="ff1 fs20"><br /><br />Spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Spoofing is often used by spammers and can be accomplished by changing your &quot;FROM&quot; e-mail address.<br /><br />E-mail spoofing may occur in different forms, but all have a similar result: a user receives email that appears to have originated from one source when it actually was sent from another source. E-mail spoofing is often an attempt to trick the user into making a damaging statement or releasing sensitive information, such as a password. E-mail spammers often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations.<br /><br />To send spoofed e-mail, senders insert commands in headers that will alter message information. It is possible to send a message that appears to be from anyone, anywhere, saying whatever the sender wants it to say. Thus, someone could send spoofed e-mail that appears to be from you with a message that you didn't write.</span><span class="ff0 fs20"><br /></span></p></div>]]></description>
			<pubDate>Mon, 05 Nov 2012 11:42:11 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=d1yk0r53</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/d1yk0r53</guid>
		</item>
		<item>
			<title><![CDATA[10 Tips for successful e-commerce site]]></title>
			<author><![CDATA[Danielle F Attard]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=General"><![CDATA[General]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_bil9gon2"><p style="text-align: left;"><span class="ff1 fs20">Your e-commerce website needs to make the right impression within the first few seconds of a potential customer visiting your e-commerce online store. Otherwise you will have lost the opportunity to convert a web browser into an online customer. So how can you ensure your e-commerce website design will maximize conversions?<br /><br />1. A Successful E-commerce Website Will Provide a Great Customer Experience<br /><br />Providing your website visitors with a positive online customer experience is key to a successful e-commerce website. You need to ensure it is easy for customers to locate the products they want to buy in an intuitive and user-friendly manner.<br /><br />2. A Successful E-commerce Website Will Provide Simple Navigation<br /><br />Website visitors will know where they are on your e-commerce website at all times through the site navigation, breadcrumbs and search filtering mechanism.<br /><br />3. A Successful E-commerce Website Will Clearly Show the Price and Any Savings<br /><br />Everyone wants to feel they are getting value for money. If you are selling products with a discount make sure the savings are shown on your e-commerce website.<br /><br />4. A Successful E-commerce Website Provides a Secure Online Experience<br /><br />Your customers’ security is key. A good e-commerce website will ensure a secure online experience and provide your customers with peace of mind that they can shop in a safe and secure manner.<br /><br />5. A Successful E-commerce Website Keeps Clutter to a Minimum<br /><br />We’ve all seen a website that has so much happening on the page you don’t know where to look. Your e-commerce website design needs to focus your web visitors’ attention on the most important things you want to sell. It is often the less cluttered e-commerce website that is the most successful because it doesn’t overload the visitor with too much information.<br /><br />6. A Successful E-commerce Website Will Show Your Product Availability<br /><br />A customer is more likely to buy a product they know is in-stock. However tempting, failure to display product availability, is likely to result in an unhappy customer who is less likely to return and buy more from you.<br /><br />7. A Successful E-commerce Website has a Visible Basket<br /><br />Many of the leading e-commerce websites provide a quick cart facility. This means your customers can see how many items they’ve added to their basket and the cost of the basket without having to click specifically on the basket page.<br /><br />8. A Successful E-commerce Website Will Maintain a Consistent Design Layout<br /><br />For example, on all pages your website visitors should be able to identify who you are and see a consistent menu structure and search functionality. It is important that your e-commerce website maintains as many consistent elements as possible.<br /><br />9. A Successful E-commerce Website Will Provide Additional Options to the Customer<br /><br />Whether it is product attributes, related products or what other people have bought, a successful e-commerce website will provide customers with other options based on what they have looked at.<br /><br />10. A Successful E-commerce Website Allows for Customers to Share Their Feedback<br /><br />Positive customer feedback and reviews can provide a valuable sales tool to boost online sales through your e-commerce website. In addition to providing feedback ratings and reviews, provide your customers with the ability to share products and wish lists to their social networks.<br /><br />These are just a few ways on how you can create a successful e-commerce website that will maximize online conversions and sales.<br /></span></p></div>]]></description>
			<pubDate>Sat, 13 Oct 2012 08:45:03 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=bil9gon2</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/bil9gon2</guid>
		</item>
		<item>
			<title><![CDATA[How to prevent your PC from becoming a Zombie]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=General"><![CDATA[General]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_xkn39rzf"><p style="text-align: left;"><span class="ff1 fs20">You may know the basic facts on botnets, networks of compromised machines commandeered by hackers. But, are you aware of how to keep your own PC from being affected? Here's a look at specific steps you can take to help ensure that your computer does not end up under the control of cyber criminals.<br /><br />Use anti-virus and anti-spyware software and keep your software updated.<br /><br />Use a firewall and make sure it's properly configured.<br /><br />A firewall provides critical protection to keep your PC safe from unauthorized access. To complement your anti-virus or anti-spyware software, use a user-friendly firewall, like Panda Firewall</span><span class="ff1 fs20">, to monitor and block suspicious traffic that could be a sign of bot compromise.<br /><br />Run regular security updates for your operating system, web browsers, and other applications.<br /><br />Keep all of your applications up-to-date with the latest security patches. It's critical that you run Microsoft Update (update.microsoft.com) to install all of the current Windows patches. You can do this easily by setting your PC to receive automatic security updates.<br /><br />Run different scanners to check for infections, including rootkit revealers. But, always make sure you're using reliable, respected security software.<br /><br />Many computer users like to run a variety of different scanners to help find infections. Keep in mind - you also need to use caution when it comes to the security software you use. Rogue security software is on the rise, attempting to play off of computer user's fears about malware infections to peddle their fraudulent software. Be cautious and ensure the software is legitimate before downloading any programs.<br /><br />Practice safe online behavior - click with care!<br /><br />Be vigilant and use common sense when browsing the Web. You should be especially cautious when checking your e-mail or messages on social networking sites; don't open attachments or click links from unknown senders or in unsolicited messages.<br /><br /></span></p></div>]]></description>
			<pubDate>Wed, 10 Oct 2012 14:03:23 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=xkn39rzf</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/xkn39rzf</guid>
		</item>
		<item>
			<title><![CDATA[Steps to Protect your Technology Products ]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=General"><![CDATA[General]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_fk0"><p style="text-align: left;"><span class="ff0 fs20">We urge all users of laptops and smartphones to take extra precautions as instances of theft are on the rise. The risk of loss associated with identity theft is just too great, and technology users must be extra careful. &nbsp;The following &nbsp;suggestions will be helpful for anyone owning a laptop, smartphone or both.<br /><br />1. If you rely heavily on the use of your smartphone, always be cognizant of your surroundings and aware of everything going on around you. Smartphone theft, particularly I-Phone theft, has risen drastically in the past few months. Especially on mass transit systems, thieves are praying on people to be texting and not paying attention; making it easier for criminals to snatch your phone and take off.<br /><br />2. Never do online banking transactions on unsecure networks or where others can easily read your information over your shoulder.<br /><br />3. Report all instances of theft to law enforcement immediately to help ensure safe return and recovery of your stolen property.<br /><br />4. Never leave a laptop or smartphone unattended in an airport or crowded public area. Walking away for just a second is not smart as criminals can seize your property on a moment's notice.<br /><br />5. Back up all of your important documents and files just in case.<br /><br />6. Carry your laptop with you if doing research in a library. Thefts of laptops in university settings are on the rise as unsuspecting students abandon their workspace in search of reference materials.<br /><br />7. Always lock your car if you plan to leave your computer or phone inside while you shop or visit a restaurant. Thieves often break into cars if they see a laptop on the seat. Make sure it is hidden from plain view.<br /><br />8. Never store sensitive identity-related information on your computer. If you can avoid it, do not store such information on your smartphone either. One swipe by a criminal and you will compromise your identity and credit. Victims have spent months and even years correcting these problems.<br /> &nbsp;&nbsp;&nbsp;<br />9. Always choose unique and non-guessable passwords for all your internet sites and private files. Even better, password-protect your laptop as well. While many criminals are able to circumvent these types of password protections, some are not so savvy and you might save yourself much hassle.<br /><br />For further details please <a href="https://ComputerAdvisoryServices.com/contact-us.html" class="imCssLink" onclick="return x5engine.utils.location('https://ComputerAdvisoryServices.com/contact-us.html', null, false)">contact us</a></span><span class="ff0 fs20"><br /></span></p></div>]]></description>
			<pubDate>Tue, 09 Oct 2012 07:57:30 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=fk0</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/fk0</guid>
		</item>
		<item>
			<title><![CDATA[Backup Tips ]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=General"><![CDATA[General]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_xx2"><p style="text-align: left;"><span class="ff0 fs20"><br /><br /><b>Backup Tips - Prevent data loss with a good backup strategy </b></span><span class="ff0 fs20"><br /><br />A comprehensive data backup strategy is vital to your data security. Too many people wait until disaster strikes before they think about a backup. A good backup is an excellent way to protect against viruses, deteriorating hard drives, disasters and human errors. If it would not be cost effective or even possible to re-enter data, then you need a backup strategy. <br /><br /><b>Step 1: Plan for data backup </b></span><span class="ff0 fs20"><br />1 Think about where you keep your backup. <br />2 If you live in an area that can flood, don't store your backup in the basement. <br />3 If the storage location for your backups is protected by sprinklers, what will the water do to the backups? <br />4 If there is an earthquake, will you be able to get to your data. An off site copy or online backup is an excellent idea. <br />5 Store a full backup at another location to protect against fire, theft, or other disaster. <br />6 If your data is critical it may be a good idea to have a quarterly and yearly backup as well so that you can recover files that may have been deleted, but not discovered until months later. <br /><br /><b>Step 2: Begin a backup routine</b></span><span class="ff0 fs20"> <br />1 Make backing up a part of your normal scheduled daily tasks. <br />2 Don't count on anyone else to back your data up for you. <br />3 Do backups of your own critical data. <br /><br /><b>Step 3: Tailor your backup strategy to your needs </b></span><span class="ff0 fs20"><br />1 To determine the best schedule for your data backup, it is important to know how often your data changes. If your data changes weekly, a daily backup might be overkill. If you have critical data that updates every hour, you may need to back up several times a day.<br />2 It's a good idea to have at least three different backups of your data.<br />3 Full backups can be supplemented by incremental backups. An incremental backup will only back up files that have changed since the last full backup, and is normally much quicker than a full backup. <br /><br />For example, If you run an incremental backup at the end of each work day, it protects all your newest data if anything happens overnight, and all of the data not backed up by the incremental backup is still protected by the full backup you may run every weekend. <br /><b><br />Step 4: Be sure to test your backup periodically </b></span><span class="ff0 fs20"><br />Don't simply rely on backup software to get it right 100% of the time, no matter how good you think your backup software is. To ensure that your backups are protecting you, periodically test the backup jobs by attempting to restore them to an alternate location. This will bring out any flaws or corrupt data before it is too late. <br />Also, most backup applications also have a &quot;backup log&quot; or generate a &quot;backup report&quot; that can quickly identify any problems or skipped files in the backup job. Be sure to review these logs every time your backups complete for anything suspicious. <br />Did you know? <br />1 Recent surveys have recently said that only about 60% of the backups companies think they have completed are usable. <br />2 34% of companies NEVER test their backups. <br />3 77% of those who have tested their backups have discovered failed backups before they were needed. <br /><br /><b>Step 5: A backup of a backup of a backup </b></span><span class="ff0 fs20"><br />Many people think a backup is simply moving their photos, videos, music, financial documents, or other important files off to an external hard drive or removable disk. However, simply moving data from one location to another isn't giving you any extra protection in case disaster strikes. If there aren't at least two separate copies of your data, it isn't a backup at all. <br /><br />However, even though a single backup may be a good start (two copies of your irreplaceable files), there is still some risk for data loss, especially if both copies are kept in the same location. (Think about things such as fires, theft, floods - if any one of these happened, they could easily damage or destroy both copies of your data.) <br />For the best protection against data loss, especially from catastrophic events, having at least three copies of your data (the original files, an easily-accessible backup, and a protected copy of your backup) is recommended. While some large companies may use dedicated off-site data storage services for this, you don't have to be a big company to have three copies of your data. Even something as simple as using an inexpensive online backup service to keep a 3rd copy of your data will be sufficient. <br /><br /><br /><br /></span></p></div>]]></description>
			<pubDate>Tue, 02 Oct 2012 19:12:09 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=xx2</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/xx2</guid>
		</item>
		<item>
			<title><![CDATA[What is Rogue Security Software?]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=Rogue_Software"><![CDATA[Rogue Software]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_xt6"><p style="text-align: left;"><span class="ff0 fs20">Rogue security software is an application that appears to be beneficial from a security perspective but provides little or no security, generates erroneous alerts, or attempts to lure users into participating in fraudulent transactions. Some products defined as &quot;rogue&quot; simply fail to provide the reliable protection that a consumer paid for. Others are far more sinister, masquerading as legitimate security software, and using deceptive tactics to con users into buying the product.</span><span class="ff1 fs20"><br /></span><span class="ff0 fs20"><br /><b>Why do you need to know about rogues?</b></span><span class="ff0 fs20"><br /><br />Unfortunately for computer users, the number of rogue security and anti-malware software, also commonly referred to as &quot;scareware&quot;, found online is rising at ever-increasing rates, blurring the lines between legitimate software and applications that put consumers in harm's way. And that means that instead of purchasing a program to protect your PC, you may actually be playing into the hands of cyber scammers, falling for bogus software specifically designed to mislead you.<br /></span><span class="ff1 fs20"><br /></span><span class="ff0 fs20"><b>What can you do keep from falling for rogue programs?</b></span><span class="ff0 fs20"><br /><br />1. Do not fall for scare tactics. While browsing sites, be cautious of pop-ups warning you that your system is infected and offering a product to clean it up. Never pay for a program that installed itself to your computer. This is a hallmark of rogue software.<br /><br />2. Use security software and keep it up-to-date. If you know that you have anti-virus, anti-spyware, and a firewall on your PC, you can safely ignore security alerts you receive that do not come from your chosen security software provider. (Rogue security software will often try to lure computer uses by using legitimate looking pop-up messages that appear to be security alerts.) Also, most anti-malware programswill help keep you protected from rogues because they can find and detect these programs.<br /><br />3. Access experts at security forums and ask about the software you are considering before you decide to purchase it.<br /><br />4. Read the software reviews at reputable sites like Download.com. Do not blindly trust individual sites offering security products. <br /><br />5. Ask knowledgeable friends and family members about quality software they use. Keep in mind that when you search for trustworthy security software online, rogue products can, and often do, appear in the search results list.<br /><br />6. Practice online skepticism. Be aware that rogue security software does exist on the Web, and be vigilant about avoiding it. These programs are designed to appear genuine - meaning they may mimic legitimate programs, use false awards and reviews to rope you in, or employ other deceptive tactics. It’s also a good idea to familiarize yourself with common phishing scams, and to be cautious of links in e-mail messages and on social networking sites.<br /><br /></span></p></div>]]></description>
			<pubDate>Fri, 28 Sep 2012 18:53:52 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=xt6</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/xt6</guid>
		</item>
		<item>
			<title><![CDATA[Security Software Basics]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=General"><![CDATA[General]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_qv5"><p style="text-align: left;"><span class="ff0 fs20">Today's threats are varied, sophisticated, and continue to adapt in order to get past your defenses. And that means that going online without essential protection in place on your computer is no longer an option.<br /><br />The best ways to stay secure online are to prepare your PC with the right tools, and to use caution and common sense whenever you use the Internet. Updated spyware and virus protection with real-time monitoring are important tools in keeping spyware and malware from infecting your computer. An up-to-date firewall is another security must-have. These three elements provide fundamental security to your PC, and are essential to protect your information and your privacy.<br /><br /><b>What exactly are these tools and why are they necessary?</b></span><span class="ff0 fs20"><br /><br /><b>Anti-spyware software</b></span><span class="ff0 fs20">. Spyware attaches itself to individual computers to perform functions like monitoring Internet navigation and stealing information. Spyware can track your personal data and then send it to cyber criminals. Anti-spyware software can protect your computer by providing real-time protection against malware, spyware, and adware installations, as well as by detecting and removing such programs that are already installed on your computer.<br /><br /><b>Anti-virus software</b></span><span class="ff0 fs20">. A virus is code that recursively replicates a possibly evolved copy of itself. Viruses use computers to spread from one to another. They often perform a function that can erase files and processes from your computer. Anti-virus software can protect your computer from a range of cyber threats like viruses, worms, rootkits, and phishing attacks. The software keeps you protected by scanning files to look for known viruses, and by using what is known as heuristics to identify suspicious behavior which may indicate a threat<br /><br /><b>Firewall</b></span><span class="ff0 fs20">. A firewall works as a barrier between your PC and cyber space. When you are connected to the Internet, you are constantly sending and receiving information in small units called packets. The firewall filters these packets to see if they meet certain criteria set by a series of rules, and thereafter blocks or allows the data. A firewall provides critical protection to keep your PC safe from unauthorized access, yet it cannot remove malware from a system that has already been infected; therefore it should be used in conjunction with anti-spyware and anti-virus software.<br /><br /></span></p></div>]]></description>
			<pubDate>Mon, 24 Sep 2012 18:23:49 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=qv5</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/qv5</guid>
		</item>
		<item>
			<title><![CDATA[Stop E-mail Pollution]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=General"><![CDATA[General]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_pj0"><p style="text-align: left;"><span class="ff0 fs20">Technology continues it's rapid pace yet most people and businesses are not realizing the consequence of e-mail. Even as we increase our level of electronic communication, so goes the multitudes of new e-mail and internet users flooding the bandwidth. Along with all this new hyper growth comes new internet-based abuses and challenges that affect all of us personally and professionally.<br /><br />These days everyone receives too many e-mails. Unnecessary messages are annoying. The information contained in this article suggests ways to become a solution to the pollution, decrease spam and allow routine users to have higher levels of electronic savvy. You'll also find out through our Top Ten Starts and Top Ten Stops how to take the necessary steps to protect e-mail addresses from potential abuses.<br /><br /><b>TOP TEN STARTS</b></span><span class="ff0 fs20">: <br />1.Deleting most e-mails when you do not recognise the sender. <br />2.Compressing information down to concise points. <br />3.Identifying who you are in the subject field. <br />4.Addressing distribution e-mails to yourself. <br />5.Placing addresses in Bcc field when sending distribution e-mails. <br />6.Being respectful of other's e-mail privacy and time. <br />7.Cleaning up e-mails if your intent is to pass them along. <br />8.Educating yourself to increase your Internet savvy. <br />9.Forgiving others when they mess up. <br />10.Using spell check before sending e-mails.<br /><br /><b>TOP TEN STOPS:</b></span><span class="ff0 fs20"> <br />1.Placing your entire e-mail database or lists into the To or Cc field. <br />2.Using sarcasm and humor in some e-mails. <br />3.Opening e-mails with a &quot;fwd&quot; or &quot;fw&quot; in the subject matter.<br />4.Using ALL CAPS or CAPS LOCK in your messages. <br />5.Writing anything you don't want shared in public. <br />6.Changing e-mails addresses every so often. <br />7.Sending unnecessary attached files.<br />8.Sending messages using typical spam titles in the subject field. <br />9.Passing along virus alerts. <br />10.Replying to spam.<br /><b><br />TOP TEN STARTS:</b></span><span class="ff0 fs20"><br />1.START deleting most e-mails when not recognizing the sender Due to the huge amount of spam, along with the on-going presence of virus's embedded into e-mail messages, the current trend today is to automatically delete any messages that you are not certain who the sender is. Purge your &quot;deleted items&quot; folder often.<br /><br />2.START compressing information down to concise points Keep your messages short, concise and to the point. In other words, have a point then get to it. Most users do not enjoy reading lengthy messages or novels on their screens and they have a tendency to delete or ignore these type of messages. <br /><br />3.START identifying who YOU are in the subject field Make sure the recipient knows your e-mail address or is expecting your e-mail. If I am speaking to a client on the phone and following up via e-mail, I'll alert the client to my forthcoming message or reference the phone call in the subject field.<br /><br />4.START addressing distribution e-mails to yourself Each receiving recipient sees only two e-mail addresses of which both are yours. It will be seen on the receiving end like this: To: &quot;Your e-mail address&quot; Fr: &quot;Your e-mail address&quot; And . . .<br /><br />5.START placing addresses in Bcc field when sending distribution e-mails It is a discourtesy to give out someone's e-mail address. When you send an e-mail message to multiple people and use To or Cc to address the message, everyone sees each other's e-mail address.<br /><br />Creating A Bcc (Blind Carbon Copy) Field: To send a message without the recipient's name showing: In a message, click To. In the Type name or select from list box, type the name, or click Find. In the Name list, click the name, and then click Bcc. Click Send. Or . . . You can display the Bcc box in all new messages that you compose. If Word is your e-mail editor, in a new message, click the arrow to the right of the Options button, and then click Bcc. If you are using the Outlook e-mail editor, in a new message, on the View menu, click Bcc Field. If the Bcc field isn't visible when you create a new message, you can add it.<br /><br />6.START being respectful of other's e-mail privacy and time Everyone is very busy and most place a high level of significance on their time and privacy. Be respectful by applying the things learned in this article and by sharing this valuable information with others. <br /><br />7.START cleaning up e-mails if your intent is to pass them along We've all seen it, the folks who view an e-mail and want to pass it along so they automatically click &quot;forward.&quot; In the To field they click in their entire e-mail database and hit send. Instead, stop the pollution by (a) click &quot;forward&quot; on the tool bar (b) remove all the fwd's, message headers and anyone's e-mail address that may appear (c) place your own e-mail address in the To field and (d) place the e-mail addresses you want to send the message to in the Bcc field.<br /><br />8.START educating yourself to increase your Internet savvy Educate yourself on the proper uses of the Internet and stop with excuses such as &quot;It's too late to teach an old dog new tricks.&quot; An easy way to educate yourself is to search out on the various search engines for information about Internet Pollution or e-mail etiquette. <br /><br />9.START forgiving others when they mess up Almost daily, I receive e-mail messages from acquaintances that violate most of the information contained in this article. Instead of spending useless energy registering a complaint or ignoring it, I politely make a specific request for them to change what it is they are doing and why. If you're going to be part of the pollution solution then provide suggestions on &quot;what they should do.&quot; <br /></span><span class="ff1 fs20"><br /></span><span class="ff0 fs20">10.START using spell check before sending e-mails Using your built in spell checker is a sure way to avoid embarrassments, especially when communicating professionally. Don't compromise your messages, use spell check.<br /><br /><b>TOP TEN STOPS:</b></span><span class="ff0 fs20"><br /><br />1.STOP placing your entire e-mail database or lists into the To or Cc fields As previously stated, some people place all their email addresses in the To or Cc field. There are two disadvantages to this: (a) the recipient knows you have sent the same message to a large amount of people, and (b) you are publicizing someone else's email address without their permission.<br /><br />2.STOP using sarcasm and humor in some e-mails Without face to face communications your joke or statement may be viewed with disapproval or even worse - you may hurt someone's feelings. Genuine intimacy with our fellow human beings is a rare commodity these days - and many people who shy away from intimacy hide behind the veil of humor. If it doesn't buy you anything, then don't say or write it.<br /><br />3.STOP opening e-mails with a &quot;fwd&quot; or &quot;fw&quot; in the subject matter These types of e-mails create a huge amount of pollution. The messages are typically laced with multiple forwarded subjects not to mention including each person's e-mail list that decided to hit reply or forward to the original message.<br /><br />4.STOP using ALL CAPS or CAPS LOCK in your messages USING ALL CAPS MAKES IT LOOK LIKE YOU'RE YELLING! TRY READING THE WHOLE SCREEN LIKE THIS - NOT EASY TO DO!<br /><br />5.STOP writing anything you don't want shared in public Never assume your email messages are private or that they can be read by only the recipient. Face the fact, sending e-mails is just like having a &quot;LIVE&quot; microphone around a politician. 6.STOP changing e-mails addresses every so often Much of our Internet pollution is due to people changing e-mail addresses every so often. Many people have to change due to the high amount of spam that they receive. Others change because of the all new ISP that just came out. Yet, messaging everyone in the world about a new address, again, pollutes the electronic traffic, not to mention everyone needs to update their database.<br /><br />7.STOP sending unnecessary attached files Sending some attachments can annoy friends, family, and clients. Many files may even seize their e-mail system. Compress attachments and only send them when they are necessary and productive. Or, load you attachment onto a website and direct your recipients to view the document using a URL link instead.<br /><br />8.STOP sending messages with a typical spam title in the subject matter A relative every once in awhile sends a message and in the subject field it says &quot;Hi.&quot; Great . . . especially considering &quot;hi&quot; is one of the most recognizable spam subject titles. Spammers use basic titles in their subject lines that are designed to create curiosity with the recipient so they'll open or forward the message. Amazingly enough, we use some of the same titles in our legitimate e-mails. Another way spammers infiltrate is to misspell words in the subject line. Watch out for specific subject titles such as Urgent, Important, Sunday, Your Message, Invoice, Send Card To, Your Account; or any subject fields that are misspelled.<br /><br />9.STOP passing along virus alerts E-mail users are still forwarding virus alerts - thinking that by sending these they'll save some poor soul from a for-sure computer melt down. The fact is some virus alerts have embedded viruses in them. If you receive a virus alert, delete it without opening it or forwarding it. Check the main homepage of your virus protection software often. Keep an eye on your favorite television news station or Internet news station like CNN or Fox News for your official virus alerts.<br /><br />10.STOP replying to spam Each time you reply to spam or hit unsubscribe, you are confirming that your email address is &quot;live.&quot; Authenticating this will only create even more spam. Just hit the delete button or use email software to remove the spam.<br /><br />The Internet and E-mail is everything they said it was going to be. People all around the world are using this medium to connect and communicate with others. The &quot;Net&quot; has certainly changed how we live, work and play. Even Senior Citizens are now jumping in at a unprecedented rate of activity. Before they can speak, our children now have a mouse in their hand. Major corporate aircraft now have a mouse for the pilot and one for the co-pilot located on the cockpit consoles.<br /><br />As the Net continues to evolve, so do we as users utilizing the latest and greatest types of technology. Because of this wonderful phenomenon, we have no idea of what it will be like in ten years or how we?ll all be affected by this incredible medium. We have just barely scratched the &quot;tip&quot; of the iceberg. Yet, we have a duty to safeguard and defend the Internets unique makeup.<br /><br />Become a solution to the pollution by implementing the ideas and suggestions found in this article. Start now on the road of increasing your awareness and reducing the huge amount of Internet pollution that we deal with on a daily basis.<br /></span></p></div>]]></description>
			<pubDate>Fri, 21 Sep 2012 08:52:04 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=pj0</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/pj0</guid>
		</item>
		<item>
			<title><![CDATA[Panda unveils 2012 versions of security software]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=Panda_Security"><![CDATA[Panda Security]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_mf3"><p style="text-align: left;"><span class="ff0 fs20">Panda Security &nbsp;has released new versions of its security software that feature a virtual browser designed to protect PCs from malicious websites.<br /><br />The new sandbox browsing feature, called Panda Safe Browser, provides a virtualised browser for users to open suspect websites in, ensuring they don't make any changes to the PC.<br /><br />Panda Internet Security 201</span><span class="ff1 fs20">3</span><span class="ff0 fs20">, Panda Global Protection 201</span><span class="ff1 fs20">3</span><span class="ff0 fs20">, Panda Antivirus Pro 201</span><span class="ff1 fs20">3</span><span class="ff0 fs20"> also include</span><span class="ff1 fs20">s</span><span class="ff0 fs20"> a remote access function that lets you share files across the web securely, as well as a virtual keyboard that prevents password and login details being stolen.<br /><br />Like previous versions of Panda's security software, the 201</span><span class="ff1 fs20">3</span><span class="ff0 fs20"> range comes with Panda's Collective Intelligence system that identifies malware and stores the signature files on an online real-time database. This system then alerts users to the threats as soon as they log on, rather than rolling out updates to each user.<br /><br />&quot;The products are designed specifically for highly active users with the most demanding protection needs, and include many new features,&quot; Panda said.<br /><br /></span></p></div>]]></description>
			<pubDate>Fri, 14 Sep 2012 07:29:24 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=mf3</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/mf3</guid>
		</item>
		<item>
			<title><![CDATA[Practical Tips for Secure Transactions on the Internet]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=General"><![CDATA[General]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_lq2"><p style="text-align: left;"><span class="ff0 fs20">With more people shopping on line and having more time on their hands, holiday periods have become a dangerous period for Internet users, as cyber crooks noticable step up their activites during these periods. &nbsp;That's why it is wise to stay on the alert and take adequate security measures. &nbsp;Otherwise, users will have their bank and credit cards raided by criminals on the web.<br /><br />* <b>Check the Security Characteristics</b></span><span class="ff0 fs20"> of the page on which you are about to operate (secure protocol, security certification).<br /><br />* Make sure there are <b>no active viruses </b></span><span class="ff0 fs20">on your PC before you bank or shop online.<br /><br />* Complement your traditional antivirus with <b>proactive technologie</b></span><span class="ff0 fs20">s that detect treaths with no need to update.<br /><br />* <b>Use 'second opinion' tools</b></span><span class="ff0 fs20"> to make sure there isno active malware on your computer.<br /><br />* <b>Never pay attention to spam messages</b></span><span class="ff0 fs20"> that claim to come from financial organisations requesting confidential data.<br /><br />* Before buying from an online store <b>look for feedback</b></span><span class="ff0 fs20"> about the reputation of the vendor.<br /><br />* Keep your <b>operating system and applications up-to-date</b></span><span class="ff0 fs20">.<br /><br />* Don't run files <b>from dubious sources</b></span><span class="ff0 fs20">.<br /><br />* <b>Never pay for anything</b></span><span class="ff0 fs20"> unless you are completely sure about the vendor.<br /><br />* If bidding for an item on an auction site,<b> beware of anyone who contacts you</b></span><span class="ff0 fs20"> through any chanel other than the auction site.<br /><br />* Never send <b>confidential data via e-mai</b></span><span class="ff0 fs20">l.<br /><br />* <b>Trust your instinct</b></span><span class="ff0 fs20"> - the appearance of a web site is often a good indication that ii is not secure.<br /><br /></span></p></div>]]></description>
			<pubDate>Thu, 13 Sep 2012 09:17:56 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=lq2</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/lq2</guid>
		</item>
		<item>
			<title><![CDATA[Viruses, Worms, Trojans, Malware... What do they all mean?]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=Security_Issues"><![CDATA[Security Issues]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_ig4"><p style="text-align: left;"><span class="ff0 fs20">A very simple explanation follows... <br /><br /><b>Virus </b></span><span class="ff0 fs20"><br />A virus is a small piece of software or code designed to piggyback itself to a program in your computer. Every time that program is run, the virus also runs and has a chance to replicate or reproduce itself and then attach to another program in the computer. Usual symptoms are the program being used does not operate normally, and it operates more slowly. <br /><br /><b>E-mail virus </b></span><span class="ff0 fs20"><br />These viruses migrate by means of e-mail messages and/or attachments. They spread by e-mailing themselves to every address found in the address book in the computer. Given the sheer volume of e-mail traffic on a global basis, this allows these viruses to spread very rapidly, and the volume created has forced e-mail server shutdowns on a number of occasions. <br /><br /><b>Worms </b></span><span class="ff0 fs20"><br />These are small pieces of software that makes use of computer networks and security holes found in them to replicate and spread. Most worms are written to detect and exploit a specific security hole or flaw. Once a computer on a network is discovered with the appropriate weakness, it gets attacked and infected by the worm. The worm then scans the network looking for another computer with the same hole and the process repeats. Now there are two computers for it to replicate from. The process continually repeats itself, but with the speed of today’s computers and networks, a network of say 50 computers and a properly engineered worm can easily infect all 50 computers in the network in under an hour. Perhaps the most famous worm of recent times was Code Red. In July of 2001 it replicated itself over 250,000 times in just nine hours. <br /><br /><b>Trojan (Trojan Horse)</b></span><span class="ff0 fs20"> <br />Simply stated, a Trojan is a program. The program claims to do one thing, but when run, it does damage to the computer running it (for example, it may be designed to erase your hard drive). Fortunately, a straight Trojan Horse has no way of replicating itself. <br /><br /><b>Malware</b></span><span class="ff0 fs20"> <br />Malware, short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code. The term &quot;computer virus&quot; is sometimes used as a catch-all phrase to include all types of malware, including true viruses.<br /><br />Software is considered to be malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimeware and other malicious and unwanted software. <br /><br /><br /></span></p></div>]]></description>
			<pubDate>Thu, 06 Sep 2012 19:08:41 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=ig4</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/ig4</guid>
		</item>
		<item>
			<title><![CDATA[Top10 Ways to Safeguard Your Laptop from Theft ]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=Anti_Theft_Software"><![CDATA[Anti Theft Software]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_ga7"><p style="text-align: left;"><span class="ff0 fs20">Computer theft is at epidemic levels worldwide.<br /> <br />You don't have to be a victim!<br /> <br /><b>Here are the Top Ten Ways to Safeguard Your Laptop from Theft...</b></span><span class="ff0 fs20"><br /><br />1. &nbsp;&nbsp;&nbsp;Install PC PhoneHome or MacPhoneHome on your laptop to locate it anywhere in the world. Don't be a victim like people who ignore these tips and have their laptop stolen<br /><br />2. &nbsp;&nbsp;&nbsp;Be extra vigilant in restaurants, libraries, rest rooms and when using public phones<br /><br />3. &nbsp;&nbsp;&nbsp;Encrypt all proprietary data. Use strong encryption. DON'T encrypt the entire hard drive. Let the computer boot into a guest account to allow tracking software to send it's location message<br /><br />4. &nbsp;&nbsp;&nbsp;Never put your laptop on a conveyor belt at any security checkpoint until it's your turn to pass through. Never let it out of your sight.<br /><br />5. &nbsp;&nbsp;&nbsp;Never check your laptop as luggage when traveling. Keep it with you at all times.<br /><br />6. &nbsp;&nbsp;&nbsp;Never leave your laptop in plain sight in your vehicle. Secure it in the Boot/Trunk.<br /><br />7. &nbsp;&nbsp;&nbsp;Carry your laptop in a nondescript carrying case when moving about<br /><br />8. &nbsp;&nbsp;&nbsp;Never leave your laptop unattended/unsecured anywhere.<br /> <br />9. &nbsp;&nbsp;&nbsp;Engrave your name and telephone number on toor inside the case of your laptop.<br /><br />10. &nbsp;Record the make, model and serial number of your laptop and store it in a safe place for later identification.<br /> <br /><br />Over the last eleven (11) years we have better than a 99% recovery rate worldwide! You don't have to be &nbsp;victim...<br /> <br />PC PhoneHome &amp; MacPhoneHome is the NUMBER ONE stand alone computer tracking and recovery software in the world with over a MILLION AND A HALF users in the the Windows and Mac communities!<br /><br /><br /><br /><br /> <br /><br /><br /><br /></span></p></div>]]></description>
			<pubDate>Sun, 02 Sep 2012 10:37:10 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=ga7</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/ga7</guid>
		</item>
		<item>
			<title><![CDATA[What features should you look for in AntiVirus Software]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=General"><![CDATA[General]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_ty6"><p style="text-align: left;"><span class="ff0 fs20">If you are looking for an antivirus program today then you will probably be quite surprised at just how many of them are on the market.<br /><br />All of the major security vendors, such as Panda, Kasperky, ESET, Trend Micro, , and others, have an antivirus program out there.<br /><br /><b>But which one should you buy?</b></span><span class="ff0 fs20"><br />It can be a daunting task having to choose and each of us are different. It may be that you are a novice computer user looking for something easy to understand, or you may be an expert who wants the ability to tweak just about every setting there is.<br /><br />Either way, your choice of antivirus program is probably going to come down to the benefits that it offers you as a user.<br /><br /><b>So what sort of benefits do antivirus programs offer?</b></span><span class="ff0 fs20"><br />The main benefits that you need to be looking out for are -<br /><br /> &nbsp;&nbsp;&nbsp;* Easy installation<br /> &nbsp;&nbsp;&nbsp;* Simple to use interface<br /> &nbsp;&nbsp;&nbsp;* Real time updates<br /> &nbsp;&nbsp;&nbsp;* Real time scanning<br /> &nbsp;&nbsp;&nbsp;* Gaming mode<br /> &nbsp;&nbsp;&nbsp;* Great customer support<br /><br />Of course there are dozens of other features available that will appeal to different types of people but I feel that those above are the main ones.<br /><br />You will need to know how any given antivirus program fairs with the above criteria and to do that you will either need to check out some of the free trials that are available or read reviews.<br /></span></p></div>]]></description>
			<pubDate>Thu, 30 Aug 2012 08:14:03 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=ty6</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/ty6</guid>
		</item>
		<item>
			<title><![CDATA[Computer Theft - Don't be another Victim]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=Anti_Theft_Software"><![CDATA[Anti Theft Software]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_hm1"><p style="text-align: left;"><span class="ff0 fs20">The epidemic of computer theft has reached historic proportions.<br /><br />According to the FBI, only 3% of unprotected (those that do NOT use a software tracking and recovery software) stolen computers are EVER recovered...<br /><br /><b>You don't have to be a victim!</b></span><span class="ff0 fs20"><br /><br />* More than half (58.7%) of the survey respondents have been the victim of computer theft in the last 12 months.<br /><br />* 67% of computer theft occurred while respondent was mobile (moving about), rendering cables, locks and enclosures virtually useless.<br /><br />* Over three quarters (78.2%) of respondent companies had between 1 and</span><span class="ff1 fs20"> </span><span class="ff0 fs20">9 computers stolen in the last 12 months; more than 1 in 10 (17.6%) respondent companies had more than 25 computers stolen in the last 12 months.<br /><br />* Laptops comprised more than two thirds (68%) of those devices reported stolen, followed by desktop computers (10%) and PDAs, iPods, iPhones, etc. (22%).<br /><br />* 97% of survey respondents that experienced computer theft report the thief was never caught. None of the respondents in this category used a &quot;Computer Theft Tracking &amp; Recovery&quot; software product.<br /><br />* 46% of respondents report the estimated value of proprietary data on their stolen computing device at €20,000 or less; 46.5 % estimated the value at between €25,000 and €100,000. ; 6.5% estimated the value at €250.000 <br /><br />* 59.2% of respondents report other items were stolen at the time of the computer theft, with removable media (including spare disks, stored files on CDs, removable media and spare hard drives) accounting for 36.5 % of the additional stolen items.<br /><br />* 21.3% of respondents use only a log-on password to protect their computer; 29% recorded and stored the make, model and serial number of the computer in case of theft; and almost three quarters (70%) used no security precautions to safeguard their computing device from theft.<br /><br />* 44% of all respondents report they only back-up data weekly, monthly, rarely or never - making the theft of a computing device a serious event that results in the permanent loss of data.<br /><br />* 91% of respondents did not encrypt the proprietary data on their stolen computing device.<br /><br />* 53.4% of respondents that experienced computer theft had multiple incidences of theft in the last 12 months.<br /><br />* More than two-thirds (68.9%) of computer thefts occurred outside traditional business hours.<br /><br />* 71.2% of respondents reported downtime due to computer theft ranging from several days to more than one month.<br /><br />* 83.3% of respondent organizations do not have written guidelines on how to safeguard computers from theft.<br /><br />* 48.6% of respondent organizations do not provide security guidelines.<br /><br />* 91% of respondent organizations do not have written guidelines on how to respond to the theft of a computer.<br /><br />* 83% of respondent organizations do not provide employees with the name and contact information of a specific point of contact when a computing device goes missing.<br /><br />* 79% of respondent organizations do not conduct periodic security awareness programs on computer theft.<br /><br />* 88% of respondent organizations do not have a written policy making employees financially responsible for computer theft if security guidelines are not followed.<br /><br />* 90% of respondent organizations do not have written guidelines on protecting proprietary information on computing devices while traveling.<br /><br />* 94% of respondent organizations do not have written guidelines mandating encryption of proprietary information.<br /><br />* 64% of respondent organizations reported that PCs accounted for the bulk of the stolen machines and Macs accounted for 36% of all stolen machines.<br /><br />YOU DON'T HAVE TO BE A VICTIM !!!!!!!!!!<br /><br />Our award PC PhoneHome and MacPhoneHome is the NUMBER ONE stand-alone computer tracking &nbsp;and recovery software in the world to both the Windows and Mac communities!<br /><br />Every time a PC PhoneHome or MacPhoneHome protected computer makes an Internet connection, it sends a stealth email message containing its exact location to a pre-determined email address of the user's choice and to our Worldwide Command Center. In the event your computer goes missing, all you need to do is &nbsp;make a police report and contact us. We do the rest. Your missing computer is returned to you with the help of our recovery agents, local police services and global ISPs.<br /><br />A single copy of PC PhoneHome and MacPhoneHome retails for €34.95 &nbsp;and allows the user to protect one computer from loss or theft.<br /></span></p></div>]]></description>
			<pubDate>Tue, 28 Aug 2012 19:22:43 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=hm1</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/hm1</guid>
		</item>
		<item>
			<title><![CDATA[PC AntiVirus Software - Do we really need it?]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=Security_Issues"><![CDATA[Security Issues]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_au5"><p style="text-align: left;"><span class="ff0 fs20">PC antivirus module could be a many critical module we own. &nbsp;It could save we hours of disappointment as well as heartache. &nbsp;Most importantly it could save we a outrageous total of income as well as give we square of mind.<br /> <br />You might ask yourself this subject constantly. &nbsp;Do we need Personal Computer antivirus software? &nbsp;The answer, utterly simply, is yes. &nbsp;If we outlay any time during all continuous to a internet or relocating files from alternative PC’s, we really need it. &nbsp;Viruses have been many ordinarily picked up by a internet or by opening files from an different source. <br /><br />A pathogen can emanate massacre upon an defenceless mechanism system. &nbsp;You can remove files, programs as well as personal data. &nbsp;In a tiny cases, we can remove all upon your pc as well as finish up carrying to reinstate a total thing. All of this can be prevented simply by purchasing great peculiarity Personal Computer antivirus software. &nbsp;Most of these programs have been comparatively cheap as well as yield all of a insurance we need for every day use.<br /><br />PC antivirus module comes in all shapes as well as sizes. &nbsp;There have been giveaway antivirus programs as well as ones which we need to squeeze as well as afterwards squeeze a subscription to keep them up to date. &nbsp;The giveaway module customarily suggest tiny insurance as well as have been out of date quickly. &nbsp;This leaves your Personal Computer open to infection as well as probable interpretation detriment or repairs to a system. &nbsp;This is patently not a incident which any a single wants.<br /><br />The most appropriate preference for Personal Computer antivirus module is a paid resolution which is updated frequently. &nbsp;Viruses have been being created all a time as well as if your module isn’t updated it will not acknowledge a pathogen which has been created given your final update. &nbsp;For this reason it is required to say a subscription to whatever module we purchase. &nbsp;There might be a cost for this use but, it is a tiny cost to compensate for a assent of thoughts as well as confidence plain Personal Computer antivirus module will provide.<br /><br /></span></p></div>]]></description>
			<pubDate>Thu, 16 Aug 2012 07:24:03 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=au5</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/au5</guid>
		</item>
		<item>
			<title><![CDATA[Tuning Up Your Computer]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=General"><![CDATA[General]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_wq3"><p style="text-align: left;"><span class="ff0 fs20">While we expect our computers and the Internet to bring added convenience to our lives, computer performance issues can hold back productivity and may even indicate security troubles. Get started on creating and maintaining a healthier PC.<br /><br />s your PC not running as smoothly as when you first bought it? You may not be getting the best performance from your computer. There are a few common culprits that drain the efficiency and, at times, the security of your PC.<br /><b><br />Spyware, Adware, and Viruses</b></span><span class="ff0 fs20"><br />Spyware and malware are among the most common culprits of a slow running PC. Not only can malware put your privacy at risk, it can also sap your computer's processing power. At Lavasoft, we offer combined anti-spyware and anti-virus tools - Ad-Aware Free and Ad-Aware Pro - to give you complete malware protection.<br /><br /><b>Poor Memory Management</b></span><span class="ff0 fs20"><br />Your computer utilizes two kinds of memory: RAM (for fast access to temporarily stored information) and hard disk space (for slower access to permanently stored information). Your operating system and applications require available RAM to run properly. Monitor the number of programs you have open at any one time. Too many programs automatically running at startup can also be a cause of slow-downs. Check to see which programs run automatically when you start your computer, and remove any unnecessary ones. To manage your disk space, delete unwanted files or archive your data by using a removable storage device. If you're running out of disk space, you always have the option to add a new hard drive to your machine.<br /><br /><b>Errors in the Windows Registry</b></span><b><span class="ff1 fs20"><br /></span></b><span class="ff0 fs20">Your computer's registry, the database containing information about programs installed on your PC, can become bogged down with corrupt and unused data. Registry debris and errors are commonly caused by applications that fail to clean registry entries, and even by spyware and adware. The effect is often a slow-running computer, accompanied by freezing and system crashes. You can increase your computer's speed and stability with a registry scanner and repair tool. With the flood of registry cleaners on the market today, promising to speed up and optimize your PC, finding trustworthy solutions is no easy task. <br /></span></p></div>]]></description>
			<pubDate>Thu, 26 Jul 2012 18:26:18 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=wq3</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/wq3</guid>
		</item>
		<item>
			<title><![CDATA[Identity Theft Software]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=Security_Issues"><![CDATA[Security Issues]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_cb4"><p style="text-align: left;"><span class="ff0 fs20">The concept of identity theft has been on the rise since around 1990. As internet use continues to increase so has the number of related cases. Since then millions of people have lost their money, personal property, and had their credit ruined. The cost of trying to get out from under being a victim of this crime is very expensive. It is also very time consuming when you take the amount of paperwork into consideration.<br /><br />There are several ways criminals go about stealing another person’s personal data. While the internet is the most common place they can also get it from you over the phone or going through your trash. The most common online scam is sending you false e-mails asking for you to verify information on an account. These are all attempts to gain your personal information for their own use.<br /><br />Identity theft software programs have been successful in reducing the amount of information that criminals can access online. You should also go over the advice and tips offered with such software programs. Many of them discuss information relating to shredding your mail, monitoring your credit reports, and not giving out your social security number. The more education society has about protecting themselves the less likely it is going to happen to them.<br /><br />If you do find yourself the victim of identity theft, there are special software programs that can assist you. They allow you to compile all of your documents in one place as well as helping you figure out what steps to take. It can offer you a safe place to store letters, bank statements, credit reports, court documents, and other related paperwork. It can take up to 200 hours to gather all the necessary information to file a lawsuit. When you finally do show up in court you want to be able to present all of your information.<br /><br />The magnitude of the impact this crime has on a person is enormous. The best course of defense is to protect your information from the start. Make sure you have the appropriate software on your computer including a firewall and an anti-virus system. This will greatly reduce the chances of someone hacking into your computer. Educating yourself on how theft occurs means you can help prevent it from happening to you.<br /><br /></span></p></div>]]></description>
			<pubDate>Fri, 20 Jul 2012 09:30:07 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=cb4</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/cb4</guid>
		</item>
		<item>
			<title><![CDATA[Home Computer Repair Tips]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=General"><![CDATA[General]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_oa4"><p style="text-align: left;"><span class="ff0 fs20">If you are experiencing computer troubles, contacting a local repair service isn’t always necessary since many problems aren’t severe and can be fixed rather easily. Having a solid understanding about the common problems that can occur with your home computer and the ways it can be fixed is imperative before deciding whether or not to hire a technician.<br /><br /><b>Common Problems and Resolutions</b></span><span class="ff0 fs20"><br />Before starting the home computer repair on your own, perform a data back up. This can be done with an external hard drive or USB so you can recover all your data in case something goes awry.<br /><br /><b>Infections<br /></b></span><span class="ff0 fs20">The possible causes of home computer problems are multiple. Infections of viruses, malware, and spyware are common issues that are experienced by home computers. These infections are characterized by a loss of files unexpectedly, programs that are acting erratically, and the computer responding slowly to commands. If these are some of the symptoms that you have found on your computer, then the repair shouldn’t be too difficult as you can probably fix it in about an hour or so.<br /><br />Check to make sure that all your OS automatic updates are turned on. Then, install an anti-virus program that can effectively protect your computer. Run a scan to remove all the infections on your computer. You can install windows defender or freeware such as spybot. Once all the infections are removed, then your computer should operate at a much faster pace.<br /><br /><b>Hardware Failure</b></span><span class="ff0 fs20"><br />A more serious problem that happens to home computers is a hardware failure. This requires home computer repair immediately. Depending on how heavily a computer is used, typically computer parts last for about 5-7 years. The more often it’s used, the sooner the parts will need to be replaced.<br /><br />The hardware that is most likely to fail includes the hard drive, RAM, and SPMS. When a computer is used heavily, the SPMS is more likely to go out. Constant heating and cooling is what results in damaged RAMs, though this is tough to prevent. Hard drives for the most part last for some time, but they can malfunction nonetheless.<br /><br />If your computer begins to randomly restart or freeze, then this is indicative of the hardware being the problem. You will be given plenty of warning signs before it fails for good. So once you start to see the symptoms associated with hardware failure, then take action and address it as soon as possible.<br /></span><span class="ff1 fs20"><b><br /></b></span><b><span class="ff0 fs20">Booting Issues</span></b><span class="ff0 fs20"><br />While booting, home computers sometimes encounter failures as a result of registry corruption. The best way to solve it is through recovery console. You can also do home computer repair for in these situations by using a recovery CD.<br /></span></p></div>]]></description>
			<pubDate>Sun, 15 Jul 2012 08:05:31 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=oa4</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/oa4</guid>
		</item>
		<item>
			<title><![CDATA[Some Laptop Computer Tips]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://computeradvisoryservices.com/blog/index.php?category=General"><![CDATA[General]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_pv4"><p style="text-align: left;"><span class="ff0 fs20">If you decide to buy a new laptop computer, you will need to have an overall picture of what you are looking for and can afford, because the number of brands and models on the market today can be overwhelming at times. Here are some features to consider before you make a final decision:<br /><br />Battery usage is an essential consideration for anyone who needs to use a working laptop when traveling. Try to verify how long the battery will last, and note that you will want to determine the average battery usage life, not the one that only applies when the lowest possible settings are used.<br /><br />Even though it may be possible to connect it to an external monitor, every laptop and notebook computer comes with some kind of display, and you will need one that is large enough to meet your needs. Unless low price is a basic consideration, it is best to buy computer with at least a 12-inch liquid crystal display (LCD).<br /><br />Your important information, along with the files you need, will be stored on the hard drive of your laptop computer. You should look for a maximum-size hard drive because, sooner or later, it will become full, and you will either need to replace it or purchase an additional one.<br /><br />Because memory is an essential component of any computer, determine the amount of memory your laptop or notebook will provide, and if it can also be upgraded later on. Remember that its operating efficiency will be directly related to the amount of memory your laptop contains.<br /><br />Most laptop computers come with a standard sound card that meets the average users needs, but you may feel that you want one that is more technologically advanced to increase the number of speakers that you can use. If this is the case, be sure that the sound quality measures up to your standards, and note that you may need to add headphones or external speakers to achieve the desired effect.<br /></span></p></div>]]></description>
			<pubDate>Fri, 29 Jun 2012 07:59:49 GMT</pubDate>
			<link>https://computeradvisoryservices.com/blog/?id=pv4</link>
			<guid isPermaLink="false">https://computeradvisoryservices.com/blog/rss/pv4</guid>
		</item>
	</channel>
</rss>