Toshiba Laptop Warranty

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 2 May 2011

How to Create a Group List in Outlook

Posted on 14:21 by Unknown
Need to get a message out to a group of people? Do you often need to email the same group of people? This list (group) of people is called a “distribution lists” in Outlook. These lists make it easy to email a group of people.
To setup a mailing list in Outlook, follow these instructions:
Select File, then New and Distribution List from the menu. In Outlook 2010, select the New Items button, then More Items, then Contact Group.

This will open the Contact Group window. Give your group/list a name and click on Add Members and select the people that you want to add from your Outlook Contacts, Address book or create new ones.
After you have the contacts that you want in the group, click Save & Close.

Now when you create a message, you should be able to type in the name of the contact group that you created.
- Janet F, Marketing Coordinator
Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in Email, Tips | No comments

Malware, Viruses, Worms, Adware, Spyware, Trojans...

Posted on 12:55 by Unknown
In IT, we hear many different terms. One of the most confusing scenarios is when a computer becomes infected with malware since the infection can be referred to as viruses, malware, adware, spyware, rootkits, etc. Some of these terms have the same meaning, some are sub-categories, and some are even just simply network tools. Some of the different forms of malware can be trojans, worms, hacktools, password revealers, etc. depending on the purpose of the program. To clarify things a bit, here is a list of common “infection” terms and their definitions:
Malware: Short for malicious software, (sometimes referred to as pestware) designed to harm or secretly access a computer system without the owner's consent. The expression is a general term used to define a variety of forms of hostile, intrusive, or annoying software or program code. Malware includes computer viruses, worms, trojan horses, spyware, dishonest adware, scareware, crimeware, most rootkits, and other malicious and unwanted software or program. Essentially, it is the broadest term to cover all forms of infections.

Virus: A computer program that can copy itself and infect another computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, carried it on an external drive, or unintentionally spread it through email. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

Worm: A self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (computers on the network), and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Spyware: A type of malware that can be installed on computers which collects small pieces of information about users without their knowledge. Spyware is typically hidden from the user and can be used to observe and collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity. Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet connection or functionality of other programs.

Adware: Advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer. These advertisements can be in the form of a pop-up. The object of the Adware is to generate revenue for its author. Adware, by itself, is harmless; however, some adware may come with integrated spyware such as key loggers and other privacy-invasive software.

Rootkit: Software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation of "root" (the traditional name of the privileged account on Unix operating systems) and the word "kit" (which refers to the software components that implement the tool). The term "rootkit" has negative connotations through its association with malware. Rootkits are considered to be one of the most difficult forms of malware to detect and clean as one of their main functions is to remain undetected, sometimes by residing in the kernel; reinstallation of the operating system is sometimes the only alternative.

Trojan: Software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function) steals information or harms the system. The term is derived from the Trojan Horse story in Greek mythology.

HackTool: Can be malware used by hackers for various purposes. It can include port scanners , and sniffers , keystroke loggers and tools for sending spam. Many types of legitimate network utilities that administrators use are falsely identified as hacktools as they can be used by the administrator to obtain important information about a network they are responsible for. For example, a password revealer can be used to record a user’s password for their email prior to reformatting their system. This can be quite handy since the user may not be available to ask or may have forgotten it since it is cached. Other tools can be used to scan networks to obtain information about the computers on the network such as IP addresses, hostnames, and various other details that are necessary to properly manage a network.

It is always recommended to have an antivirus/antimalware program running on your PC and to ensure that it is up to date. And while everyone does the best they can, some malware can still manage to find its way in. Especially when an unsuspecting pop-up comes up stating that your computer is infected (which is the malware itself) and it is allowed to infect the system simply because it was clicked on; this of course applies to email attachments and links as well.

If you need assistance with a malware infection or would like to know more about anti-malware software, give us a call at our office or email us.
- Kerry B, Network Support Technologist

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in computer, Service and Repair, Software, Virus | No comments

Microsoft SharePoint

Posted on 12:43 by Unknown
Microsoft SharePoint Server makes it easier for people to work together as a team. SharePoint is a web site used to share information, manage documents from the first draft to the completion, and publish reports that can help everyone be more efficient in their day to day jobs.

There are many reasons a company should look at using SharePoint. It allows end users to share ideas and expertise providing a tool to make better business decisions. The team within your business will work better, faster and smarter. The website integrates directly with the Office 2010 suite of applications to provide a familiar easy to use system. Microsoft Exchange server and Microsoft Unified Communications can add to the benefits of the shared system.

The web site can be customized for any business requirements using the SharePoint Ribbon. Templates can be applied to the site to provide a jump start on the design process. Multiple web applications can be run out of the SharePoint site. Third-party customizations called web parts or widgets/gadgets can be setup on the user interface. If your company uses Microsoft OneNote the data can be stored with in the SharePoint database and made available anywhere there is an internet connection.

If you have a multitude of images or paper documents that you want to store digitally, simply scan them into a digital format and save them to the site. The documents can be modified and different versions can be tracked. In addition to being a platform for digital record management, SharePoint also provides the benefits of a central location for storing and working on the documents, reducing emails and duplicated work in an organization.

This shared working environment can be made available internally (Local network), and Externally (Over the Internet). The access can be secured via username and passwords and SSL encryption. User accounts would be assigned access to only the part of the shared resources they require. Contacts, Calendars, Blogs, Discussion Boards and Document Libraries are just a few of the sharable resources that can be configured. Document Libraries, Contact lists and Calendars can be synced directly with Microsoft Outlook and made available within the application.

All of the resources on the site can be searched allowing quick and easy access to whatever you are looking for. Windows 7 advanced search can integrate with the data stored with in SharePoint.

Microsoft Small Business Server operating system has a preconfigured SharePoint site that is also known as the Company Web. This platform can be used right after the initial deployment of the server allowing basic SharePoint functionality. Hosted versions of SharePoint Server are also available for a monthly fee. This allows a small business to take advantage of having their own SharePoint server without having to purchase any hardware or software.

The options available with Microsoft SharePoint are almost endless. It is a fully customizable/programmable interface allowing a multitude of possibilities to complement your business.
- Martin O, Network Support Technician

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in Software | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • Learn About Unified Communications - VOIP Kelowna
    Cisco Unified Communications combine all forms of business communications into a single, unified solution that enables your organization to...
  • Compaq Presario V6608AU Chipset and Audio Drivers For Windows 7
    Here we have information about Compaq Presario V6608AU Chipset and Audio Drivers For Windows 7. As we know it, the Compaq Presario V6608AU i...
  • Driver Acer Aspire V3-471G
    Acer Aspire V3-471G has a superior performance with the latest generation of Intel or AMD or NVIDIA graphics chips supported AMD graphics. I...
  • Driver Of Axioo Neon CLW
    Axioo Neon CLW instant preview 5.F20: This laptop comes with 12.1-inch screen with technology intel core i5 prosssesor. Make you a longer lo...
  • Exporting Your Email Contacts
    So you’ve organized your contacts nicely into your Outlook email client and want to make sure you keep your five contacts (maybe that’s just...
  • Maintain Your Favorite Bookmarks – Online
    These days, more and more data is being stored in the Cloud which allows you to access to your data from anywhere. The cloud also allows you...
  • Asus A43SJ Drivers For Windows 7 / 32bit
    Asus A43SJ Drivers For Windows 7 / 32bit | Are you searching the Asus A43SJ Drivers especially For Windows 7 / 32bit? here, we have informat...
  • Northern Computer Long Haul Adventure Race
    At Northern Computer we are committed to supporting causes that matter to our communities. We aim to make a difference through corporate don...
  • Windows 7, The empire strikes back…..
    As of April 7 th , 2009, Microsoft has ended support of Windows XP, the longest running operating system in history.   The latest version, W...
  • MS Office 2010 - Different Versions, Different Uses and Shortcuts
    Now that Microsoft has had its Office 2010 versions out for several months, a lot of people are asking if they should make the change.   The...

Categories

  • Acer
  • advertising
  • antivirus
  • application
  • Asus
  • Backup
  • battery
  • Cloud
  • Compaq
  • computer
  • CPU
  • data
  • digital signage
  • Email
  • Hard Drive
  • hardware
  • HP
  • Internet
  • IT
  • Laptop
  • marketing
  • monitor computer video hardware
  • Motherboard
  • Networking
  • Notebook
  • Office Ergonomics
  • PC
  • Printer
  • Printers
  • purchase
  • RAM
  • Recovery
  • recycle
  • remote desktop
  • security
  • server
  • Service and Repair
  • signal
  • smart phones
  • Software
  • software server
  • tablets
  • tax
  • Tips
  • TV
  • Virus
  • VOIP
  • warranty
  • web
  • Windows
  • wireless

Blog Archive

  • ►  2013 (52)
    • ►  November (1)
    • ►  October (3)
    • ►  June (2)
    • ►  May (4)
    • ►  April (6)
    • ►  March (3)
    • ►  February (9)
    • ►  January (24)
  • ►  2012 (25)
    • ►  November (2)
    • ►  October (3)
    • ►  September (1)
    • ►  June (2)
    • ►  May (2)
    • ►  April (3)
    • ►  March (5)
    • ►  February (1)
    • ►  January (6)
  • ▼  2011 (56)
    • ►  December (5)
    • ►  November (8)
    • ►  October (3)
    • ►  September (3)
    • ►  August (3)
    • ►  July (7)
    • ►  June (6)
    • ▼  May (3)
      • How to Create a Group List in Outlook
      • Malware, Viruses, Worms, Adware, Spyware, Trojans...
      • Microsoft SharePoint
    • ►  April (8)
    • ►  March (5)
    • ►  February (4)
    • ►  January (1)
  • ►  2010 (29)
    • ►  December (5)
    • ►  November (3)
    • ►  October (4)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  April (13)
Powered by Blogger.

About Me

Unknown
View my complete profile