Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

Definition: NAS

October 28, 2015 by The T By D Team 1 Comment

Definition:  NAS

“Network Attached Storage”.  

A typical computer stores data using internal and external hard drives.  If the computer is connected to a network, it can share data on its connected hard drives with other systems on the network.  While this allows for multiple user file access, it requires that each computer share its files individually.  If a computer is turned off or is disconnected from the network, its files will not be available to the other systems.

NAS drives allow computers to store and access data using a centralized storage location.  Instead of each computer sharing its own files, the shared data is stored on a single NAS device.  This provides a more reliable, and faster, way of sharing files on a network.  NAS devices are often used in business networks, but are gaining popularity in home networks as well.  

Filed Under: Definitions

Definition: Network

October 28, 2015 by The T By D Team 2 Comments

Definition:  Network

When 2 or more computers are connected to one another.  A network is used to allow sharing of files and information between multiple systems.

Filed Under: Definitions

Definition: Remote Access

October 28, 2015 by The T By D Team Leave a Comment

Definition:  Remote Access

The ability to access your computer from a remote location.  Programs allow users to control remote computers from their local machine.  Most remote access programs allow users to transfer files between the local and remote machines.  

Although this can be useful for people who sometimes work from home and for server administrators who frequently need to update and make changes on their server machines, it is not advisable to enable the feature unless you absolutely require remote access.  Having remote access requires a higher level of CyberSecurity.

Filed Under: Definitions

Definition: Web Server

October 28, 2015 by The T By D Team Leave a Comment

Definition:  Web Server

A computer system that hosts websites.  Any computer can be used as a Web server, as long as it is connected to the Internet, and has the appropriate software installed.  However, most Web servers are 1U rack-mounted systems, meaning they are flat, trimmed down computers that can be mounted on a server rack.  Most Web Hosting companies has several server racks, each which contains multiple servers.  

“Shared Hosts”:

Web servers that host websites for multiple users are called “shared hosts”.  This is the most common type of hosting solution, and is used for personal sites, small business sites, and websites run by small organizations.  

“Dedicated Hosts”:  

Web Servers that only host websites for a single person or company are called “Dedicated Hosts”.  These types of servers are appropriate for high-traffic websites and sites that require custom server modifications.

Filed Under: Definitions

ALERT: “Enter to Win FREE Tickets to Star Wars”

October 27, 2015 by The T By D Team Leave a Comment

Apparently geeks go after their own now…Star Wars VII Poster
ALERT:
Enter to Win FREE Tickets to Star Wars

 

The upcoming December of the next Star Wars Episode VII:  The Force Awakens movie has been eagerly anticipated, and is scheduled for mass release in the U.S. on December 18, 2015.  

CyberCriminals are using this anticipation, and are trying to trick people by offering free tickets to the upcoming theater release.  

Star Wars free tickets

Over the next 2 months computers everywhere will be deluged with scams.  Until the December 2015 release (and likely for weeks afterwards) people will receive emails that ask you to enter sweepstakes, fill out surveys, or enter information to win coupons for free movie tickets.  CyberCriminals will employ every trick in the book to get you to open their emails, click on attachments, or open zip files.

Do NOT fall for these tricks.  

Instead of free tickets, all you will win is a bill from your friendly neighborhood computer geek, because you will be downloading and infecting your computer (and possibly the whole computer network, if you’re at work!) with malware or a virus.  If you’re using a work computer, you risk infecting the whole network. 

Technology by Design clients that have purchased our Spam Filter don’t have to worry, the spam emails will not get through.

However, they cannot open things willy-nilly.  A well-intentioned friend in your contacts can still directly email you the link/entry form/etc.

 

Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for, in suspicious emails. 

Ask us about our “Core Security Solutions” package!

 

You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

FAQ: What Do Viruses, Trojans, and Other Malware Actually Do?

October 27, 2015 by The T By D Team Leave a Comment

science_1000009285-120613int

What Do Viruses, Trojans, and Other Malware Actually Do?

Are viruses etc really bad?  Yes – most everyone knows that.
But do you know what they actually do & how they work?
Viruses

Computer viruses work much like viruses in people.  They are programs that copy themselves and infect a computer, spreading themselves from one to another.

Trojans

Applications that look normal, but have a code secretly embedded that’s doing something else.  Like allowing someone else control your computer without your knowledge or permission.  

Worms

A self-replicating computer program that penetrates an operating system (OS) with the intent of spreading malicious code.  Worms use computer networks to send copies of the original code to other computers.  Along their way, they consume bandwidth, delete files, and send documents via email.

Not sure if you’re company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for, in suspicious emails. 

Ask us about our “Core Security Solutions” package!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: FAQ, Featured

ALERT: Facebook Dislike Button

October 6, 2015 by The T By D Team Leave a Comment

Zuckerberg Dislike

ALERT:  Facebook Dislike Button

At a Q&A session at Facebook on September 15th, Mark Zuckerberg mentioned that Facebook users have been requesting a “Dislike” button, and that Facebook was finally working on this option.  Zuckerberg clarified that this “Dislike” button would not be a “downvote” or meant as a disparaging comment on someone’s post, but rather to communicate a user’s empathy towards another user’s post.

Fb Communicate Empathy

CyberCriminals, in their ever-scamming mood, jumped all over this suggestion.  There have been similar scams in the past, but this time they took Zuckerberg’s comment and ran with it.  CyberCriminals have sent out a deluge of scams trying to lure Fb users to “get the new dislike button” in their Fb profile. 

No Dislike Button

Facebook users that fall for this scam, end up giving out confidential information, installing malware on their PC or mobile device, installing rogue browser plugins and/or get themselves on a ‘scam list” and end up getting inundated with unwanted phone calls, emails…even snail mail, that tries to sell them various scam products.

The Facebook scam posts could look similar to the scam posts below:

Fb Dislike 1

Fb Dislike 6

 

 

 

 

 

 

Fb Dislike 2

Fb Dislike 5

If you receive an email, Fb message, text message, tweet, etc about a Facebook dislike button…

It Is A SCAM.

Do not click on anything, do not open any attachments, do not fill out any forms, do not forward to your friends/Facebook groups.

Fb Now Dislike Button

 Facebook does not yet have a Facebook button.  One is in the works, but has not yet been finalized.

If you receive a post, email, message etc about a Facebook ‘Dislike’ button, to check if it’s the real deal, simply go to Facebook’s Fb page:  

https://www.facebook.com/facebookcanada?fref=ts.  

You can be sure there will be a big announcement.

Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for, in suspicious emails. 

Ask us about our “Core Security Solutions” package!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

ALERT: FBI Public Alert

September 21, 2015 by The T By D Team Leave a Comment

FBIALERT:  FBI Public Alert

The FBI released a warning recently against a new CyberCriminal I.T. crime wave that is so prevalent and so devastating to companies, that the FBI have named it:

“CEO Fraud”

This scam is also known as “Business Email Compromise“, which we sent out an ALERT for in January.  FBI CEO Fraud

“CEO Fraud”:  CyberCriminals impersonate a company’s CEO, using the company’s own spoofed domain name.  The fake CEO contacts company employees in charge of money transfers, and orders them to transfer large amounts of money out of the country.

CEO Fraud2CyberCriminals take employee email addresses and other information from the target company’s website to help make the emails more convincing.  In the case where executives or employees have their inboxes compromised by the thieves, the crooks will scour the victim’s email correspondence for certain words that might reveal whether the companies routinely deals with wire transfers (searching for messages with key words like “invoice”, “deposit” or “president” or “CEO”).

CyberCriminals monitor the email account of a company’s CEO for months, waiting for the right time to kick this fraudulent event off.  The “right time” is usually a time where the CEO is out of town, or can’t be easily reached.  

The CyberCriminals spoof the name of the company’s own domain (eg. “tbyd.co” instead of “tbyd.ca”) to make the emails more convincing, which can be done easily if your email server is not configured properly.

(One reason to get a professional I.T. organization to manage and maintain your I.T. network!)

IT Security Guard

The CyberCriminals, once they have spoofed the company’s domain, and have confirmed (by monitoring the CEO’s email account) that the CEO cannot easily be reached for confirmation, send URGENT emails that look legit.  The emails look like they are coming directly from the CEO, and are ordering the employee to send wire transfers.  

This email fraud is targeting small and medium-sized companies, and the current loss is tallied at $1.2 Billion.

“The scam has been reported in all 50 states and in 79 countries,” the FBI’s alert notes.  

“Fraudulent transfers have been reported going to 72 countries; however, the majority of the transfers are going to Asian banks located within China and Hong Kong.”

How To Prevent Becoming a Victim
The FBI suggests the following tips for businesses to avoid being victimized by this scam (a more complete list is available at:  www.ic3.gov).
  1. Verify changes in vendor payment location and confirm requests for transfer of funds.
  2. Be wary of free, web-based email accounts, which are more susceptible to being hacked.
  3. Be careful when posting financial and personnel information to social media and company websites.
  4. Regarding wire transfer payments – Be suspicious of requests for secrecy or pressure to take action quickly.
  5. Consider financial security procedures that include a two-step verification process for wire transfer payments.
  6. Create intrusion detection system rules that flag emails with extensions that are similar to company email, but not exactly the same.  For example “.co” instead of “.com”.
  7. If possible, register all Internet domains that are slightly different than the actual company domain.
  8. Know the habits of your customers, including the reason, detail, and amount of payments.  Beware of any significant changes.

 

Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for, in suspicious emails. 

Ask us about our “Core Security Solutions” package!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

Try This to see if Your Fb Account Has Been Hacked!

September 10, 2015 by The T By D Team Leave a Comment

Mark Zuckerberg

According to a photo on Facebook, if you go into any photo on your Facebook page, and type in the comments section “@[4:0]”, if it changes to Mark Zuckergerg it means your Fb account hasn’t been hacked.  

See the full message here:FB Mark Zuckerberg

Not exactly.  Whether or not this trick works on your account has nothing to do with the security of your account, hacking, or any other nefarious activities.  The real explanation is actually pretty boring.

Every Facebook profile (and page) has a unique ID.  The code “@[4:0] is actually shorthand code, that tells Facebook to produce the name of the Fb profile associated with the ID number 4.  So, typing in “@[837489:0] would produce the name of the Fb profile associated with the number 837489.  Although most Fb accounts created today would have ID numbers in the millions, Mark Zuckerberg (the founder of Facebook) has an account associated with the number 4.  

For many people, typing in “@[4:0]” will work, and it will change as soon as you post.  However, for others it doesn’t work.  It has nothing to do with hackers, etc.  It has more to do with the platform with which you access Facebook.  On certain platforms (usually desktop), Fb automatically inserts a space between the @ and [ symbol when you post the comment, rendering the shorthand code useless, and nothing happens.

A similar ‘trick’ went viral a few years ago, stating that your cell phone has a name that can be discovered by typing in the last 3 digits of your phone number in place of the number ‘4’ in the code.  This was, of course, not true.  

Check out our “Email Red Flags”  for what to watch for, in suspicious emails. 
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: FAQ, Featured

ALERT: Drowned Syrian Boy Scams

September 9, 2015 by The T By D Team Leave a Comment

ALERT:  Drowned Syrian Boy Scams

The news, Internet, and social media have been confronted with some disturbing images this week.

 

Graphic photos of 3-year-old Alyan Kurdi, lying lifelessly on  a beach off the coast of Turkey, have been shared prolifically across social media platforms, such as Facebook.  The boy, along with his family and other Syrian refugees, was trying to reach Greece.

The graphic photos have reached millions of people, being passed from friend to friend.  Justified by the reasoning that we cannot hide away from the very real, very serious nature of this situation.

As with all tragedies, CyberCriminal lowlifes are willing to exploit this graphic photo, for their own profit.  
And they have several scams currently being used, to do just that.

 

Phishing Scams

Phishing email attacks are sent out randomly to a mass amount of people:

  1. Trying to trick people into either giving a charitable donation at a bogus website, or
  2. Trying to trick people into clicking on a link that downloads malware onto your PC.
Social Media Scams

Facebook, Twitter, etc:  Asking you to share/like/retweet etc their post1 share = 1 prayer

  1. They tell you that if you care at all you will share/like etc –  “1 share = 1 prayer”LikeFishing scam1
  2. Asking for your help, they tell you that if they get 1000 shares/likes etc, so and so will donate a specific amount of money

Think before you click

Called “Like-Farming Scams“ – They collect “likes” or “shares” etc.  The list of followers can be used by the CyberCriminals for further spear-phishing, or sold to other CyberCriminals for their spamming use, or to marketing outfits.

Fb Page for Sale

Not sure if your company is safe?  Ask us for a FREE Network Security Assessment!

Check out our “Email Red Flags”  for what to watch for, in suspicious emails. 

Ask us about our “Core Security Solutions” package!
You can’t stop CyberCriminals from targeting your company or employees.
But you can be prepared for their arrival, and have full shields up.

Got CyberBugs?

Call 1-204-800-3166

For Cyber-Extermination!

#itthatworks

Filed Under: ALERTS, Featured

  • « Previous Page
  • 1
  • …
  • 6
  • 7
  • 8
  • 9
  • 10
  • …
  • 52
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in