Phishing Scams: How Phishing Scams Work
On May 28, 2018 by TechTipsPhishing scams are just another attempt to get valuable information. Scammers send a mass email to every address they can find. Typically the message will appear to come from a legitimate institution or company. The email states that you should update or enter your information for one reason or another, and they usually provide a
Enable Two-step verification for Apple ID
On May 22, 2018 by TechTipsTwo-step verification for Apple ID. The only real way to truly secure your accounts these days are by using a two-step authentication method. If you are not sure what two-step authentication or verification is, its the same thing that banks have been doing for years. What is Two-Step Verification Two-step verification is a process involving two
Bitlocker Recovery Key via AD
On May 9, 2018 by TechTipsUsage requirements To view recovery passwords, you must be a domain administrator, or you must have been delegated permissions by a domain administrator. In addition, to use the BitLocker Recovery Password Viewer, the following requirements must be met: The domain must be configured to store BitLocker recovery information. The computers protected by BitLocker must be
UPS Delivery Notification Tracking Number
On May 2, 2018 by TechTipsIf you receive an email with the following subject? and it has an .html attachment there is a good chance that it is a virus, the attachment is a very good copy of a DHL notification tempting you into clicking a link which installs some nasty stuff. Subject: UPS Delivery Notification, Tracking Number
Steel Keylogger Record Computer Keystrokes
On November 18, 2012 by TechTipsSteel Keylogger is a keylogger that is virtually invisible to all the common anti-virus software today, helping you keep it running stealthily. Also, it does not connect to the Internet so your data is safe. This program is a simple one and has no Web site, but the file is widely available on most torrent