What is Phishing?

Phishing is a cyber threat that attempts to gather personal and private information through fake links or portals online. Phishing scams trick Internet users into providing their sensitive information, such as credit card or Social Security numbers, in order to steal your identity. How does it work? Usually phishing is achieved through fake online links, such as pop-ups, misleading ads or suspicious emails. Phishing portals convince web users into supplying personal information to unsecure sources. Below are examples of information …

What is Java?

Java is more than just coffee. In the computing world, Java is programming language. Just like we use words to create sentences, developers use Java to create applications and build programs. If you’ve heard of Java, you’ve also probably heard of JavaScript – but besides sharing similar names, the two don’t have too much in common. JavaScript (which was developed by NetScape) is not part of the Java platform. Where you’ve probably seen JavasScript is in HTML documents (HTML stands …

How To: Watch TV Online

Ever heard of a second screener? You might be one and not even realize it. A second screener is someone that watches TV and is on another device at the same time. It happens all the time. In fact, 44% of Americans use a second screen half of the time they watch TV. You pull up a show, and then get on your phone to check Instagram or Facebook. Or tweet about the show. Or just shop online with the …

Are All Viruses Harmful?

Viruses just might be Public Enemy Number One when it comes to technology. At best, they’re an inconvenience. At worst, they can destroy your devices, your data and even your bank account. Everyone knows that viruses are bad — that’s why we spend billions of dollars on computer security every year. But what about good viruses? Is there such a thing — or will there ever be? Let’s take a look. What is a virus? A virus is a piece …

What Are Cookies?

In computing terms, a cookie is much different from the sweet treat you might associate with the name. Computing cookies are small text files sent and returned on a server. The files can then be stored on a user’s computer. They are used to identify a user or track their access to a network. Cookies deliver websites tailored to the interests of a user. A cookie does this by carrying information from one site over to the next. For example, …

What is an Internet Card?

You get online a lot of different ways – on your phone, laptop, tablet, desktop. But, with smarter technology, you can also get online a lot of different places. No, not just in coffee houses or at the airport. Like, a lounge chair on the beach. Or a park bench. Or maybe at a baseball game. Internet cards, commonly called “hot spots,” are one way people are getting online from anywhere. Laptop Internet card basics Your laptop is great for …

iTunes Troubleshooting

Glitches happen. It could be an issue with your Internet connection, your actual computer or – more than we would like to admit – sometimes its user error. If you’re an iTunes user, then you know the usual issues – you can’t get iTunes to open, or maybe you forgot the answer to your security question. Check out some of the tips below to answer some of the most common iTunes troubleshooting questions. iTunes troubleshooting tips: lost password So, you …

Is My Identity Safe Online?

When you’re posting pictures from vacation, or paying your energy bill or entering your credit card information to buy something online, sometimes you can’t help but think, “Is my identity safe online?” Don’t worry – what follows is good news. Your identity can be safe online. You just have to be smart, have the right tools and right awareness. Step 1: A secure Internet connection Before sharing information online, make sure you have a secure Internet connection. That doesn’t just …

How to Use Wireless Internet in Rural Areas

Everyone wants to go wireless. It makes sense – it’s more convenient. It’s easier and it’s definitely the way to go if you like to move around – which most of us do. To go wireless, all you need is a wireless router. That goes for rural wireless Internet, too. The different between rural wireless Internet and wireless Internet in cities? The actual Internet provider. Rural wireless Internet providers vs. urban Internet providers The biggest difference you’re going to see …

How to Identify Spam

Spam. You’ve heard about it, you’ve read about it, but you still might be a little cloudy on what it actually is – and what it looks like. Spam is actually a pretty general term – it encompasses basically any kind of unwanted online solicitation or communication. Most examples of spam you’ll run across are unwanted emails. A lot of the time, spam emails are meaningless. But, in some cases they can cause viruses or carry malware (malicious software). How …