This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Marriage and Relationship

What you need to Know about Marriage and Relationship.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Showing posts with label Technology. Show all posts
Showing posts with label Technology. Show all posts

5 ways to manage emails and control spam in Outlook


Spam lives on, despite all our efforts to snuff it out—but Outlook has some features to help slow it down. Here are some things anyone can do, plus some tips for working within a corporate Outlook system. 

1. Use Block Sender frequently

Use Outlook's Block Sender feature to add intrusive spam to your Block Sender List, and then move it to the Junk Email folder. This works fine if you receive fewer than a dozen emails a day.
Select the spam email, right-click, choose Junk from the drop menu, and click Block Sender. Or, Select Home > Junk > Block Sender. Outlook marks it and relocates it immediately.
00 block sender JD Sartain
Use Block Sender frequently to automatically add the senders to Junk Email folder.

2. Set up a Blocked Sender list

If you get a lot of spam from a single ISP or country, or from a phishing group impersonating a legitimate organization, such as Yahoo6.com, epaypal.com, or an email from Wellsfargo with an EarthLink address (hbird80@earthlink.net), you can add these bad actors to your Block Sender list by company, group, country, ISP, or other criteria. Select Home > Junk > Junk Email Options and click the Blocked Senders tab. Click the Add button and enter a country code, a group domain, or a even a fake company (epaypal.com).
As the examples listed in this dialog box show, you don't need wildcards to block all email from a group or company. Just enter the group name preceded by the @ sign, or the name alone. Click OK > Apply > OK. Task complete.
01 block sender list JD Sartain
Use the Block Sender list to block groups, countries, and fake companies.

3. Create Rules for sorting, moving and more

Outlook has a feature called "Create Rule" that offers custom email management based on conditions that you define in its virtual rulebook. Like macros, these rules automate repetitive tasks that you perform daily, such as telling Outlook which emails to display in specific windows, move emails to other folders, and/or create alerts with custom sounds.
Select the email you want moved to another folder. Select Home > Rules > Create Rule. In the dialog box, Outlook asks: When I get email with the selected conditions (From, Subject, Sent To) do the following: Display in New Item Alert Window, Play Selected Sound, or Move Item to Folder. Outlook assumes you want to check all three of the top boxes, but feel free to uncheck those that do not apply. In the bottom pane, check the boxes that perform the actions you require, then click OK.
In the following example (see graphic below): In Sample 1, this rule says flag all emails From: Comcast, with the Subject: Your bill is ready, Sent To: xxx@chacha.com; and then do the following> Play Sound: Windows RingIn.wav, and then Move to Folder: Bills Due. For Play Sound, click Browse, navigate to the Windows/Media folder, then choose a sound from the list. For Move to Folder, click the Select Folder button, and choose one from your hard drive's folder list.
In Sample 2, all spam emails with Subject: Jace and Sent To: xxx@chacha.com are flagged and sent to the Junk Email folder. The subject line here has too many words for a good match, so this field box was unchecked.
02 create rule JD Sartain
Use Create Rule for custom email management based on conditions that you define.

4. Rules Wizard (advanced options)

You can create rules that block spam—or set up a number of other handy tasks—based on specific criteria that you set. 
For this example: UserKC receives a lot of spam emails with attachments in her Inbox that are not addressed to her email address. In this case, the email was sent to somebody named mikeal.victor98@gmail.com, but she received it instead. This is a common phishing scam that's escalated over time, so she decided to create a rule to automate a process that kills these spam attacks.
Select Home > Rules > Create Rule. In the Create Rule dialog box, click the Advanced Options button.
In the Rules Wizard dialog box, Outlook asks: Which condition(s) do you want to check? Step1: Select Condition(s). Scroll through the list and choose the conditions that apply to your unique situation. In this example, UserKC selected where my name is not in the To box and which has an attachment. Outlook enters the conditions in the Step2 box. Click Next.
03 rules wizard1 create rule JD Sartain
Create rules that block spam, in addition to a number of other handy tasks, based on specific criteria that you set.
In the second Rules Wizard dialog, Outlook asks: What do you want to do with the message? Step1: Select Action(s). UserKC checked move it to the specified folder.
Notice the underlined text here and in the Step 2 box: That means, "click this link to complete this action." Click once, choose the "specified" folder (Junk Email), then click OK. Outlook adds this action to your rule, then re-displays the additional rule in a new Step2 box. Click Next.
04 rules wizard2 select action JD Sartain
Underlined text means click this link to complete this action.
In the third Rules Wizard dialog, Outlook asks: Are there any exceptions? Step 1: Select Exceptions. UserKC decided to add a safety exception: If the sender name/email address matches a record in my current address book, then do nothing. Check the exception box, click the underlined "specified" Address Book, select the applicable contact list, then click Add.
Notice the new Step 2 box contains all the rules you just created. If acceptable, click Finish. The Finish Rules Setup Wizard dialog opens and requests that you specify a name for this rule (or collection of rules, actually). Enter a descriptive name, check the "Turn On this Rule" box, and click OK. Now, all those misdirected phishing and spam emails will go directly to your junk file folder.
05 rules wizard3 exceptions JD Sartain
Enter exceptions and name the rule.

5. Check spam folders often

Spam, phishing and blocking filters, and the rules that govern them, come in multiple levels. In addition to the filters and rules you create on your own computer, your email software, antivirus program, Internet provider, network administrator, individual supervisor, and possibly others all have various systems for protecting users from harmful and/or unsolicited communications. The often aggressive techniques these systems use to filter out the garbage means some legitimate emails may not get through.
Check your spam folders often at every level, especially if you're expecting a communication that never shows up. It's generally easy to access your spam folders at the ISP level, because most providers offer an email program with the service, which includes a spam folder. Individual company policies may not be as flexible or convenient. Talk to your network administrator if you're missing emails to determine whether the contents of the spam folders are accessible and available to review. If not, ask your friends, colleagues, and associates to monitor their communications and call you if you don't respond in a timely manner. Or, if your company policies allow it, consider providing a second, backup email address to catch those drifters that wander into corporate traps.

7 easy ways to avoid being hacked

Technically, everything that connects to the Internet can get hacked. But there are several things you can do to protect yourself and your data from an attack.

Here are a few tips that will mitigate the risk of getting your personal data stolen.

1. Be suspicious of emails
A great deal of cyberattacks are launched through simple malicious email campaigns. Email is a wonderful communication platform because you can sending anything to anyone, but that means it can be a huge security risk. Phishing, for example, sends victims seemingly innocuous emails that will lead victims to fake websites asking to update their personal information.
The best way to avoid being scammed by phony emails is to just make sure the recipient is who you think it is. Check the email address to see if they match with website you think it’s from. To be extra cautious you can check the IP address of the sender.

You can do this by finding the source information from the email and looking for the IP address that follows the line “Received: from.” You can then Google the IP address to learn the email’s source.

2. Check link locations
Unknown messages contain links to unknown sites. Surfing to a mysterious website can bring about unintended consequences. For one, it could mimic a site you know and trust and help you fall prey to a phishing scam. Or, it may be unsecure or infected with malware.
If you are tempted to click on one of these links, you better know exactly where it’s taking you. The best way is to copy and paste the link location into a new browser to see what site is on the other side. If it’s a shortened link, you can use tools like URL X-ray that figure out the real destination before you click it.
Also, encrypted sites are the safest ones to visit. You know they are safe when you see HTTPS in the URL and the lock icon on your browser.

3. Never open attachments (unless you’re really sure)
A good rule to follow is never open attachments unless you are 120% sure of where it came from. One of the easiest ways for hackers to download malicious code onto victim computers is by sending emails with virus-laden files.

A frequent way enterprise companies get hacked is by one unsuspecting employee downloading malicious software that infiltrates the entire network. The most dangerous file types are Word, PDFs, and .EXEs.

4. Use two-factor authentication
As bigger companies get hacked, the likelihood that your password is leaked increases. Once hackers obtain passwords, they try to figure out which personal accounts they can access with the data they stole.
Two-factor authentication — which requires users to not only enter a password but to also confirm entry with another item like a code texted to a phone — is a good way to stop attackers who have stolen passwords. More companies are making it standard for logging in.

5. Use advanced passwords
This may be the most obvious yet overlooked tip. A strong password includes uppercase, lowercase, numbers, punctuation, and gibberish. Don’t make the password a personal reference, and don’t store a list in a saved file.
Most importantly, don’t use the same password for multiple accounts.
There are some great tools like LastPass and 1Password that securely store passwords. Also, it’s crucial to change passwords frequently — especially for vulnerable accounts like email and banking.

6. Be wary of the cloud
Here’s a good rule of thumb — if you don’t want people to access your information, don’t share it. This includes cloud storage. No matter how secure a platform says it is, you ought to keep in mind that you’re giving it to someone else to watch over. While it’s in the company’s best interests to keep it secure, many privacy experts maintain that anything you put online stands the chance of being published online.

Does this mean you shouldn’t store anything in the cloud? Not necessarily, it’s just helpful to remain wary where your files are going. And to know the practices of your cloud storage provider.

Additionally, be sure that if you delete files on your computer or smartphone that they are also deleted on any cloud backups you have too.

7. On public Wi-Fi? Don’t share personal data
Thinking about buying that plane ticket or checking your bank account while sitting at the coffee shop? You may want to think twice about that, as you have no idea how secure that connection is.
The same goes for places like hotels and conference centres. Security researchers just uncovered a vulnerability that made Wi-Fi traffic at some of the world’s biggest hotels vulnerable to attack. There is no way for an individual to know if this is happening, so it’s best to be judicious with where you are surfing.

If you must access private information while on these networks, it would be good to use tools like virtual private networks (VPNs), which encrypt traffic so the Wi-Fi network can’t see where you’re surfing. Or, better yet, just set up a hotspot using your mobile data.

MtGox bitcoin chief Mark Karpeles arrested in Japan

Japanese police have arrested the CEO of the failed company MtGox, which was once the world's biggest exchange of the virtual currency, bitcoin.

Mark Karpeles, 30, is being held in connection with the loss of bitcoins worth $387m (£247m, €351m) last February.

He is suspected of having accessed the exchange's computer system to falsify data on its outstanding balance.

MtGox claimed it was caused by a bug but it later filed for bankruptcy.

Japan's Kyodo News said a lawyer acting on Mr Karpeles' behalf denied his client had done anything illegal.

Mr Karpeles, who was born in France, is suspected of benefiting to the tune of $1m (£640,000), the agency said.

In March 2014, a month after filing for bankruptcy, MtGox said it had found 200,000 lost bitcoins.

The firm said it found the bitcoins - worth around $116m - in an old digital wallet from 2011.

That brings the total number of bitcoins the firm lost down to 650,000 from 850,000.

That total amounts to about 7% of all the bitcoins in existence.

Bitcoin is a virtual currency built around a complicated cryptographic protocol and a global network of computers that oversees and verifies which coins have been spent by whom.