"Fast and Friendly Service Delivered Directly To Your Door"
"Fast and Friendly Service Delivered Directly To Your Door"
HOW TO FORWARD E-MAIL APPROPRIATELY
Do you really know how to forward e-mails? 50% of us do; 50% DO NOT .
Do you wonder why you get viruses or junk mail? Do you hate it?
Every time you forward an e-mail there is information left over from the people who got
the message before you, namely their e-mail addresses & names. As the messages get
forwarded along, the list of addresses builds, and builds, and builds, and all it takes is for some poor person to get a virus, and his or her computer can send that virus to every
e-mail address that has come across his or her computer. Or, someone can take all of
those addresses and sell them or send junk mail to them in the hopes that you will go to the site and he will make five cents for each hit. That's right, all of that inconvenience over a nickel!
How do you stop it? Well, there are several easy steps:
(1) When you forward an e-mail, DELETE all of the other addresses that appear in the
body of the message (at the top ). That's right, DELETE them. Highlight them and delete them, backspace them, cut them, or hit the tab key whatever it is you know how to do. It only takes a second You MUST click the 'Forward' button first and then you will have full editing capabilities against the body and headers of the message. If you don't click on 'Forward' first , you won't be able to edit the message at all.
(2) Whenever you send an e-mail to more than one person, do NOT use the To: or Cc:
fields for adding e-mail addresses. Always use the BCC : (blind carbon copy) field for
listing the e-mail addresses. This is the way the people you send to will only see their own e-mail address. If you don't see your BCC: option click on where it says To: and your address list will appear. Highlight the address and choose BCC: and that's it, It's that easy. When you send to BCC: your message will automatically say 'Undisclosed Recipients' in the 'TO:' field! Of the people who receive it.
(3) Remove any 'FW :' in the subject line. You can rename the subject if you wish or even fix spelling.
(4) ALWAYS hit your Forward button from the actual e-mail you are reading. Ever get
those e-mails that you have to open 10 pages to read the one page with the information on it? By Forwarding from the actual page you wish someone to view, you stop them from having to open many e-mails just to see what you sent.
(5) Have you ever gotten an e-mail that is a petition? It states a position and asks you to add your name and address and to forward it to 10 or 15 people or your entire address book. The e-mail can be forwarded on and on and can collect thousands of names and e-mail addresses.
A FACT: The completed petition is actually worth a couple of bucks to a professional spammer because of the wealth of valid names and e-mail addresses contained therein. If you want to support the petition, send it as your own personal letter to the intended recipient. Your position may carry more weight as a personal letter than a laundry list of names and e-mail address on a petition. (Actually, if you think about it, who's supposed to send the petition in to whatever cause it supports? And don't believe the ones that say that the e-mail is being traced, it just isn't so!
(6) One of the main ones I hate is the ones that say that something like, 'Send this e-mail to 10 people and you'll see something great run across your screen.' Or, sometimes they'll just tease you by saying something really cute will happen IT ISN'T GOING TO HAPPEN! (Trust me, I'm still seeing some of the same ones that I waited on 10 years ago!) I don't let the bad luck ones scare me either, they get trashed.
(7) Before you forward an Amber Alert, or a Virus Alert, or some of the other ones
floating around nowadays, check them out before you forward them. Most of them are
junk mail that's been circling the net for YEARS! Just about everything you receive in an
e-mail that is in question can be checked out at Snopes. Just go to
http://www.snopes.com/
Its really easy to find out if it's real or not. If it's not, please don't pass it on.
CAUTION: Electronic mail sent through the Internet is not secure (unless you encrypt it) and could be intercepted by a third party. For your protection, avoid sending identifying information such as account, Social Security, or credit card numbers.
You just got a shiny new PC. It runs circles around your old computer. But now, the eternal question: How do you get rid of your old machine?
You shouldn't put it in the trash. Computer components are toxic. Instead, there are environmentally friendly options.
But before you do anything else, remove your personal information. Otherwise, your identity could be stolen. Deleting files isn't enough; they can be recovered. I will remove all your data and recycle your old computer at no extra cost.
It is critically important that you *always* keep your software up to date: this refers to MS Windows (the Operating System), your firewall, anti-virus, and anti-spyware / anti-malware programs.
If you do not update your system regularly, your computer is immediately vulnerable to Spyware, Viruses, and Hackers. Note that your computer can be attacked by simply visiting a malicious web page, clicking a browser link, or even if it's sitting idle while connected to the Internet. If there is an open door, someone -- or something -- just may find its way through. Disclaimer – Cindy is providing information on this web site as a free service providing information only. While we use reasonable care to see that this information is correct, we do not guarantee it for accuracy, completeness or fitness for a particular purpose. Cindy shall not be liable for damages of any kind in connection with the use or misuse of this information.
Microsoft and Windows are U. S. registered trademarks of Microsoft Corporation.Windows, Windows 10, Windows 8 and Windows 7 are either a registered trademark or trademark of Microsoft Corporation in the United States and/or other
From ignoring anti-virus protection to neglecting to back up data, even the most seasoned PC user may be guilty of risky or irresponsible usage habits. Here are the seven most common – and most dangerous – of those mistakes.
1. Failing to keep anti-virus protection updated
Almost all PC users know they need to have anti-virus protection. But that’s not enough: You have to keep the program up to date for it to be effective.
Most anti-virus packages include one year of free updates, but after that you‘ll need to purchase a subscription or uninstall the software and install next year’s version. Anti-viral software that automatically renews your subscription is one no-hassle way to keep your computer protected from the latest Internet threats.
2. Downloading unsafe material
Think twice before downloading music and movies from websites many of these peer-to-peer programs contain worms and viruses.
Also exercise caution with free utilities, screen savers, games, etc. These often are guilty of depositing spyware or malware on your PC. To prevent this, do some background research on any program you want to install, and make certain you have updated anti-spyware software.
3. Forgetting power protection
A single brief power surge or spike of electricity can seriously damage or even permanently destroy your PC.
A surge protector protects your equipment by channeling the extra voltage into the outlet's grounding wire, preventing it from flowing into the electronic device.
However, even the best surge protectors can’t protect your PC from the millions of volts that a lightning strike can cause. The best way to prevent lightning storm damage is to simply unplug your computer.
For businesses, a UPS (uninterruptible power supply) provides protection from all sorts of power disruptions, from a complete failure to voltage spikes.
4. Neglecting to back up data
This is probably the most potentially damaging, and most often overlooked, mistake made by PC users. So how can you avoid this popular pitfall?
Flash drives: Also known as memory sticks, these small, portable devices plug into any computer with a USB port and are perfect for storing data (capacity ranges from 2GB upwards).
External hard drives: As prices continue to drop, many users and businesses are turning to external hard drives as a backup solution.
Cloud backup such as Carbonate, Dropbox, OneDrive and even Google Drive
5. Ignoring Windows® updates
If you use Microsoft® Windows, you need the latest security patches and feature updates to keep your PC safe from security threats and support optimal functionality.
6. Misusing e-mail attachments
Attempting to send mammoth files (like videos or photos) can affect mail server performance and consume large amounts of bandwidth and storage. One easy solution: For larger files, compressed or “zipped” data allows much faster transfer times, increased bandwidth and disk space.
Also, when opening e-mail attachments, don’t forget to scan them first to make sure they are safe and don’t contain a virus.
7. Friends and family using your PC
Allowing other users access to your computer increases the likelihood of contracting a virus, having unwanted files and programs downloaded to your PC, and experiencing changes to your personalized settings.
But you don’t have to ban everyone or hide your notebook in the closet. Turn on the Guest account for other users. This setting prevents new program installation and changes to system settings.
If you find yourself with a hardware or software issue you need help with, contact me for service and support.
954-295-1058
cindy@computerwizardtech.com
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
Let me know you saw this and get $5.00 off my services
($5.00 off can not be combined with other offers and is only valid for services)
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
Disclaimer – Cindy is providing information on this web site as a free service providing information only. While we use reasonable care to see that this information is correct, we do not guarantee it for accuracy, completeness or fitness for a particular purpose. Cindy shall not be liable for damages of any kind in connection with the use or misuse of this information.
Microsoft and Windows are U. S. registered trademarks of Microsoft Corporation. Windows 7, 8 & 10 are either a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries.
Content copyright Computer Wizard Tech. All rights reserved.
Copyright © 2020 Computer Wizard Tech - All Rights Reserved.
Powered by GoDaddy