<$BlogRSDUrl$>

Saturday, April 03, 2004

Handy Keyboard Shortcuts in Microsoft Office  


Learn these helpful keyboard tricks to work more quickly and efficiently—without using your mouse

Like this one is the one I use to go back and forth alot when I'm coping from one window to this, the blog window;

Switch among applications: Windows-Tab or Alt-Tab.

The Windows-Tab combination cycles through the taskbar buttons. When the program you want is selected, hit Enter to switch to that window. If more than one program is running, Alt-Tab brings up the task-switching window. Immediately releasing the keys switches you to the previous application. To jump to one of the other running programs instead, release Tab, but keep Alt held down. Each succeeding press of Tab moves the program selection box to the next application. Releasing the Alt key switches you to the selected program. If only two applications are running, Alt-tab toggles between them. So, why or when would you use this; when you use Ctrl + C to copy something you want to use Ctrl + V (velcro or Paste it) somewhere else. Like to your blog. LOL.

Moving Around Windows and the Desktop

Shortcuts that let you move from one window to another easily, get to the Windows desktop, or move around the desktop can speed you up considerably.

Open the Start menu: Ctrl-Esc or Windows.

Either shortcut will open the Start menu. Use the Up and Down Arrow keys to move through the menu, and the Enter key to choose an item. The two shortcuts vary slightly depending on your version of Windows. Ctrl-Esc, Esc leaves the Start button selected but not pressed. In Windows 95, 98, and NT 4.0 (but not Windows 2000 and Me), Windows, Esc will return you to the window or desktop selection you were working with previously.

Go to the Quick Launch toolbar and launch a program: Ctrl-Esc, Esc, Tab, select with Arrow keys, Enter.


Minimize all open Windows and reveal the desktop: Windows-M or Windows-D.
Mnemonics: This one's easy to remember; M for Minimize all and D for desktop. Note that Windows-D doesn't work under Windows 95, but Windows-M does.


Restore all Windows you previously minimized with Windows-M or Windows-D: Shift-Windows-M or repeat Windows-D: Shift-Windows-M or repeat Windows-D.


Move within the Windows Desktop and select items: Tab, Arrow, Enter.

Once at the desktop, use the Tab key to cycle through the Start button, Quick Launch toolbar, other toolbars, taskbar button area, and icons on the desktop (and those in the system tray in Windows 2000). Use the Arrow keys to move around within any of these areas of the desktop or taskbar. Use the Enter key to select items. You must, for example, select the Start button to open the Start menu.

Windows Housekeeping Chores

These shortcuts can help you with day-to-day housekeeping in Windows.


Open the Run dialog box: Windows-R.
Mnemonic: The Windows Run dialog.


Start Windows Explorer: Windows-E.
Mnemonic: Windows Explorer.


Find a File (from the Windows desktop): Windows-F or F3.
Mnemonic: Windows Find file dialog box.


Open the System Properties dialog box: Windows-Break.
Mnemonic: Windows is broken; check the system properties.


Rename the selected object: F2.
Mnemonic: This is the same command Excel uses for editing the currently selected cell. This command and the next one work within programs, too. For example, you can use these commands when working in the File | Open dialog box in Word or Excel. Note that after you select text in Word, F2 begins the operation of moving the current selection. You then move the insertion cursor to the desired location and hit Enter.


Delete selected objects without sending them to the Recycle Bin: Shift-Delete.
Mnemonic: A slightly shifted version of what happens when you hit Delete, which sends the objects to the Recycle Bin. Be careful with this command. Under some conditions, it will delete a file without asking for confirmation first.


Bypass the CD-ROM AutoRun feature: Hold down the Shift key while you insert the disk.
This is an invaluable tool when you have to remove a disk during installation (to read the CD key, for example), then reinsert the disk.


View the Properties dialog for a selected object: Alt-Enter.
This works for such disparate objects as icons on the desktop, printers, hard drives, and the taskbar.

Windows-Wide Shortcuts

The shortcuts in this category work not only in Windows itself, but also in most Windows applications. Some of these shortcuts relate to the windows of a particular application. Others relate to features you'll find in almost any Windows program, such as drop-down list boxes.


Restore, Move, Size, Minimize, Maximize, or Close the main window of the currently selected program: Alt-Spacebar, letter key (from those underlined above), or Alt-Spacebar, Arrow, Enter.

Alt-Spacebar opens the System menu, which will appear on-screen even if the application window is mostly off-screen. You can move the window back to a workable position using the Arrow keys and then hit Enter to set it down.


Restore, Move, Size, Minimize, Maximize, or Close the currently selected window within a program: Alt-hyphen, letter key, or Alt-hyphen, Arrow, Enter.


Open a context menu: Shift-F10, letter key, or Shift-F10, Arrow, Enter.

This is particularly useful in a program like Word when, for example, you want to call up the editing context menu but don't want to take your fingers from the keys to right-click.


Open a drop-down list box: Alt-Down Arrow.
Mnemonic: Down box, Down Arrow. This is especially helpful when you're filling in database forms (in Microsoft Access, for example). It's also useful when working in a dialog box.


Cycle through the tabs in a dialog box: Ctrl-Tab and Ctrl-Shift-Tab.
Mnemonic: Control your way from tab to tab. Ctrl-Tab goes from left to right, Ctrl-Shift-Tab moves from right to left.


Switch from window to window within the same program: Alt-F6.

This won't work with all windows. It will, for example, toggle between a Find window and a document window in Microsoft Word, but it won't toggle between one document window and another. The command in Word for cycling through the open document windows is Ctrl-F6.


Basic font formatting for bold, underline, italic: Ctrl-B, Ctrl-U, Ctrl-I.

You probably know these work in the Office programs you use, but try them in other programs as well; they may work.


Undo: Ctrl-Z.
Mnemonic: Zap that. Again, this works throughout Windows, if not in every program.

Microsoft Word Shortcuts

Word offers over 300 shortcuts as shipped, not including the menu shortcuts. This adds up to more shortcuts than any reasonable person would be willing to memorize. There are a few, however, that we've found are worth the effort.


Expand an autotext entry: F3.
If you use autotext very often, you'll get the hang of this one. Simply type the abbreviation (such as your initials for your address) and hit F3 to replace the abbreviation with the fill entry.


Change the case of letters: Shift-F3.
The effect of this shortcut depends on the selected text. The basic behavior cycles through all caps, all lowercase, and title capitalization (the first letter of each word capitalized). If the selection includes a sentence break, the shortcut cycles through all caps, all lowercase, and capitalization of the first word in each sentence.


Check spelling: F7.
F7 by itself performs a spell-check on the entire document. If you select a word or section first, however, F7 checks the spelling of only that word or selection. If you have the Check Spelling As You Type feature turned on, this shortcut probably won't interest you. If you find that feature distracting and keep it off, you might find this shortcut quite useful.


Check the thesaurus: Shift-F7.
Mnemonic: There's not really a good mnemonic, but remembering that the F7 key is associated with both spelling and thesaurus commands might help. Shift-F7 checks the thesaurus for the word the cursor is on or just past.


Update fields: F9.
Mnemonic: Again, there's not really a good mnemonic. All shortcuts dealing with fields use the F9 function key, though. Remember that much and you can, at the very least, experiment with various keystroke combinations. F9 by itself updates the selected fields, if any, or just the field the cursor is in.


Switch between the field code and field result for selected fields: Shift-F9.
Mnemonic: Shift between selected field codes and field results.


Switch between showing all field codes and their results: Alt-F9.
Mnemonic: Show all (Alt) codes or results.


Insert field markers: Ctrl-F9.
Mnemonic: Control what goes into the field. If you know the field codes you need to enter, use Ctrl-F9 to insert both open and close markers for the field quickly, then type your codes between them. Hit F9 to calculate the field result.


Unlink a field: Shift-Ctrl-F9.
Mnemonic: Shift control from the field to the field result. This converts a calculated field result into permanent text or a permanent graphic.


Insert Date field: Alt-Shift-D.
Mnemonic: Date. To insert the date as text, type Alt-Shift-D, Backspace, Ctrl-Shift-F9.


Insert Time field: Alt-Shift-T.
Mnemonic: Time. Again, to make the insertion as text, follow the shortcut with Ctrl-Shift-F9.


Move to the Style drop-down box to pick a style: Ctrl-Shift-S.
Mnemonic: Take Control to shift the Style. Once you get to the Style text box, you can open the drop-down list with Alt-Down Arrow.


Format characters as superscript: Ctrl-+.


Format characters as subscript: Ctrl-= (equal sign).
Mnemonic: Superscript is +. Subscript is the unshifted form of +.


Return font to the default format for the style: Ctrl-Spacebar.
If you depend on styles for formatting, this is one of the most important shortcuts to learn—particularly if you collaborate with others who may not be familiar with styles.


Toggle between showing and hiding nonprinting characters: Ctrl-Shift-* (asterisk).
This is equivalent to clicking on the Show/Hide icon in the standard toolbar.


Move the paragraph up: Alt-Shift-Up Arrow.


Move the paragraph down: Alt-Shift-Down Arrow.
This moves the paragraph containing the cursor or selection one paragraph marker at a time.


Cycle the selected paragraph through all formats in the Style list: Alt-Shift-Right (or Left) Arrow.

Microsoft Access And Excel Shortcuts

Here are two handy shortcuts that work for both Access and Excel.

Enter time: Ctrl-: (colon).


Enter date: Ctrl-; (semicolon).
Mnemonic: You separate hours and minutes with a colon, so use a colon for time. The date shortcut is the unshifted colon key.

Just come back here and learn them one or two a week. Learn'em use'em and you'll remember'em

MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

PCMag.com Security Watch Newsletter.  



Every week we bring you an overview of the current viruses, worms and other threats that are trying to get to your computer.

This past Friday also brought a new Bagle variation (what else is new?). W32/Bagle.U-mm brings up the Window's Hearts card game when it infects and a blank message body It has been rated a medium-to-high threat by antivirus vendors.

A new version of the Sober virus, Sober.E, was starting to spread on Sunday. Originating in Germany, this version differs from previous ones in that it's completely in English. The worm has been rated a low-to-medium threat by several antivirus vendors.

The latest phish e-mails we've seen are a Citibank one out of Australia with a real sounding URL and an intricate HTML BankOne message from South Africa. Both however, are linking to web sites that are down.




MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

Friday, April 02, 2004

There no such thing as a dumb question, see... Thanks Frank 


Q. Just a question on Zone Alarm. I recently switched to a cable modem
for connection to the Internet. I have also put in a wireless network.
I was told by the network router support staff that the router has a
firewall in it and I do not need Zone Alarm. Is this the case?

A. Most routers include firewalls. And, in general, those firewalls
work very well. So it is entirely possible that you have been given
good information.

Check that you have installed the router correctly, and that the
firewall is properly configured. Then use an Internet test site to
probe the firewall.

I like the site run by Gibson Research. Its ShieldsUp! program will
quickly tell you if your computer ports are open. If they are, you're
vulnerable. A firewall's job is to make those ports invisible to probes
sent out by hackers. Gibson's site is at:
http://grc.com/x/ne.dll?rh1dkyd2

If ShieldsUp! tells you that your ports are invisible, then the router
firewall is sufficient. If it finds flaws, install Zone Alarm. It's
free at: http://www.zonelabs.com/



MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

Sound bite test, see if you can get to recordings I've made for ya 




http://f1.pg.briefcase.yahoo.com/the_web_ster

MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

Several people sent links to the following story. 



A California man installed a keylogging device on his boss's computer and was caught. He has been indicted by a Federal grand jury on wiretapping charges.

Wiretap whistleblower indicted on spyware charges

A former employee at an Anaheim insurance company has been indicted on US federal wiretapping charges for allegedly installing an electronic device on a company computer that recorded every keystroke made by a secretary to a company executive.

Larry Lee Romp, 46, of Huntington Beach, was indicted by a federal grand jury in Los Angeles on a single count of endeavoring to intercept electronic communications, a violation of the federal wiretap statute. Romp, who was employed by Bristol West Insurance Group/Coast National Insurance Company until he was terminated in September 2003, is scheduled to be arraigned on the indictment on April 5.

More: http://www.in-sourced.com/article/articleview/1529/1/1/



Spyware at center of wiretap case

A Los Angeles-area man was indicted today for allegedly installing a tiny, almost imperceptible hardware device to spy on his boss's every keystroke, in a case that shines a spotlight on the ease with which spy technologies now can be purchased and used by consumers.

The $49.95 device, called a Key Katcher, is barely the size of a child's pinkie, but it has 46-year-old Larry Lee Roppin a heap of trouble. Romp, who says he was acting as a whistleblower, was indicted by a federal grand jury for illegally intercepting electronic communications and now faces up to five years in jail.

More: http://msnbc.msn.com/id/4595662/




MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

Thursday, April 01, 2004

Walter Mossberg April 1-04 - New Web Music Stores Offer Unique Features, And One Is a Winner 


April 1, 2004

By WALTER S. MOSSBERG

Legal music downloading is slowly gaining traction. More and more companies are offering online music stores, and the number of songs available at most of them has now crossed 500,000.

Apple Computer, the first to offer a good legal download service, is still the leader, by far. Its iTunes music store has sold more than 50 million tracks since last April. Nobody else is even close.

But recently, two other big names have launched their own music download stores to challenge Apple and to stake a claim before Microsoft jumps into the business later this year. One is RealNetworks, long a leader in digital audio. The other is Wal-Mart, the giant retailer. I've been testing the new RealPlayer Music Store and the Wal-Mart music download service, and comparing them to the iTunes store. My verdict: thumbs up to Real, but thumbs down to Wal-Mart.

Wal-Mart's service, which is available under Music Downloads at www.walmart.com, has just one thing going for it: price. Unlike the other major legal services, which charge 99 cents a song, Wal-Mart charges 88 cents.

But that 11-cent savings comes at a steep cost. Wal-Mart's download service is much clumsier, slower and more complicated to use than any of the other major services. It shows a fundamental cluelessness about how digital music lovers like to buy and play music.

Apple, Musicmatch and now Real embed their music stores in music jukebox software, which also handles your existing music collection. This software manages your play lists, imports music from CDs, burns your songs to custom CDs, and transfers music to portable players.

But Wal-Mart's service is just a Web site, with no jukebox software. Buying music there is like buying garden tools. You have to go through a laborious process involving shopping carts and checkout procedures.

At Apple's store, you buy songs with a single mouse click, and at most others, two mouse clicks is the maximum. But in tests of the Wal-Mart store, it took at least eight steps to buy a single tune, and then you have to fire up a separate program, Windows Media Player, to play the music. And before the music plays, the Media Player tells you it has to "Acquire a license." The whole process is annoying.

Also, unlike other major download sites, Wal-Mart doesn't include album art with its songs. I'd rather pay 11 cents more per song than endure the deficiencies of the Wal-Mart service.

By contrast, the RealPlayer Music Store is quick, slick and designed for music lovers. It is a part of Real's latest jukebox program, RealPlayer 10, which can be downloaded free at www.real.com.

Both Real's Web site and the RealPlayer software have been overhauled to make them simpler and easier to use. In the past, I have criticized Real for being overly aggressive and intrusive, plastering its icons and links all over your PC. But in the new music store and jukebox software, Real has dropped this approach. It politely asks if it can place icons on your desktop.

The RealPlayer store organizes music brilliantly, sorting songs into more than 500 sub-genres, and offering loads of intelligent commentary on the genres and artists. For instance, at Apple's store, there's one "Country" genre. But in Real's store, you get 15 sub-genres of Country. If you click on one of them, "Traditional Country," you get another eight categories, including "Square Dancing" and "Yodeling."

Buying any song takes just two clicks, and you can reduce that to one click by changing an option setting.

Also, the song files Real sells are recorded at a higher quality level than the downloads of the other major legal stores -- 192 kilobits a second, compared with 128 kilobits for Apple's songs and 160 kilobits for songs on Musicmatch. This makes for better sound if you have discriminating ears. But there's a price. Real's song files take up about 50% more space on your hard disk than the identical songs purchased from Apple.

Another big advantage for Real: Its jukebox program is the only one I know of that can play all the major copy-protected formats used by the competing download services as long as you are on a computer that is authorized for playback by those other services. For instance, I downloaded Sheryl Crow's "The First Cut Is the Deepest" from the Apple, Real and Wal-Mart stores, and only Real's software could play all three versions.

But there are some drawbacks to the RealPlayer store. It sells songs in its own proprietary format, which only one portable music player, the Creative Nomad Zen Xtra, can play back. Apple's downloads also play on just one portable device, but it happens to be the iPod, which is by far the most popular player. Wal-Mart's downloads can be played on numerous devices.

The process of setting up play lists or searching for music is clumsier in RealPlayer than in iTunes. And, unlike Apple and Napster, Real doesn't include historical Billboard charts, a very handy tool for finding music. Also, in the new RealPlayer software, album art doesn't always show up, and when it does, it's displayed as a tiny, blurry image.

But, all in all, the RealPlayer Music Store is a winner. It's not as good as Apple's iTunes store, but it's a worthy competitor.

Write to Walter S. Mossberg at mossberg@wsj.com
END

And listen to Walter on TV on CNBC on Thursdays sometime between 10 AM and 11 AM.

And if your Political try listing to the new Al Franken show on www.airamericaradio.com 9 to noon over the net



MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

Tuesday, March 30, 2004

Clever hackers use social engineering tricks to make you reveal sensitive information. Don't fall prey to their wiles. 


What's the weakest link in your network security infrastructure: your firewalls, antivirus systems, telecommuter PC, road-warrior notebooks? Here's a hint: Go look in the mirror. Most security experts agree that a clever hacker can penetrate almost any network simply by asking the right users for the right information. Using a variety of manipulative techniques—together known as social engineering—that exploit a human being's natural desire to trust and help others, or to gain something for nothing, hackers can learn user names, passwords, and other information that allows them to penetrate networks—even those secured with the most advanced technology.

If you find this hard to believe, take a look at "Five Tricks Hackers Use on You".

1. You receive an e-mail promising a chance at a prize of thousands or millions of dollars. All you have to do is fill in a form with your user names and passwords. You'd be amazed at how many people answer such e-mails and use the same user name and password they use on the company LAN. By sending such e-mails to tens or hundreds of employees, hackers are likely to learn at least a couple of users' network log-on information.

2. A dialog box pops up with a message that says you've lost your network connection and asks you to type in your user name and password to regain network access. Or you get an e-mail message from Microsoft, telling you to run the attached security update. Do you trust that the dialog box and the e-mail are legitimate?


3. You go out for a smoke and join a group chatting about trouble with the company's messaging servers, during which server names, as well as network and system quirks, are discussed. You don't know everyone, but, hey, it's a large company. After a while, everyone heads inside. Or you discuss the same subjects at your company's favorite local pub and a hacker just happens to be hanging out at the bar.

4. Someone shows up saying that the boss, who is on vacation, asked him to come by to fix "that Outlook problem." That sounds believable. Doesn't everyone have an Outlook problem?

5. You get a call from a woman claiming to be the president's executive assistant, who says the president asked her to obtain certain personal and user information from you. She dispels your doubts by rattling off the names and nicknames of cooperative colleagues and casually mentions some facts that only an insider is likely to know.



Now consider how you might respond in such situations. But the techniques explained there are only a few of the hundreds hackers use to gain valuable information.


In fact, hackers can gain a lot of information without talking to anyone, simply by surfing company Web sites for executive titles, financial information, organizational charts, and employee e-mail addresses and phone numbers. They can also sift through company trash for org charts, employee directories, system and application manuals, marketing plans, memos, company letterhead, human resources manuals, financial printouts, and procedure/policy manuals. Hackers use this information to gain the trust of others through phone calls and e-mails, often masquerading as an employee, customer, or consultant and convincing employees to provide information that can, little by little, get them into company LANs.

The techniques for eliciting information from staffers are similar to those used in any con. They include

overwhelming the target employee with lots of different information and strange questions or using strange and confusing arguments that make it difficult to process what is happening;

helping the target with some technical problem, possibly one that the hacker has created. This is often called reverse social engineering;
making statements that elicit strong emotions or using intimidation tactics;
in the case of resistance, yielding on one or more small points. After a while the target often feels he must yield to other requests in return;
sharing information and technology over time without asking for anything in return—at least not at the moment. When it comes time for the hacker to request information, the target feels he must reciprocate;
pretending to have the same interests as the target, perhaps through information gained in user groups;
pretending that the target can help a fellow employee fulfill an important commitment that employee has made;
maintaining a seemingly innocent, friendly relationship with the target during which the hacker learns, bit by bit, company jargon and the names of key employees, servers, and applications.
Remember that a very large percentage of security breaches originate internally from disgruntled employees or from nonemployees—such as consultants, partners, and so forth—who have system access. People rarely question the actions of insiders.

Of course, social engineering doesn't target only companies. The same techniques are also used against individuals to gain personal information such as credit card numbers, user names, and passwords for accessing popular e-commerce sites. One common technique is phishing, which uses a combination of e-mail messages and fake Web sites to convince users they are dealing with a major company.

If you still have doubts about the efficacy of social engineering, take a lesson from the best. Kevin Mitnick, the notorious late-20th-century hacking superstar has said again and again that he penetrated networks much more easily by manipulating people than by technology.

The truth is that most companies spend a lot more money and resources tackling security with technology than with people. But most products and technologies are not designed to protect against social engineering. So what do you do?

You should approach the problem from two angles: protecting the physical spaces that are commonly penetrated, such as offices, dumpsters, and Web sites, and protecting users through clear policies and ongoing education.

Physical security is the easier part. Here are some important tips, many of which overlap physical security and policy.

Make sure all employees and visitors wear identification badges. Require that visitors be escorted to their destinations.
Determine which documents must be kept locked away at all times and which require shredding on disposal.
Keep your dumpsters in secure, locked, and monitored locations.
Make sure that all systems, including client PCs, are protected by strong passwords that change frequently. Implement and enforce screensaver passwords that take effect after a few minutes of idle time.
Encrypt files stored on hard drives that contain confidential information.
Avoid posting too much information on your public Web site.
Policy and training are harder. Employees may not understand the value of the information they give away. They must be educated continually on how to respond to unknown people requesting information, and they need to be aware of how easily they can be manipulated.

One of the best ways to give employees insight is to hold a training session and before it begins, use social engineering techniques to elicit confidential information from them. Then have the teacher amuse the class by telling them what she or he learned and from whom.

You need to draw up clear policies on what type of information should not be divulged under any circumstances. Seemingly simple tidbits, such as a server name, organizational structure info, or company jargon, can be invaluable to a hacker. Your policies should spell out clear rules for information access, setting up the physical security and safeguards outlined above. Make sure there are clear penalties for violating those policies. It's much easier for employees to refuse to divulge information if the policy is clearly spelled out.

Tools for fighting social engineering are rare, but content filtering and antispam products, such as MailFrontier Matador, can be configured to detect signs of fraudulent e-mails or to prevent employees from giving away sensitive information. Matador in particular uses a number of patented techniques to detect phishing and other suspicious e-mails.

Fighting social engineering is a continuous battle in which the attackers find clever ways around existing safeguards. It's important to keep up with the new tactics social engineers use and to implement policies to stop them quickly. And keep reminding employees that they are the true corporate firewall.

MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

Sunday, March 28, 2004

MONEY MATTERS - Opera, my "other" browser, goes PUBLIC 


Not very long ago I put in an entery about how Opera, that OTHER browser I use, is going to start using IBM's ViaVoice so that it can be running by voice.
Now, I've come to learn another bite of news, Pera has done Public. If you want to learn more go to http://www.eweek.com/article2/0%2c1759%2c1547564%2c00.asp. And note the LINKS to more info in the "Related Links" box to the right side of the page.
Sorry but I've got to go now and send an email to my friend in Norway to get the name of his broker there.


MY ADVICE endeavors at keen.com. The number is 1-800-275-5336 (800-ask-keen) + ext. 0329063 for tech stuff, 0329117 for running a small business, and 0329144 on investing. Want to CHAT, I use Yahoo's IM as the_web_ster. View me in the Friends & Family part of webcamnow.com, just click on "view cams", then in the Java window click on WebcamNow Communities drop down arrow & select Friends & Family. Under the live webcams look for & click on me "the_webster".

This page is powered by Blogger. Isn't yours?