Saturday, February 26, 2011

Although in many situations it may be appropriate to list email recipients in the To: or CC: fields, sometimes using the BCC: field may be the most desirable option.  What is BCC?BCC, which stands for blind carbon copy, allows you to hide recipients in email messages. Addresses in the To: field and the CC: (carbon copy) field appear in messages, but users cannot see addresses of anyone you...
Although free email services are convenient for sending personal correspondence, you should not use them to send messages containing sensitive information.  What is the appeal of free email services?Many service providers offer free email accounts (e.g., Yahoo!, Hotmail, Gmail). These email services typically provide you with a browser interface to access your mail. In addition to the monetary...
Encrypting data is a good way to protect sensitive information. It ensures that the data can only be read by the person who is authorized to have access to it.  What is encryption?In very basic terms, encryption is a way to send a message in code. The only person who can decode the message is the person with the correct key; to anyone else, the message looks like a random series of letters,...
Digital signatures are a way to verify that an email message is really from the person who supposedly sent it and that it hasn't been changed. What is a digital signature?There are different types of digital signatures; this tip focuses on digital signatures for email messages. You may have received emails that have a block of letters and numbers at the bottom of the message. Although it may...
Using anti-virus and anti-spyware software is an important part of cyber security. But in an attempt to protect yourself, you may unintentionally cause problems.  Isn't it better to have more protection?Spyware and viruses can interfere with your computer's ability to process information or can modify or destroy data. You may feel that the more anti-virus and anti-spyware programs you install...
Many people browse the Internet without much thought to what is happening behind the scenes. Active content and cookies are common elements that may pose hidden risks when viewed in a browser or email client.  What is active content?To increase functionality or add design embellishments, web sites often rely on scripts that execute programs within the web browser. This active content can be...
Because of its popularity, the internet has become an ideal target for advertising. As a result, spyware, or adware, has become increasingly prevalent. When troubleshooting problems with your computer, you may discover that the source of the problem is spyware software that has been installed on your machine without your knowledge.  What is spyware?Despite its name, the term "spyware" doesn't...
Unfortunately, many users are victims of viruses, worms, or Trojan horses. If your computer gets infected with malicious code, there are steps you can take to recover.  How do you know your computer is infected?Unfortunately, there is no particular way to identify that your computer has been infected with malicious code. Some infections may completely destroy files and shut down your computer,...
Malicious code is not always hidden in web page scripts or unusual file formats. Attackers may corrupt types of files that you would recognize and typically consider safe, so you should take precautions when opening files from other people.  What types of files can attackers corrupt?An attacker may be able to insert malicious code into any file, including common file types that you would normally...