Ever mistype a Web page address? Mistype the URL? Like typing “Gogle” instead of “Google.” Ever click a result from a Google search that looked like the site you wanted but took you to something else? With maybe some scary ads? Well, these two articles (links below) are a reminder about this common way criminals… Continue reading Lookalike web page addresses
Category: Notebook
Posts about Apple MacBook computers and Windows-based notebook PCs
macOS 10.14 — mountains to the desert — High Sierra to Mojave
Today Apple officially released a new version of its macOS. The name of the new system — “Mojave” — celebrates the desert rather than the mountains of the High Sierra, and updates to version 10.14 from 10.13.6. Available on your Mac from the Apple Menu > App Store > Featured > Mac App Store, Apple… Continue reading macOS 10.14 — mountains to the desert — High Sierra to Mojave
Best PC anti-virus program?
An annual review by PC World: “Best antivirus: Keep your Windows PC safe from spyware, Trojans, malware, and more” (updated August 27, 2018): Antivirus software is nearly as crucial as a PC’s operating system. Even if you’re well aware of potential threats and practice extreme caution, some threats just can’t be prevented without the extra… Continue reading Best PC anti-virus program?
Charging your smartphone battery — best practices
I’ve followed this topic for years: When and how often to charge your smartphone’s battery. What to do and not — in order to prolong the usable life of that battery (and so not worry about replacing the battery before you’re ready to get a new smartphone, eh). For many of us, charging the battery… Continue reading Charging your smartphone battery — best practices
Phishing attacks — fake “Apple” emails
I’ve noticed these types of scams for awhile: email messages (supposedly) from Apple purportedly about a payment or Apple ID or login from another device (which in fact you may not own). More and more email apps (especially on mobile devices) do not permit examination of the raw message text, which often permits detection of… Continue reading Phishing attacks — fake “Apple” emails