![]() |
Photo from 123RF |
- G Suite Updates: Avoid Editing Conflicts with Microsoft Office Files in Drive, Smart Compose in Gmail
- Windows 10's October Update is Out Now: The Best Features
- Anatomy of a Phishing Scam
- Information Security and Pop Culture: How Real-Life Social Engineering Techniques are Used in Movies and Television
- 6 Bad Habits That Are Destroying Your PC
- EDU in 90: Google Science Fair
G Suite Updates:
Avoid Editing Conflicts With Microsoft Office Files in Drive
As you may, or may not, know, it is possible to upload Microsoft Office files (Word, Excel and PowerPoint) files to Google Drive and edit them in their Office format with the Office Editing for Docs Sheets and Slides Chrome extension. This extension works well for those files that cannot be converted to G Suite format for whatever reason. The downside to this method is the collaboration doesn't happen in real time. In other words, if some one else is editing the file at the same time you are, you won't see it happening. An update coming in mid-October will change that. Real-Time Presence in in Microsoft Office will let you kow if someone else is editing or viewing an Office file in Drive. Here are the full details and features for this update, including a video showing how the feature will look and be used.Smart Compose in Gmail Similar to Autocorrect
In a couple weeks, Gmail will start to autocomplete our emails when we are composing them. This feature is similar to autocorrect on a smart phone. As you are typing, it will predict and complete the rest of the phrase or sentence. This may be either a huge time saver or very annoying, depending upon your preference. If you find you dislike this feature, you can turn it off by clicking the gear in gmail (upper right), select settings, looking for Smart Compose, and turning Writing Suggestions off. Full details can be found in the G Suite Updates blog.
Windows introduces new features to Windows 10 twice each year: spring and fall. The October update is one of those major feature updates. The monthly updates every other month include bug fixes and security patches. Per the previous article, don't worry about how to get the new update, let it come to you and back up your files first. Some new features include a Clipboard History (so you can paste more than just the last thing you copied), a dark theme, touch keyboard that now uses Swiftkey just like your phone keyboard, and a new Snip & Sketch tool to take screen shots and mark them up.
The most important lessons any online user can learn is how to protecto yourself online and via email. One of the most common situations to watch out for are phishine emails. On the surface, these emails look like they are from a person or company you know and trust, but there are always tell-tale signs that things aren't as they seem. Arm yourself with knowledge and read this post to protect yourself from accidentally giving away personal information or passwords. Tip: to verify a URL, you can also hover over it, and it's true path will be displayed in the lower left corner of your screen.
We unwittingly give away our passwords and answers to our security questions on a weekly basis. Think about all those quizzes on Facebook, or the memes asking if you remember your first car/pet/street, etc. These are all forms of social engineering, designed to glean information from you to access your online accounts. Even the fun "what's your leprachaun name" games that use a letter from your name, the month or year you were born, or anything else along those lines, to come up with your fun, new name are mining information that will provide answers to your security questions that are designed to access an online account if you forget your password. There are several videos in this post that clearly illustrate how quickly we reveal personal information without realizing it. Pretty much all the different types of social engineering are represented here. Although these examples are from movies, they are based on tactics used in real life. It's so important that we all remember to be very protective of our information. It's OK to be suspicious online!
We just expect our computers and devices to work, but as with any other complex tool we use regularly, there is some care and feeding on our part that needs to happen. Just like getting routine oil changes in our cars, not letting the car run in a closed garage, or cleaning the oven, there are certain things we need to keep in mind when using our computing devices to keep them running well.
Windows 10's October Update is Out Now: The Best Features
Windows 10's October Update is Out Now: The Best Features, from How-To Geek by Chris HoffmanWindows introduces new features to Windows 10 twice each year: spring and fall. The October update is one of those major feature updates. The monthly updates every other month include bug fixes and security patches. Per the previous article, don't worry about how to get the new update, let it come to you and back up your files first. Some new features include a Clipboard History (so you can paste more than just the last thing you copied), a dark theme, touch keyboard that now uses Swiftkey just like your phone keyboard, and a new Snip & Sketch tool to take screen shots and mark them up.
Anatomy of a Phishing Scam
Anatomy of a Phishing Scam, from Medium by David KoffThe most important lessons any online user can learn is how to protecto yourself online and via email. One of the most common situations to watch out for are phishine emails. On the surface, these emails look like they are from a person or company you know and trust, but there are always tell-tale signs that things aren't as they seem. Arm yourself with knowledge and read this post to protect yourself from accidentally giving away personal information or passwords. Tip: to verify a URL, you can also hover over it, and it's true path will be displayed in the lower left corner of your screen.
Information Secuirty and Pop Culture: How Real-Life Social Engineering Techniques are Used in Movies and Television
Information Secuirty and Pop Culture: How Real-Life Social Engineering Techniques are Used in Movies and Television, From Better Cloud, by Christina WangWe unwittingly give away our passwords and answers to our security questions on a weekly basis. Think about all those quizzes on Facebook, or the memes asking if you remember your first car/pet/street, etc. These are all forms of social engineering, designed to glean information from you to access your online accounts. Even the fun "what's your leprachaun name" games that use a letter from your name, the month or year you were born, or anything else along those lines, to come up with your fun, new name are mining information that will provide answers to your security questions that are designed to access an online account if you forget your password. There are several videos in this post that clearly illustrate how quickly we reveal personal information without realizing it. Pretty much all the different types of social engineering are represented here. Although these examples are from movies, they are based on tactics used in real life. It's so important that we all remember to be very protective of our information. It's OK to be suspicious online!
6 Bad Habits That Are Destroying Your PC
6 Bad Habits That Are Destroying Your PC, from PC Magazine by Whitson GordonWe just expect our computers and devices to work, but as with any other complex tool we use regularly, there is some care and feeding on our part that needs to happen. Just like getting routine oil changes in our cars, not letting the car run in a closed garage, or cleaning the oven, there are certain things we need to keep in mind when using our computing devices to keep them running well.
No comments:
Post a Comment