Arbitrary link control: Set font level to default

Links to our network of professionals

 

Links to Computer staff...Search Engines that do not track you.  more

From the time that we started introducing the Internet in our daily activity, we started compiling a list of the most impressive web-sites that our research had broght in our path and now that we created our web-site, we decided to publish part of that list in our site, in our oppinion the sites are of a great value to the user of a computer and interest in new devices.

  • Download freeware / shareware
  • www.download.com
  • Software for Windows, Linux and Macintosh
  • www.tucows.com
  • A great resource for Windows device drivers
  • www.windrivers.com
  • Knowledge-base for Windows / general computing
  • www.ultratech-llc.com
  • Online IT-specific encyclopaedia of computer terms
  • www.whatis.com
  • Resources for Widows 2000, XP, and 7
  • www.windows-expert.net
  • Free online computer support
  • www.computerhope.com
  • Reports on the latest software and hardware (PC)
  • www.sharkyextreme.com
  • A complete guide for computer hardware
  • www.tomshardware.com
  • Current news Re: UNIX and LINUX
  • www.slashdot.org
  • Online database explaining Windows event log errors
  • www.eventid.net
  • Online documentation for all operating systems
  • www.help-site.com
  • Info. Cutting Edge Devices and much more!...
  • www.komando.com
  • If you really need help right now!
  • www.justanswer.com
  • Call timing in 3 or more time zones!
  • World Meeting Planer...
  • Do you want to know the "Any web-site's Rating"
  • Page Rank Checker
  • If you have a web-site and need links, check it out
  • Powerful Links Directory
  • And now the best Search Engine
  • Search Engine
  • Other Search Engine
  • Just a Search Engine, no other purposes.
  • Check your I.P. speed
  • What's your I.P. speed?
  • Check your I.P. Speed
  • Test your connection speed..Test your Internet connection speed at Speedtest.net
  • Stay up to date, internet terminology
  • Computing Terminology

     

    Please be advised that this not a complete list of websites relating to computers, and if you have any problems with the sites listed above please let us know, and of course if you have positive experiences with the sites listed on our list, please also let us know....We will update this list from time...to time...

     

    Be safe on the Web... more...

     

    Safety on the Web being such an important and quotidian issues we decided to have summary in our Web Site. So here is a presentation of the major browsers in North American market... A Web Browser is software application that allows you to visit Web pages, Sites.
    What is an address bar? ...more...
    Address Bar also known as a URL bar, this is the box at the top of the browser, that displays or holds the URL or Web address of the page, site you are visiting.
    How do I know, I'm using a safe web-browser?... more...
    • Check to make sure you're using the latest available version of the browser, (for your computer).
    • It offers automatic software patches and upgrades
    • It comes with Anti-fishing functionality that lets you know when you're on a suspicious page or site.
    • It protects data with powerful 128-bit encryption.
    How do I know what kind of browser I'm using? ...more...

    With most browsers, simply open the browser, click Help, and select About

    Which browsers come with anti-fishing feature? ...more...

    • Microsoft Internet Explorer 7 or later
    • Mozilla Fire fox 2 or later
    • Opera 9.1 or later
    • Safari 5 or later
    What is meant by HTTP and HTTPS? ...more...

    HTTP (Hyper Text Transfer Protocol) is a format commonly used to send data over the Internet. HTTP data is not encrypted, making it potentially vulnerable to hackers.

    HTTPS (Hyper Text Transfer Protocol using Secure Sockets Layer) encrypts so it can be sent over the Internet more safely. When you enter a URL (a Web address) into a browser, the address will generally begin with either HTTP or HTTPS Another indication HTTPS is in use is the presence of a small padlock icon on the address bar (the top of the browser).

    What is the meaning of SSL? ...more...

    SSL (Secure Sockets Layer) is a secure communications protocol used by browsers, websites and applications to protect information sent over the Internet. SSL protocol uses encryption and authentication technologies to ensure that only the intended parties can access the information.

    What is an Extended Validation SSL Certificate (EV SSL)?... more...

    The EV SSL is a digital certificate that provides secure connections to websites. The EV certificate is an improvement over standard SSL certificates because it requires corporations to pass extensive audits and certification processes to prove they own their site domains.

    Fishing, what it is?  ...more...

    You may have received an e-mail falsely claiming to be from some known entity. This is called "fishing" because the sender is "fishing" for your personal information. The goal is to trick you into clicking through to a fake or "spoof" website, or into calling a fraudulent customer service number where they can collect and steal your sensitive personal of financial information.

    If you have opened a fishing e-mail but have not clicked on any links, you shouldn't have anything to fear. If you have clicked on a link, or you have downloaded an attachment, read our ,Identity Protection Guide to learn what to do next.

    It's also important to report the fishing e-mail or spoof site as soon as possible in order to protect yourself-and to help your fellow internet users.

    Examples of Fake Web-Sites. Deceptive URLs  ...more...

    Some criminals will place a fake browser address bar over the real one, so it appears you're on a legitimate website. But even if the URL contains a part of a legitimate web-site, if you look closely, you will see that the rest of the address contains elements that should not be there at that time 

      Example of fake Web-sites:

       

      The following examples are for links that you might receive in an e-mail, urging you to "correct","verify","confirm","unsubscribe"; or do something in your account, for your protection,

      • http://signin.[legitimate web].ca@10.19.32.4/
      • http://83.16.124.28/[legitimate web-site]/update.htm?=
      • https://www.[legitimate web-site].ca/=cmd_login_access
      • www.secure-[legitimate web-site].ca
      Note: There are other combinations of fake web-sites, it will take too much time to cover them all.
    Identity Protection....  more....

    Identity Theft is when someone steals your personal or financial information and uses it to open accounts and make unauthorized transactions in your name. According to the Federal Trade Commission, it's one of the fastest growing crimes in the world today, so the more you know aobut it the better.

    Identity theft is difficult to undo, and repairing your financial reputation can be a frustrating, expensive, and time-consuming process. That's why prevention is the best protection there is. Your personal information is extremely valuable to you (and to identity thieves) so you should always treat it with care.

    The best way to combat these criminals is to become familiar with the tricks of their trade. Thake the time to learn how to recognize e-mail scams, identify secure websites, and create passwords that are stronger than a criminal's will break them.

    Fighting Identity Theft....  more...

    If you suspect that someone has stolen your personal information. It's critical to act as quickly as possible to minimize potential harm to your financial reputation.

    Here's what you need to do:

    • 1. Contact your Financial Institutions Immediately
      Ask for the fraud departments, explain your situation, and ask them what they can do to help. 
    • 2. File a complaint
      Before contacting your financial institutions, file an identity theft complaint to the "Identity Theft Data Clearinghouse" developed to handle identity theft complaints. Contact the Human Resources Development Canada (HRDC) if someone has used your Social Insurance Number to apply for government services. This will help you deal with any questions form your bancks and credit card companies.
    • 3. Report the Incident to Law Enforcement
      Call the police and file a report right away. This will help your crdibility when you're speaking with the banks and credit card companies.
    • 4. Place a Fraud Alert on Your Credit
      With a fraud alert on your credit, banks and credit card companies will have to contact you before opening any new accounts in your name.
      • Equifax: 1-800-465-7166: www.equifax.ca; Consumer Relations Department, Box 190, Jean Talon Station, Montreal, Quebec, H1S-2Z2.
      • TransUnion: 1-800-663-9980;(7289) (Outside Quebec) or
        1-877-713-3393 (Quebec residents only); www.transunion.ca; Fraud Victim Assistance Department, P.O. Box 338, LCD1, Hamilton, On, L8L-7W2, (Outside Quebec); Centre De Relations Aux Consommateurs TransUnion, 1 Place Laval Ouest, Suite 370, Laval, Quebec, H7N-1A1 (Quebec residents only)
      • Be careful
        It's critical that you check your account activity and balances regularly after an identity theft has occurred. You should also order a crdit report every now and then to make sure nothing's out of order. Canadians can get a free credit report from: http://canadian-creditreport.com/
      • RCMP RCMP In this site you will find the scam(s) flavour of the week, and more details about what to do."http://www.antifraudcentre-centreantifraude.ca/"

    E-Mails and Attachments

    E-Mails and Attachments....  more...

    There are many signs of a fraudulent e-mail

    • Sender's Address
      The "from" line may include an official-looking address that mimics a genuine one.
    • Generic Greetings
      Be wary of impersonal greetings like "Dear User" or something similar...(Reputable Web-sites will use a formal form of addressing)
    • Typos/Poor Grammar
    • False Sense of Urgency
      Many scam emails tell you that your account will be in jeopardy if something critical is not updated right away.
    • Fake Links
      Check where a link is going before you click, by hovering over the URL in an email, and comparing it to the URL in the browser or the URL that you know.
    • Attachments
      Because they can contain spy-ware or viruses, you should never open an attachment unless you are 100% sure it's legitimate.

     

    This Web-Site is powered by 100% Green Energy