Link to E-Interface
 

Inside This Issue

Surfer Beware
Hackers Now Compromising Legitimate Websites

58th Annual Meeting - Monday, May 12, 2008

Ask The Help Desk
What Do The Terms "Freeware" And "Shareware" Mean?

Sites Of The Month
Great Sites To Check Out In May

Short Tutorial
Removing Contacts From Your Address Book



   

Hello West Central Internet Subscribers

We've filled this May issue with information you need to know as well as fun ideas you'll want to know. First, there's a warning that hackers are now compromising legitimate websites to launch attacks, along with tips on what to do to help protect your computer. Keep reading to understand the difference between freeware and shareware, and learn how to remove contacts from your e-mail address book. Great Sites section then offers ways to help you enjoy spring even more — including a new action flick, RV vacation pointers, and recipes for grilling.

The goal of each of our monthly eNewsletters is to keep our subscribers informed regarding their Internet connection and to improve their Internet experience. We think you'll find this information interesting. If, however, you'd prefer not to receive these bulletins on a monthly basis, click here.

To see what's inside this issue, simply scroll down the eNewsletter or click on the links within the index to the left. Thanks for reading!

- West Central Internet Services Team
 
 
 

 

Surfer Beware - Hackers Now Compromising Legitimate Websites

In the past, users had to visit intentionally malicious websites or click on spam e-mail attachments to become a victim of a security threat. Now hackers are starting to compromise legitimate sites and use them as a distribution medium to attack home and enterprise computers. Symantec, a leading cybersecurity firm, recently reported that it detected 711,912 such threats last year, compared with 125,243 in 2006.

According to Symantec, the attacks are particularly targeting sites that are likely to be trusted by end users. These include major search engines like Google, browsers like Mozilla, and social networking sites like Facebook. In the case of Google, hackers use a chink in Google's site to redirect unsuspecting PC users to sites tainted with malware. This enables them to use the PCs to spread spam and carry out scams. Typically, it also lets the hackers embed a keystroke logger to collect passwords and other sensitive data. Google is working on new tools to detect and block malicious Web pages.

To protect your computer, we strongly encourage our Internet customers to be diligent about security and regularly update your antivirus software. New viruses and worms are discovered daily and can be spread many ways — over networks, through attachments, through even legitimate websites, via devices connected to your computer, and by storage media such as Zip drives and CDs. Remember to also scan all file attachments of incoming e-mail messages, even messages from people you trust. You have the ultimate responsibility for protecting your computer against these threats.

Back to Top

58th Annual Meeting - Monday, May 12, 2008

It's time for the West Central Telephone Association's Annual Meeting of the Members Monday, May 12, 2008 beginning at 7 pm. The annual event is held at the Sebeka High School gymnasium, and will once again feature the Sebeka High School Jazz Band before and after the meeting. Come hear exciting industry and cooperative news, win great door prizes and top it all off with a late luncheon. We'll see you there!

Back to Top

Ask The Help Desk - What Do The Terms "Freeware" And "Shareware" Mean?

Question: I've heard the terms "freeware" and "shareware" used to describe software programs. What exactly do these terms mean?

Answer: Freeware is software that is made available by its originator for unlimited use by anyone at no charge. By contrast, shareware is software that is freely distributed but for which the author expects payment from people who decide to keep the software after a trial period and continue to use it. Freeware and shareware are widely available online in many different software categories.

Before you download anything, however, research the website and software to make sure both are reputable. You should also have antivirus software installed on your computer and keep it updated.

Back to Top

Sites Of The Month - Great Sites To Check Out In May

Indiana Jones is Back
http://IndianaJones.com - The fourth installment of the Indiana Jones franchise comes to the big screen this month nearly two decades after the last one. Indiana Jones and the Kingdom of the Crystal Skull boasts all the action that fans have come to expect, from car chases to Indiana Jones wielding his trademark bullwhip. The film stars Harrison Ford and is led by famous filmmakers George Lucas as executive producer and a writer, and Steven Spielberg as director. Get a sneak peak here and enjoy classic clips from previous installments.

ABCs of RVs
http://GoRVing.com - It's time to plan your summer road trip. Ever thought about traveling in an RV? You can take the comforts of home with you wherever you go, and enjoy the freedom to really explore the great outdoors. If you're new to RVing, this site is the place to start. You'll find descriptions for all RV types, shopping and rental information, travel ideas, a campground database, driving and towing tips, and even a free "getting started" CD-ROM or DVD.

Making Sense of Dollars
http://finance.yahoo.com/how-to-guide/index - With the rising costs of today's economy, it's more important than ever to make smart moves with your money. Check out this comprehensive How-to Guide on the Yahoo! Financial site for lots of practical tips and online tools. From advice on how to get out of debt to savings ideas for college, there's a wealth of information at your fingertips.

Race Around the Indy 500
http://Indy500.com - The theme of the 92nd Indianapolis 500 is "Fuel the Dream." No wonder, since this is definitely a sporting event that many dream of competing in (or simply attending). This year's field of 33 starting drivers on May 25 will include a history-making driver: Illinois native Danica Patrick captured the Indy Japan 300 title in April, making her the first woman to win an IndyCar race. Do a few laps around this site to see updates on the practice runs, review race history, get ticket information, and read the personal "500" stories of other fans.

Get Grilling
http://weber.com/bbq/pub/recipe - The Weber name has become synonymous with grilling. Before you fire up the grill for the warm weather season ahead, go straight to the source for lots of expert advice and new recipe ideas. To keep the inspiration coming for weekend parties, sign up to receive the Recipe of the Week each Friday.

Back to Top

Short Tutorial - Removing Contacts From Your Address Book

Let's face it -- the people in our personal and professional lives come and go. If your e-mail address book is cluttered with names from inactive relationships, you're wasting time wading through an unnecessarily long list.

To remove contact information from your address book, follow the steps below for your specific e-mail program:

Removing Contacts From Your Address Book When Using Outlook Express 6 and Windows XP SP2 Home Edition
  1. With Outlook Express 6 open, click your cursor arrow on the "Addresses" button located on the toolbar.

  2. Click on the contact you want to delete. (The contact's name will be highlighted when you click on it.)

  3. Click on the "Delete" button located on the toolbar.

  4. The Address Book - Main Identity dialogue box will appear asking if you are sure you want to permanently delete the selected item. Click the "Yes" button.

  5. Close the Address Book - Main Identity dialogue box by clicking on the red "X" in the upper right-hand corner. The selected contact is now deleted.
Removing Contacts From Your Address Book When Using Thunderbird 1.5 and Macintosh OS X 10.4, Windows XP SP2 Home Edition, or Windows Vista Home Premium
  1. With Thunderbird open, click your cursor arrow on the "Address Book" button located on the toolbar.

  2. Click on the contact you want to delete. (The contact's name will be highlighted when you click on it.)

  3. Click the "Delete" button located on the toolbar. The selected contact is now deleted.
Removing Contacts From Your Address Book 4.0.4 When Using Mail 2.1.1 On Macintosh OS 10.4.9
  1. With Address Book open, click your cursor arrow on the "All" icon in the "Group" field.

  2. Click on the entry you want to delete in the "Name" field to select it. (The contact's name will be highlighted when you click on it.)

  3. Click on the "Edit" menu and select "Delete Card" from the drop-down menu. The selected contact is now deleted.
Removing Contacts From Windows Contacts (Address Book) When Using Windows Mail and Windows Vista Home Premium
  1. With Windows Mail open, click your cursor arrow on the "Contacts" button located on the toolbar.

  2. Select the contact you want to delete. (The contact's name will be highlighted.)

  3. Click on the "Delete" button located on the toolbar.

  4. The Delete File dialogue box will appear asking if you are sure you want to move this file to the Recycle Bin.

  5. Click the "Yes" button. The deleted contact will be moved to the Recycle Bin where it will remain until the bin is manually emptied.

Back to Top

We hope you found this newsletter to be informative. It's our way of keeping you posted on the happenings here. If, however, you'd prefer not to receive these bulletins on a monthly basis, click here.

Thanks for your business!

Best regards,

The WCTA Communications Team
Internet Specialists



WCTA Sebeka
308 Frontage Road Box 304
Sebeka, MN 56477

1-218-837-5151 or toll free at 1-800-945-2163

(We have used our best efforts in collecting and preparing the information published herein. However, we do not assume, and hereby disclaim, any and all liability for any loss or damage caused by errors or omissions, whether such errors or omissions resulted from negligence, accident, or other causes.)

©2008 Cornerstone Publishing Group Inc.

Trademarks: All brand names and product names used in this eNewsletter are trade names, service marks, trademarks or registered trademarks of their respective owners.
 

 
!DSPAM:481d9495246741344016220! --= Multipart Boundary 20080504034857.030864--