Your laptop’s battery life can be extended if you take precautions to avoid frequent total discharges. One step you can take is to set up alerts so you’ll know to plug in the power adapter when the battery goes down to a particular level. Almost all laptops display alerts if the battery has 5% or […]
No matter how many steps you take to protect yourself or your information, there is still a chance you will get hacked. However, the sooner you identify you have been compromised and the faster you respond, the more you can minimize the harm. ACCOUNTS You probably have numerous online accounts for everything from online banking […]
What Is P2P? P2P stands for Peer-to-Peer which means the sharing of files between two or more users on the Internet. The concept behind P2P networking is powered by a peer-to-peer application such as Gnutella, KaZaA, Napster, iMesh, LimeWire, Morpheus, SwapNut, WinMX, AudioGalaxy, Blubster, eDonkey and BearShare. The P2P application takes a piece of allotted […]
What is identity theft? Identity theft is a crime where a person uses your personal identification information, like your name, Social Security Number, driver’s license number or credit card number, without your permission with an intention to commit fraud. This also allows the criminal to steal money from you by opening up new credit card […]
What is the Gameover malware? Gameover is an updated Zeus malware attack that goes after bank information. The attack takes place when malicious users send spam email to infect computers with malware, which is designed to collect bank account information from the recipient’s computer. After this malware is on your computer, it is able to […]
Firesheep is a Firefox extension that basically allows anyone you are sharing a wireless network with to discover and access certain online sessions that you are logged into. Many sites encrypt information only for your initial log in; once you successfully log in, the server (that hosts the website you are accessing) sends your browser […]
Did You Know? Loyola University Chicago blocks over one million spam messages per day. What is Phishing? Phishing is an attempt to steal sensitive information, such as your social security number or passwords, by posing as a trusted organization or person. Phishers are known for using this information for identity theft and other fraudulent acts. […]
Does this scenario sound familiar? It’s time again for you to change your Loyola password and due to the password complexity requirements, you end up creating a password with a string of numbers and letters that’s impossible to remember. Each time you need your Loyola password you find yourself reaching for that sticky note that […]
If you have a Microsoft Word 2007 document that you would like to make read-only or if you would like to add password protection, Word offers a few options to secure your file. Here are a few security features offered in Word: Encrypt Document: Adding encryption to your document will require that a password be […]
In order to keep your computer’s operating system running safely and efficiently, it is important that you regularly install the latest software patches and updates. In this week’s Tech Tip, the Loyola University Information Security Office provides information and resources to help you keep your software up-to-date. What is Patch Tuesday? Patch Tuesday refers to […]