The Blog

Free Tips & Tricks
Cinch I.T. > The Blog (Page 22)

Recently we have received several calls about spammers abusing Dropbox, a popular cloud-based, file-hosting and synchronization tool, to spread spam. Dropbox accounts have a public folder where files can be placed and made publicly available. This function is useful to spammers, as it effectively turns Dropbox into a free hosting site. Spammers have abused URL shortening and free hosting sites for some time. Dropbox also provides...

Read More

Microsoft  just announced a larger Surface, the 12-inch Surface Pro 3. Like the previous Surface Pro, it supports pen input, making it a good choice for creative professionals, especially with that pixel-dense 2,160 x 1,440 screen. In addition to being the biggest, highest-res Surface yet, though, it's also the thinnest-ever product with an Intel Core i7 processor. All told, the thing measures just 9.1mm (0.36...

Read More

If a user is using outlook to connect to an exchange account and gets asked for credentials every time they log in, you may need to delete those credentials. Often times this is necessary if creating a new mail profile either doesn’t work or isn’t desirable due to other factors. To delete saved credentials, do the following:   Open User Accounts (on windows 7/8 just type ‘user...

Read More

The ability to access emergency services by dialing 911 is a vital component of public safety and emergency preparedness. Recent reports of consumers’ inability to access life-saving emergency services while using Voice over Internet Protocol (VoIP) services have highlighted a critical public safety gap. The FCC has taken steps to close this gap by imposing Enhanced 911 (E911) obligations on providers of “interconnected” VoIP services....

Read More

What Is The Heartbleed Bug? Are Untangle Products And Services Vulnerable?   A recent OpenSSL library vulnerability, popularly named "heartbleed" was recently discovered and made public. The OpenSSL library is the most widely used encryption library globally. A version released about two years ago contains a flaw that allows a hacker to use the TLS protocol to request large chunks of server memory. The greatest risk was in exposing...

Read More

You update your Facebook, LinkedIn, Google+ and Twitter. You are blogging. You even use #hashtags. Why is your social media failing? The reasons exist not in what you are doing, but what you are doing wrong. Social media requires strategy, management, creativity and timely, relevant content. All the tweets in the world mean nothing if the content shared is pointless, even superfluous. In fact, loads of bad...

Read More