Become a Nerd Own A Region

Blog

Category: Help and How To

What Are Your Tech Resolutions for the New Year?

Jan 5, 2013
| |

Mashable has a very interesting article suggesting some New Years’ resolutions regarding technology. It’s important to take a step back from our work and follow some of these steps for the sake of organization, if nothing else.

Comments are off for this post

The anatomy of a targeted email account hack

“OMG! My email is hacked!” This is a true account of an email hack we’ve just witnessed and helped a client through. It all started with one of our client’s bank account manager calling our client (will call him Bob in this email): Bank: Bob, Happy New Year! We have received an email from your […]

2 comments

This Week in Enterprise Tech Does Its First Q&A Episode!

The enterprise tech-focused weekly podcast This Week in Enterprise Tech had it’s first question and answer episode this week, and it was absolutely fascinating, as they dedicated the entire podcast to answering listeners/viewers’ burning questions about business technology.

Comments are off for this post

Important Info on Google Apps for Business Pricing

Dec 8, 2012
| |

Gmail & Google Apps is know for it’s “just works” simplicity. I like simple. And the pricing is simple, too. Or is it?

Comments are off for this post

Finding Java, Flash, and Adobe Updates Annoying? Here's What You Can Do To Make Them More Managable.

Nov 6, 2012
| |

We’ve all seen them – programs insisting we update them, or updating on their own without our approval. Here are a few settings you can change if you want to have more control over when programs or applications update.

Comments are off for this post

Critical Security warning – immediately turn off Java Plug-ins

It is estimated that more than a billion computers are at serious risk of a new Java exploit discovered by researcher Adam Gowdiak. Oracle chose not to include a patch for this critical vulnerability in its October 2012 update, but has planned to release a patch in February of 2013. In the mean time, Nerds […]

Comments are off for this post

What You Can Do if Your Computer is Being Held Hostage by Malware

Ransomware is malware that takes over your computer and holds it hostage ​and demands payment before your computer will function properly again. Ransomware seizes control of the computer, can terminate programs, encrypts data so it will not open up, and makes programs inaccessible – except to reach locations which allow you to pay the ransom. […]

Comments are off for this post

Configuring Joomla! to use SMTP

If you have a Joomla! site with a contact form or any other type of mail functions, it is important to ensure it is configured correctly to use a proper, secured SMTP connection.  This video tutorial will walk you through the steps to accomplish this.

5 comments

Configuring WordPress to use SMTP

If you have a WordPress site with a contact form or any other type of mail functions, it is important to ensure it is configured correctly to use a proper, secured SMTP connection.  This video tutorial will walk you through the steps to accomplish this.

Comments are off for this post

How To Get a Transfer Code

These are the general guidelines that need to be followed before a domain name can be transferred: 1.  Domain privacy services need to be disabled. 2.  Verify that your administrative email address in the domain registration record is accurate. 3.  Your domain needs to be unlocked. 4.  Acquire your domain’s transfer authorization code (also referred […]

3 comments