Facebook Friend Request – Safety and Security Guidelines for Accepting, Evaluating, Identifying and Discerning Fake from Authentic

Technology > Facebook Support Summary. This page provides guidelines for evaluating friend requests on social networks like Facebook. While this document refers specifically to Facebook, these guidelines apply to just about any online social network. Background. Some online discussion boards and special interest groups are moderated to filter out fake requests to join. This helps… Continue reading Facebook Friend Request – Safety and Security Guidelines for Accepting, Evaluating, Identifying and Discerning Fake from Authentic

Microsoft Office 2011 for Apple Mac Update Error – “The installation failed. The Installer encountered an error that caused the installation to fail.”

Technology > Resources | Apple Summary. On 13 December 2010, Microsoft released a critical security update (14.0.2) for their Microsoft Office 2011, the Apple Mac version of their office suite. A few days prior, on 8 December 2010, Microsoft announced a critical security update (1.1.8) to their XML File Format Converter for Apple Mac. An… Continue reading Microsoft Office 2011 for Apple Mac Update Error – “The installation failed. The Installer encountered an error that caused the installation to fail.”

Yahoo BrowserPlus Removal Instructions Wrong for Snow Leopard

Technology Summary. BrowserPlus by Yahoo is a browser plugin that allows sophisticated programming on top of a simple website making it possible to launch programs written on the BrowserPlus platform. It is similar to Adobe Flash, Adobe Shockwave, and Adobe Air. Because BrowserPlus can potentially allow access to your hard drive and other computer components,… Continue reading Yahoo BrowserPlus Removal Instructions Wrong for Snow Leopard

ResourcesForLife.com Security Policies and Best Practices

Technology Summary. We research and implement best practices regarding website security and stability. In addition to preventative measures, our site is scanned and monitored regularly by multiple redundant internal and external automated systems for any unauthorized content changes that may indicate the presence of malware on our site. We also scan our site manually multiple times… Continue reading ResourcesForLife.com Security Policies and Best Practices

The Impact of Anonymity on Internet Safety, Security, and Content Integrity

Effective Living | Relationships | Technology Summary. This document addresses the safety, security, and authenticity problems arising from anonymity on the Internet. Benefits of Anonymity. Anonymity has some benefits to the individual and the community, such as: Creates a Sense of Security. Some people feel more secure when online if they can be anonymous. Concerns… Continue reading The Impact of Anonymity on Internet Safety, Security, and Content Integrity

Solution for Symantec Endpoint Internet Security or Norton AntiVirus Slowing Down Apple or Windows Computer

Technology Summary. Users of Symantec (or Norton) antivirus software, such as Endpoint Security or Internet Security suite, on Apple or Windows computers may notice a slowness when trying to perform data intensive tasks, such as system backups. This can also be an issue with McAfee, Trend Micro, and Computer Associates software. Solutions are provided below… Continue reading Solution for Symantec Endpoint Internet Security or Norton AntiVirus Slowing Down Apple or Windows Computer

Hackers Launch Biggest Data Heist in History With a Global Kneber Botnet Virus Hacking Campaign to Hack the Planet

Technology Summary. The world’s largest data heist and hacking campaign was recently discovered and it is still underway. There are a surprisingly small number of news reports about this story so far. According to a report by PC World, the Kneber botnet virus “puts the potential threat of last year’s Conficker worm to shame.” According… Continue reading Hackers Launch Biggest Data Heist in History With a Global Kneber Botnet Virus Hacking Campaign to Hack the Planet