Earth Day Electronics Recycling Event – April 20th

Please join us on Friday, April 20th from 11-2 for our Green IT Recycling event.  Bring your electronics to recycle.  Premier Surplus will have recycling bins and hard drive shredding will be offered at no charge. Enjoy lunch with us as we will be grilling hot dogs and brats. 3079 Crossing Park, Norcross, GA 30071 Proceeds from the recycled equipment will be donated to the Norcross Cluster School Partnership. For more information, call us at 770 662-0312. … [Read more...]

Why does China want your gmail account?

Google is certain that the latest hacking attempt comes from Jinan, China as a phishing scam to obtain gmail passwords. This type of attack happens all the time, but since senior level US government officials, military personnel and political activists were targeted the intent seems much more sinister. The attacks were common phishing schemes that are not very sophisticated opening speculation that this was testing the water and that the information may be used for broader attacks. If someone has your username and password, they can hijack your account.  Not only will they have access to your email, but they can change account settings, forward email and send email as you.  If you are unaware that your account has been compromised, the hacker can play havoc with your information and identity. Certainly, you have heard these warnings: create a strong password, don’t divulge username … [Read more...]

Managing Rows and Columns in Excel

Guest author David H. Ringstrom, CPA,www.accountingadvisors.com Users often hide rows or columns in a spreadsheet to conceal private data, or perhaps just to keep a large spreadsheet manageable. This is a helpful feature in Excel, but many users often go about managing rows the hard way: Excel 2007 or later: In the Cells section of the Home tab choose Format, Hide & Hide, and then make a selection as to what to hide or unhide. Excel 2003 and earlier: Choose Row or Column and then Hide or Unhide, respectively. Hiding rows is fairly straight forward, as you can select the rows or columns, and then carry out the aforementioned menu command. To unhide rows or columns, you must select rows above and below the hidden section, or columns to the left and right of the hidden section, and then carry out the menu command. Constantly navigating the menus to hide and unhide rows or … [Read more...]

What Hackers Want

Especially after someone has been the victim of a hacking attack, they want to know why. Hackers have many motives and trying to decipher their behavior is complicated. The classification of white hats, black hats, grey hats and such is an interesting attempt to legitimatize electronic spying and sabotage.  Perhaps there are “good hackers” that perform a valuable service, but most attacks are malicious in nature.  Generally, hackers want to take something from you, teach you a lesson or show their programming skills. Taking something from you.  This can be financial information, social media login and password, your time or your peace of mind.  Many victims of infections that cause pop-ups with objectionable material are traumatized.  They often react like the victim of a physical crime.  Anyone that has been hit with difficult to remove malware knows that it can be time-consuming and … [Read more...]