ASSOC Displays or modifies file extension associations. ATTRIB Displays or changes file attributes. BREAK Sets or clears extended CTRL+C checking. BCDBOOT Used to copy critical files to the system partition and to create a new system BCD store. BCDEDIT Sets properties in boot database to control boot loading. CACLS Displays…
A new information resource has been added to the Instruction Technology website for new users of the Windows 8 operating system. Please CLICK HERE to view the page.
“For those out of the loop, CISPA will allow private sector firms to search personal and sensitive user data of ordinary U.S. residents to identify this so-called “threat information”, and to then share that information with each other and the US government — without the need for a court-ordered warrant.”…
Have you ever: fallen for a “phishing” email scam? received an email asking you to share your password, account information or social security number? wondered about the best way to secure your valuable data? wanted to know how to prevent bad things from happening to good data? If you answered…
Tech Thoughts is a new blog from the Instructional Technology Group’s Scott Claybrook.
Often, you will want to leverage Youtube video in the classroom. There are a number of ways to accomplish this, but the best (approved) way is to use embed codes from Youtube. Click Here for Instructions
Did you know that you could add “apps” to MS Word? http://www.techrepublic.com/blog/window-on-windows/quick-tip-add-useful-apps-directly-to-word-2013/7430?tag=nl.e064&s_cid=e064&ttag=e064
“We’ve all heard about phishing attacks — those spammy e-mails you get in your in-box imploring you to divulge your personal information. Now those annoying scams are coming to a cell phone near you — it’s called smishing, or phishing via SMS text message.” Watch the video at: http://news.cnet.com/8301-1009_3-57494194-83/protect-yourself-from-smishing-video/?tag=nl.e757
“After a two-week investigation, the online file storage service confirms that usernames and passwords were stolen from third party Web sites and then used to access Dropbox accounts.” Read More from CNet
After loading a legitimate Android app onto Google Play, researchers were able to update it with malicious functionality without triggering the malware detection system. Whoops. Read More at CNet