logo
We are available 7 days a week for appointments.

Office Hours:
Monday - Friday 12-6pm

8673 Commerce Dr., Suite 16
Easton, MD 21601
(410) 822-8568

Subscribe to our newsletter

* indicates required


Malicious redirects are a fairly common annoyance while browsing the internet. You may encounter one if you are redirected to a website that you did not wish to visit, are shown pop-up advertisements, or have alarming pop-up notifications alerting you that your computer is infected by a virus.  Your computer is NOT infected. These types of redirects and pop ups are caused by the website itself.    What is a Malicious Redirect? Malicious redirects are bits of code that are injected into the core...

Support for Windows 7 ends January 14, 2020   Over the next few weeks, millions of PC users will receive pop-up messages from Microsoft informing them that the Windows 7 operating system will reach the end of its life in January 2020.   When Does Windows 7 Support End? Microsoft actually ended mainstream support for Windows 7 on January 13, 2015, which meant new features stopped being added, and warranty claims were no longer valid.   However, during the extended support phase, which Windows 7 entered after...

What is a Cloud Backup?   Cloud backup solutions enable you to store your data and computer files on the Internet using a storage service provider, rather than storing the data locally on a physical disk, such as an external hard drive. Cloud backup may also be called online backup or remote backup.   Files and data can be automatically saved to the cloud backup service on a regular, scheduled basis, or the information can be automatically backed up anytime changes are made (also known...

What is an Apple TV? Apple TV is a set-top media center for your home TV that allows you to stream video, music, and entertainment content.  The little black box is an inch-and-a-half tall, less than four inches along its sides and runs on a platform similar to the iPhone and iPad, which means you can download a whole host of apps and games beyond standard streaming video. They have a massive library of streaming services, including Amazon Prime, HBO Now, Hulu,...

Accidentally closing a tab in your browser is extremely common. You have the intention of just clicking on a tab, but instead you close it. Say good bye to those panic attacks when you close an important tab. Recovering a recently closed tab is an easy process. The following is how to recover your tab in various browsers.   How to Recover Accidentally Closed Tabs in Chrome: To open the last tab you closed, simply right-click on the last tab bar. Towards the...

What is Twitter? Twitter is an online social networking tool in which users post 280 character updates (tweets) of what is going on in their lives along with links to things they think are interesting, funny, or useful to their followers (“following” being essentially what “friending” is on other sites). People use twitter in many ways, some as a newsfeed by following prominent people or networks, some as a pseudo-chatroom by limiting their followers and whom they follow to close friends...

Google Chrome allows you to save passwords to make signing in to your online accounts easier. While this feature is very convenient because you aren’t prompted to type in (or remember) your password each time, what do you do when you need to retrieve your actual password?

This step-by-step guide will show you how to see which passwords you have saved in Chrome and how to view your passwords.

What is Phishing?

Phishing is a form of fraud where a scammer attempts to gain log in credentials or account information from the victim. These scammers usually impersonate as a reputable company or person through email or other forms of communication. These scammers can either install malicious software on to your device or try to trick you into providing them with personal information such as your passwords or credit card information. Phishing scams are designed to look as authentic as possible. Below are some examples of phishing scam emails including scams that seek log in/account information as well as ransomware that seeks to infect your computer with malicious software.

 

If you feel that an email looks suspicious or malicious, pay attention to typos, fake links, fraudulent senders, and threatening language included within the email. Below are samples of what to look out for. 

 

Sample Emails For Phishing Scams:

Google Tips & Tricks to Make Searching Easier

 

1. Use quotes to search for an exact phrase
This one’s a well-known, simple trick: searching a phrase in quotes will yield only pages with the same words in the same order as what’s in the quotes. It’s one of the most vital search tips, especially useful if you’re trying to find results containing a specific a phrase.

Call Now Button