POST
Welcome to POST by ResTech Solutions
Thank you for subscribing to our newsletter. Every week we will bring you new content covering recent events and news related to technology, Microsoft, Apple, Google, tips & tricks, useful information, and more! To read the full articles in our newsletters you can either click on the image or article headline. We've had a great response each week to our newsletter and we've been hard at work to bring you even more great information this week. Please let us know what you've enjoyed thus far about our newsletter. To see past issues click on the archives link above.
Why the name POST? In the world of computers POST stands for Power On Self Test. This is the action computers take when they are first powered on to check their basic functionality prior to loading the operating system. We decided to take this same concept and to provide you with useful technology information at the beginning of your week to help get you started. POST is also a term associated with news as well and we felt this was an appropriate and fitting name.
If you have suggestions about topics you are interested in or would like more information on any of the articles presented in our newsletters you can fill out our Content Request form to let us know what you would like to know.
Do you need any help or assistance with any item in our newsletter? Reach out and we will be happy to help.
Reply to this email to let us know what you liked. Please forward this newsletter to anyone who needs this information.
The best thank you that you can give us is by sending us referrals. It means so much to receive a referral. We look forward to having you with us every week! Let's POST and get started with this issue.
News
Microsoft Mitigated One of the Largest Ever Recorded DDoS Attacks: Here's What Happened
Image from MUO
Learn more about a Distributed Denial of Service attack here.
Many large companies are targets of these attacks but Microsoft has put in a lot of planning to prevent these attacks from being successful and taking their Azure service down. This is a great example of how a company took the time to think about all the possible threats it could face and then actually plan for them.
This again goes to show the resources and power Microsoft has to protect its services and users from threats. Back in our first issue we covered how Microsoft was able to take severe action against the SolarWinds hackers and essentially shut them down. Microsoft has proven it can and will take care of their users and is a company not to be messed with.
Microsoft Commits to Right to Repair: What This Means for Consumers
Image from MUO
The right to repair refers to the legislation that would require technology manufacturers to provide practical means for consumers to repair their devices. Often, this comes in the form of parts, tools, diagnostic methods, documentation, and so on. While the movement has been around for a while, Microsoft and many other tech companies have outright lobbied against its passing on the premise of trade secrecy or hurting profits.
This is a positive step in the right direction and over time will make it easier to have your equipment repaired either by yourself or at a lesser cost by being able to use third-party parts. There is still work to be done to make this a reality but with Microsoft now backing the movement we may begin to see more progress towards its implementation.
Cyber Security
What Is Hacking and How Did It Start?
Image from MUO
Hacking is any activity that aims to exploit and illegally access a computer system, device, or network, without explicit permission from its owner. Causing harm is sometimes only a side-product of hacking, not a necessary element.
The linked article gives a great definition and history of hacking. If you've been confused by hacking this should help clear up any confusion.
6 Reasons to Pay for an Antivirus App
Image from MUO
The phrase "You get what you pay for" has a lot of truth when it comes to your security. There are many free antivirus apps you can use but they all have some limitations on the security they provide. With today's threat landscape you cannot skimp on your security protection. With a paid premium security product you can expect the following:
- Advanced Features
- More Reliable Protection
- All-in-One Protection
- Better Support
- Superior Options for Businesses
- Suitable Family Protection
Paid premium security products are also not equal in their protection and capabilities. You will need to read about the features offered and how the apps work. Talk to your IT/security professional for their opinion and recommendation to ensure you are getting the best product for your needs.
3 Sophisticated Social Media Scams You Need to Avoid
Image from MUO
Social media is not immune from scams and there are always new scams and redressed scams showing up every day. For example, many of the fun quizzes you take on social media can be considered a scam as they will trick you into revealing personal information. The information shared can be used to guess your passwords or security question answers and help reveal more information about you that you normally wouldn't share.
Before taking any action online stop, think, and ask yourself if you would do the same in person. Check out the linked article to read about 3 of the current sophisticated social media scams you may encounter.
Is Cyberbullying a Crime?
Image from MUO
There isn't a clear answer here as there are many variables. We may want to consider any instance of cyberbullying a crime but laws vary in every state. This article does a great job of explaining what cyberbullying is and what to do if you are a victim.
Are You Being Watched? An Introduction to Legal Tracking Apps
Image from MUO
There are instances when we need tracking and other information collection for safety reasons and legitimate business use. Not all tracking is malicious or illegal. It is important to know when this is occurring and what is being done with the data collected on you. Take time to familiarize yourself with the data being collected and the security around the data. Like anything else, there is an online component at play here and there will be some security risks. Do your research and take the necessary precautions.
Check out the linked article for full details.
Windows
Windows 11 Is Much More Secure Than Windows 10: Here's Why
Image from MUO
Microsoft has worked to improve the security of the Windows operating system and this effort has culminated in Windows 11 being more secure than Windows 10. We can expect Microsoft to continue this effort as they continue to improve their products. Check out the linked article to read about four ways Microsoft has made Windows 11 more secure.
Useful Information
The 8 Best Tools to Compare Two PDFs Side by Side
Image from MUO
PDF files are the most compatible file types and many people work with them every day. Invariably there will come a need to be able to compare two PDF files side by side.
Comparing two documents to find possible changes is a very exhausting and time-consuming process. Several rounds of revision in a document can make changes slip by.
If such documents contain a great deal of information, the comparison process may take hours, if not days.
Many of the tools mentioned in the linked article can be used on more than just PDF files.
FAQ of the Week
Does Connecting Too Many Devices Slow Down Your Wi-Fi?
Image from MUO
Each week we will address a frequently asked question. This week we are looking at what happens when you connect too many devices to your Wi-Fi network.
The simple answer to this question is yes. While too many devices can slow down the wi-fi connection this generally has no effect on your actual internet speed. The slow down has to do with how many devices your wireless router can communicate with at one time. There are several other factors that can affect the Wi-Fi speed.
Your Wi-Fi speed and internet speed are not the same. Check out the linked article for more information.