Category Archives: Internet Explorer

Opening attachments

One of the more frustrating things to happen online is when you try to do something that worked but now does not.  A perfect example of this is opening an attachment to an email rather than downloading it first.

We found different browsers have different settings when trying to open an attachment.  In Chrome, you may be able to open the attachment by changing an option in Settings.  Click the three dots in the upper right corner, select Settings and then scroll to the bottom of the page and click Advanced.  Look for the Downloads section and make sure the option to Ask where to save each file before downloading is unchecked.  Try again.  If still unable to open the attachment without downloading it first, try another browser.

In this case, using Microsoft Edge allowed you to Open or Save the attachment.  This solved the issue, however, changing browsers was necessary.

Ransomware

Like the name implies, this type of virus not only encrypts and holds hostage your critical data, but also demands a ransom be paid to decrypt the infected files.    Getting this virus, which comes in many variants, can cripple a business or home user.

Here are some steps to take to prevent catastrophe:

First:  Backup your data daily.  If you do not already have a backup plan, create one.

Second:  Never visit sites that are questionable, click on ads that are suggestive or curious, such as “Stars then and now.”  Just say No to invitations in e-mail or suspicious links.

Third:   Patch and Block.  Running updates to Java, Flash and OS to get the latest security patches that will help “fill the gap” where a virus can infiltrate.

Fourth:  If you get an infection, STOP AND TURN OFF THE COMPUTER!  Do NOT finish an e-mail, document or other entry.  Just stop what you are doing and shutdown to prevent further damage.  Disconnect from the internet by unplugging the modem and router to prevent spreading the virus over the office network (both wired and wireless).

Call for help.  If you have followed the above, the damage may be limited and the cost may be far less than if you ignore the virus and keep working.  Finally, consider setting up a Business Continuance Plan.  For more information on that,  click on Search and enter Business Continuance.

Zoom and Screen Resolution

If you have a wide screen monitor then you understand the frustration of changing your screen resolution to get the online resolution to be larger and better able to read or to play games.  For example, if you play some of the online games, the game board, (such as Monopoly), is too small to enjoy playing on.  You want to enlarge it.  Absent any screen adjustments built into the program, you are forced to lower your screen resolution to achieve your goal.  Doing so creates the other problem of the viewable area of the wide screen is now smaller.

To resolve this, leave the screen resolution as is.  Click the zoom option in your browser to adjust the size of the program you are playing.  In the case of the Monopoly board, we used Chrome.  We clicked on the three dots in the upper right corner and found a Zoom option, with the scale right there.  We adjusted it our desired size and played on.  Note:  the zoom setting stayed in place.  The next time we clicked to use Chrome the settings were as we had left them.  If necessary, you can readjust them easily.

Internet Malware

While you are online, you click a link that takes you to a site that causes your system to communicate to you that a virus or malware has infected your computer.  It goes on to tell you that you need to call the number on the small white window that pops up, and will not go away!  What to do?

Get to the task manager, (ctrl, alt and del at the same time), and end task on the internet connection, (ie: chrome, internet explorer, Firefox, safari, etc.).  That action will close out the page.

Close all other programs.  After they are closed run the scans using Super AntiSpyware, Malwarebytes, Ccleaner and then the virus scan to make sure you have removed any trace of the potential infection.

Restart the system and go online again.

One Drive

One Drive is a product that allows the user to store data on the “cloud” and access it from anywhere there is an internet connection.  It is secured by a username and password created when you set it up.  Go to onedrive.com and click to sign up at the bottom of the screen.

Recently we setup a one drive account for a business that wanted to share a database with a colleague.  We created the account and copied all the database files.  The difficult part of this was getting the software to recognize where the data was stored and then allowing that software to gain access to it.  Once we “re-permissioned” the various databases, the software had no problem accessing the information.

The alternative was to contact their software provider for help.  They contacted them for some advice and came away with a proposal that would cost them thousands of dollars!  The software company would help setup their database on their server and setup each computer wanting access to it.  Too much.