INSIDE THIS ISSUE
Phishing Schemes Circulating About Webmail
The Reality Behind Wireless Networks
Two To View
A Couple Of Amazing Videos You Don't Want To Miss
This Month's FAQ
Is It OK To Let My Computer Sleep Instead Of Shutting It Down?
Sites Of The Month
Great Sites To Check Out In November
Adjusting Your Junk Email Filters/Controls
Greetings from Polar's E-Connections Team
Fall is famous for the spectacular changes that take place as leaves transform into fiery hues. So it's fitting that this November issue celebrates the power of change. It begins with a warning about phishing schemes—the details may change but you can spot the "red flag" in these types of emails and avoid getting scammed. Don't miss our Two to View section. It features inspiring videos about people linked to amazing changes. You'll also find ways to change how you save money, decorate your home, maintain your car, and more. Should you change a computer routine or setting? Keep reading for tips.
The goal of each of our eNewsletters is to keep our subscribers informed regarding their Internet connection and to improve their Internet experience. We think you'll find this information interesting.
To see what's inside this issue, simply scroll down the eNewsletter or click on the links within the index to the left. Thanks for reading!
- The E-Connections Team
Be on the lookout for a clever phishing scheme that uses email messages claiming to be from the Technical Support Team of your Webmail Messaging Center. The scheme's goal is to gain full access to your email account and be able to send spam posing as you.
For example, the message may claim that your email address has been queued for deactivation as a result of a continuous error script. In order to resolve the problem, you're instructed to reset your email address by replying to the email and providing your current email address and password. According to the message, if you provide incorrect information or ignore the instructions, it will lead to the deactivation of your email address.
DO NOT REPLY to emails of this type. Threats of account deactivation are a common "red flag" of phishing schemes that are used to try and frighten you into taking action. If you're ever unsure of the legitimacy of a message that claims to be regarding your email address, give us a call for assistance.
Here's how it all works...
When you make a wireless call, it is transmitted to the nearest tower. But from there it rides a fiber or copper land facility on a rural telephone company's backbone network to that company's central office. And from there it goes to the rest of the world, whether it's another mobile device, home phone, or business line.
A rural telephone company's backbone is also required for the never ending data to and from your mobile phone, including text messages, email and web access.
When you connect to the Internet through a wireless network from your computer, the signal isn't transmitted to a tower, but instead, it's sent to a wireless hub installed in a home or business. But like a tower, that hub also relies on a rural telephone company's backbone to send and receive your data.
Rural telephone companies' land-based networks are critical! The world is indeed going wireless, but wireless simply doesn't work without the foundation of the existing physical wired network. Without the continued support to maintain our wired backbone, the wireless network is doomed to fail.
Question: If I'm not planning to use my computer for several hours, is it OK to use the computer's sleep mode rather than shut it down completely?
Answer: Generally speaking, sleep mode is most efficient for both Macs and PCs. One of the primary advantages of using sleep mode is that you have easy access to your work when you "wake up" your computer, since you don't have to reopen applications as you do when you boot up the machine from being completely powered down.
As an example, if you're through working for the day and put your computer to sleep and then remember an email you forgot to send, you can simply "wake up" the computer and use the email application that's already running. This process is much easier and faster than waiting for the computer to boot up and then reopening the application.
In terms of energy use, sleep mode does use some power, but not much, and no battery power (assuming your computer is plugged in). Remember that fully shutting down and booting up your computer uses power too.
There are times when you need to completely shut down your computer, such as when installing new hardware or software. It's also best to shut down completely in case of lightning storms or if you won't be using your computer for several days or more. But if your computer will be idle for just a few hours, sleep mode is fine.
The war on spam is best fought on multiple fronts, involving email administrators as well as end users. You can check with your Internet Service Provider (ISP) about the computer security services it has available. In addition, become familiar with the junk email filters/controls offered by your email client and make sure the settings are appropriate for your particular situation; you will have choices regarding what is identified as junk mail and where it is moved. Keep in mind that you also have the ability to select individual emails and make sender-specific junk mail rules as you go along. To adjust your overall junk email filters/controls, follow the steps below.
We hope you found this newsletter to be informative. It's our way of keeping you posted on the happenings here. If, however, you'd prefer not to receive these bulletins, click here.
Thanks for your business!
The E-Connections Team
110 4th St E
Park River, ND 58270
Trademarks: All brand names and product names used in this eNewsletter are trade names, service marks, trademarks or registered trademarks of their respective owners.