SOBX Tech

  • Home
  • About Us
  • Our Services
    • Remote Support
  • Our Blog
    • Free Resources
  • Contact Us
  • GTG Gaming

March 18, 2023 By Nate Forant Leave a Comment

Remote Services Now Available

remote access, remote service

Since the beginning of 2020 and  COVID-19, we are now offering remote services. Our remote services can cover most software issues that need to be taken care of without needing to leave your house.  While still following CDC and the state of NC safety protocols, you can receive remote support through us by clicking here. Remote support can also be for one-on-one training through Zoom. If you aren’t familiar with remote support and what it is, you can click here to read more here.

Fill out the contact form below and we will get back to you within 24 hours.  You can also find us on Facebook, Twitter, Instagram all @sobxtech to make appointments.

Filed Under: News, Tech Tagged With: COVID-19, Services

February 22, 2022 By Nate Forant

Understanding Internet Security

Featured Blog Post showing code on a computer screen

Understanding Internet Security can be easy for some and hard for others. Internet security is a branch of computer security that encompasses Internet browser security, website security, and network security as it applies to other applications or operating systems as a whole.

When it comes to understanding internet security, it doesn’t matter what it is, websites, personal computers, or online accounts can all be vulnerable if your internet security isn’t secure. Even some of the largest companies in the world fall to hackers. So what can we do?

What is Computer Hacking

It doesn’t matter if you have a small business, corporation, or home network. If they aren’t secured, there is a chance it could be compromised by hackers.

When people think of computer hacking, they normally think of illicit computer experts breaking into government networks. Hacking is such a broad term and can describe a number of different methods of unauthorized computer use.

For example:

  • Account hacking

– Most common and simplest form of hacking is gaining access to somebody else’s online accounts.

  • Network attacks– Attack the entire computer network normally done by protestors, organized hacking groups, and criminal gangs.
  • Personal computer hacking– Hackers gain access to personal computers to steal data or use them as part of a botnet.

 

Internet Security. This picture is showing computer code that represents the internet.

We will talk about different kinds of threats and how to combat the threats such as phishing, malware, spyware and the list can go on. So, stay tuned for more internet security posts.  We will also get more in-depth about hacking, email scams, what to do and what not to do.

Change your passwords for all of the online accounts such as banks, social media profiles, etc.

Internet Crime Complaint Center

The mission of the Internet Crime Complaint Center, also known as IC3, is to provide the public with a reliable and convenient reporting mechanism to submit information to the Federal Bureau of Investigation (FBI) concerning suspected Internet-facilitated criminal activity and to develop alliances with law enforcement and industry partners.

You can contact us directly through our website with the contact form or find us on social platforms @sobxtech.

Filed Under: Tech Tagged With: Internet Security

November 27, 2020 By Nate Forant

Senior Citizen and Military Discounts Available

military and senior discount, discounts for military, tech discounts for senior citizens

We’re so pleased to be a part of this community. We’re offering 10% discounts for senior citizens and military service members, so if you’ve been on the fence about getting some work done on your computer or updating the network in your office, there couldn’t be a better time. Give us a call.

Discount

Want one of our postcards to keep on-hand? Just drop us an email with your info and we’ll mail one out to you!

Filed Under: News Tagged With: Services

November 2, 2020 By Nate Forant

Save Time with These Mac Keyboard Shortcuts

 

Keyboard Shortcuts

Looking to shave hours off your workday and save time? Try these Mac keyboard shortcuts and make your life that much easier.

Save Time with These Mac Keyboard Shortcuts

By pressing certain key combinations, you can do things that normally need a mouse, trackpad, or other input devices.

To use a keyboard shortcut, press and hold one or more modifier keys and then press the last key of the shortcut. For example, to use Command-C (copy), press and hold the Command key, then the C key, then release both keys. Mac menus and keyboards often use symbols for certain keys, including modifier keys:

  • Command (or Cmd) ⌘
  • Shift ⇧
  • Option (or Alt) ⌥
  • Control (or Ctrl) ⌃
  • Caps Lock ⇪
  • Fn

Some keys on some Apple keyboards have special symbols and functions, such as for display brightness, keyboard brightness, Mission Control, and more. If these functions aren’t available on your keyboard, you might be able to reproduce some of them by creating your own keyboard shortcuts. To use these keys as F1, F2, F3, or other standard function keys, combine them with the Fn key.

Cut, copy, paste, and other common shortcuts

  • Command-X: Cut the selected item and copy it to the Clipboard.
  • Command-C: Copy the selected item to the Clipboard. This also works for files in the Finder.
  • Command-V: Paste the contents of the Clipboard into the current document or app. This also works for files in the Finder.
  • Command-Z: Undo the previous command. You can then press Shift-Command-Z to Redo, reversing the undo command. In some apps, you can undo and redo multiple commands.
  • Command-A: Select All items.
  • Command-F: Find items in a document or open a Find window.
  • Command-G: Find Again: Find the next occurrence of the item previously found. To find the previous occurrence, press Shift-Command-G.
  • Command-H: Hide the windows of the front app. To view the front app but hide all other apps, press Option-Command-H.
  • Command-M: Minimize the front window to the Dock. To minimize all windows of the front app, press Option-Command-M.
  • Command-O: Open the selected item, or open a dialog to select a file to open.
  • Command-P: Print the current document.
  • Command-S: Save the current document.
  • Command-T: Open a new tab.
  • Command-W: Close the front window. To close all windows of the app, press Option-Command-W.
  • Option-Command-Esc: Force quit an app.
  • Command–Space bar: Show or hide the Spotlight search field. To perform a Spotlight search from a Finder window, press Command–Option–Space bar. (If you use multiple input sources to type in different languages, these shortcuts change input sources instead of showing Spotlight. Learn how to change a conflicting keyboard shortcut.)
  • Control–Command–Space bar: Show the Character Viewer, from which you can choose emoji and other symbols.
  • Control-Command-F: Use the app in full screen, if supported by the app.
  • Space bar: Use Quick Look to preview the selected item.
  • Command-Tab: Switch to the next most recently used app among your open apps.
  • Shift-Command-5: In macOS Mojave or later, take a screenshot or make a screen recording. Or use Shift-Command-3 or Shift-Command-4 for screenshots.
  • Shift-Command-N: Create a new folder in the Finder.
  • Command-Comma (,): Open preferences for the front app.

For more shortcuts, click this link: Apple and Mac Shortcuts

Filed Under: How To Tagged With: Apple

November 2, 2020 By Nate Forant

Minecraft – Not Just For Kids

 

Inspired by my son and daughter, I thought this post would be appropriate. They are the biggest Minecraft fans that I know and inspired me to not only write this but start playing too. It’s obvious that I am not as good as they are, but it’s great learning for children and adults alike.

Minecraft

The creative and building aspects of Minecraft enable players to build constructions out of textured cubes in a 3D generated world. Other activities in the game include exploration, resource gathering, crafting, and combat. Survival is where the player must acquire resources to build the world and maintain health. The creative mode where players have unlimited resources to build with and the ability to fly. Adventure mode where players can play custom maps created by other players, and a spectator mode where players can fly around and clip through blocks, but cannot place or destroy any.

Survival Mode

They have both tried to get me to play in this mode, but I just haven’t got the hang out it yet.  In this mode, players gather natural resources (such as wood and stone) found in the environment in order to craft certain blocks and items.

Creative Mode

In creative mode, players have access to all of the resources and items in the game through the inventory menu and can place or remove them instantly. Players, who are able to fly freely around the game world.

Creative

Buildings created by Nate Forant

Besides the main version, Minecraft Classic and Minecraft 4k for the PC are also available.

Minecraft: Education Edition

The Education Edition gives teachers the tools they need to use on an everyday basis.

There are a few differences between Minecraft and MinecraftEDU. The main concept is the same, an open sandbox world. and MinecraftEDU will be able to retain characteristics.  Finally, the last large difference is that students can take in-game photos. These online notebooks will be sharable with other students.

My favorite mode is creative so stay tuned as I am sure there will be more great construction coming soon.

Filed Under: Gaming

September 8, 2020 By Nate Forant

Warzone – Past Streams

Filed Under: Gaming

April 3, 2020 By Nate Forant

Beware of Zoom-Bombing

zoomraiding, zoombombing, zoom call security

Zoom-bombing. It’s real. Here’s what you need to know to prevent Zoom-bombing and keep yourself and your fellow Zoom attendees safe.

What is Zoom–bombing

If you’re not familiar with Zoom, they’re one of the leaders in modern video communications, with an easy, reliable cloud platform for video and audio conferencing, chat, and webinars.

Zoom-bombing is the term for when individuals “gate-crash” Zoom meetings. These uninvited guests share their screens to bombard real attendees with disturbing or distracting content.

With just about everyone using Zoom since COVID-19 changed our day-to-day routines, you need to know how to protect yourself from uninvited guests showing up in the middle of your Zoom calls.

Cybersecurity expert and author, @Scott Schober, was interviewed by @ShirleyChan from PIX11 News. Below is the video from the interview. This is an excellent interview and in these times that we are going through, it is very much needed.

Do you have questions and need assistance with your Zoom settings? Comment below, contact us, or reach out to us on social media. We are on Facebook, Twitter, Instagram.

 

Filed Under: News Tagged With: Security

March 5, 2020 By Nate Forant

Top 10 Internet Safety Rules You Need to Know

online safety

Here are the Top 10 Internet safety rules you need to know to avoid getting into trouble online (and off).

  1. Keep Personal Information Professional and Limited

Potential employers or customers don’t need to know your personal relationship status or your home address. They do need to know about your expertise and professional background, and how to get in touch with you. You wouldn’t hand purely personal information out to strangers individually—don’t hand it out to millions of people online.

  1. Keep Your Privacy Settings On

Marketers love to know all about you, and so do hackers. Both can learn a lot from your browsing and social media usage. But you can take charge of your information. As noted by Lifehacker, both web browsers and mobile operating systems have settings available to protect your privacy online. Major websites like Facebook also have privacy-enhancing settings available. These settings are sometimes (deliberately) hard to find because companies want your personal information for its marketing value. Make sure you have enabled these privacy safeguards, and keep them enabled.

  1. Practice Safe Browsing

You wouldn’t choose to walk through a dangerous neighborhood—don’t visit dangerous neighborhoods online. Cybercriminals use lurid content as bait. They know people are sometimes tempted by dubious content and may let their guard down when searching for it. The Internet’s demimonde is filled with hard-to-see pitfalls, where one careless click could expose personal data or infect your device with malware. By resisting the urge, you don’t even give the hackers a chance.

  1. Make Sure Your Internet Connection is Secure. Use a Secure VPN Connection

When you go online in a public place, for example by using a public Wi-Fi connection, PCMag notes you have no direct control over its security. Corporate cybersecurity experts worry about “endpoints”—the places where a private network connects to the outside world. Your vulnerable endpoint is your local Internet connection. Make sure your device is secure, and when in doubt, wait for a better time (i.e., until you’re able to connect to a secure Wi-Fi network) before providing information such as your bank account number.

To further improve your Internet browsing safety, use a secure VPN connection (a virtual private network). VPN enables you to have a secure connection between your device and an Internet server that no one can monitor or access the data that you’re exchanging. Read more about What is VPN

  1. Be Careful What You Download

A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather. As PCWorld advises, don’t download apps that look suspicious or come from a site you don’t trust.

  1. Choose Strong Passwords

Passwords are one of the biggest weak spots in the whole Internet security structure, but there’s currently no way around them. And the problem with passwords is that people tend to choose easy ones to remember (such as “password” and “123456”), which are also easy for cyber thieves to guess. Select strong passwords that are harder for cybercriminals to demystify. Password manager software can help you to manage multiple passwords so that you don’t forget them. A strong password is one that is unique and complex—at least 15 characters long, mixing letters, numbers, and special characters.

  1. Make Online Purchases From Secure Sites

Any time you make a purchase online, you need to provide credit card or bank account information—just what cybercriminals are most eager to get their hands on. Only supply this information to sites that provide secure, encrypted connections. As Boston University notes, you can identify secure sites by looking for an address that starts with https: (the S stands for secure) rather than simply Http: They may also be marked by a padlock icon next to the address bar.

  1. Be Careful What You Post

The Internet does not have a delete key, as that young candidate in New Hampshire found out. Any comment or image you post online may stay online forever because removing the original (say, from Twitter) does not remove any copies that other people made. There is no way for you to “take back” a remark you wish you hadn’t made, or get rid of that embarrassing selfie you took at a party. Don’t put anything online that you wouldn’t want your mom or a prospective employer to see.

  1. Be Careful Who You Meet Online

People you meet online are not always who they claim to be. Indeed, they may not even be real. As InfoWorld reports, fake social media profiles are a popular way for hackers to cozy up to unwary Web users and pick their cyber pockets. Be as cautious and sensible in your online social life as you are in your in-person social life.

  1. Keep Your Antivirus Program Up To Date

Internet security software cannot protect against every threat, but it will detect and remove most malware—though you should make sure it’s to date. Be sure to stay current with your operating system’s updates and updates to the applications you use. They provide a vital layer of security.

Filed Under: Tech Tagged With: Security, Tech Tips

October 28, 2019 By Nate Forant

National Cybersecurity Awareness Month – Phishing

Phishing attacks use email or malicious websites to infect your machine with malware and viruses in order to collect personal and financial information. Cybercriminals attempt to lure users to click on a link or open an attachment that infects their computers, creating vulnerability to attacks. Phishing emails may appear to come from a real financial institution, e-commerce site, government agency, or any other service, business, or individual. The email may also request personal information such as account numbers, passwords, or Social Security numbers. When users respond with the information or click on a link, attackers use it to access users’ accounts.

You can read more here.

Filed Under: Tech Tagged With: Security, Tech Tips

October 22, 2019 By Nate Forant

National Cybersecurity Awareness Month – Social Media Cybersecurity

Now more than ever, consumers spend increasing amounts of time on the Internet. With every social media account you sign up for, every picture you post, and status you update, you are sharing information about yourself with the world. How can you be proactive to stay safe online and, “Own IT. Secure IT. Protect IT.”? #BeCyberSmart and take these simple steps to connect with confidence and safely navigate the social media world.

You can learn more at https://bit.ly/2LLRe7R

 

Filed Under: Tech Tagged With: Security, Tech Tips

  • 1
  • 2
  • 3
  • …
  • 9
  • Next Page »

Articles By Topic

  • Events
  • Gaming
  • How To
  • Lifestyle
  • News
  • Reviews
  • Tech

Articles By Sub-Topic

Apple Blogger Outreach Events COVID-19 Crystal Coast Geek Breakfast Data Internet Security Microsoft PC Resources Security Services Social Media Workshops Tech News Tech Tips

Read Past Articles

Get Tech Tips, Discounts & More

Subscribe to receive email updates with our latest news, deals, and information.

Copyright © 2023 SOBX Tech · Web Design & Maintenance by SOBXTech