Employee of Month Nominations Needed
Please take some time to nominate that outstanding
employee. Form is available
Also, find out about our Employee of the Month
Looking for a change?
Browse the latest openings here.
Your IT Corner
Compatibility View in Internet Explorer 9/10
Sometimes the website you’re visiting doesn't look right. It shows up as a
jumble of out-of-place menus, images, and text boxes.
One possible explanation: The site might have been designed for an earlier version of
Internet Explorer. If Internet Explorer recognizes that the webpage isn't compatible,
you'll see the Compatibility View button on the Address bar.
Try clicking it
In Compatibility View, websites will be displayed as if you were viewing them in a
previous version of Internet Explorer, which will often correct display problems.
You don’t need to click the button for a site after you’ve done it once—the next
time you visit the site, Internet Explorer 9/10 will automatically show it in Compatibility
View. (If you ever want to go back to browsing with Internet Explorer 9/10 on that site,
just click the Compatibility View button again.)
What is Phishing?
Phishing is a criminal act of stealing identity with the use of illegitimate
website. This authentic-looking website hosted by the spammer will ask
for PIN, credit card or social security number.
As an example, a spammer will send out an email with a heading, “Western
Union: Locked Account Notice”. This email will be sent by the
spammer to millions of email addresses he/she harvested or bought from email
harvester. This email will then direct the intended victims to a phishing
website and ask them to input their social security or credit card number.
WHAT TO DO:
Enable Phishing Filter and Pop-up Blocker
in your Internet Browser. All YCS
computers are set up to have this feature
enabled, and just in case it is not, do the
following on IE 7: Open the Tools menu, go to
Phishing Filter, and then choose
Automatic Website Checking
Do not give out your credit card or bank
account number unless you are very sure of
the website's identity. A legitimate
website that solicits confidential
information has an issued digital
certificate from major certificate
authority. Once you are re-directed to a
secured site, the URL will change from HTTP
to HTTPS. The letter
S indicates a security protocol that
provides encryption and proper server
identification through the use of
- Do not send or post your email address to
blogs, forums, newsgroups or chat. Spammers
use special programs to harvest email
addresses from websites and Usernet
postings. (and there are also websites that
collect email addresses and sell them) If you really need to post your
email address for whatever reason, use
Yahoo, MSN, Hotmail, Gmail or other free
- Use BCC (blind carbon copy) instead of CC
when forwarding email outside of YCS. There is
a great deal of chance that email addresses of
people you CCed in your email will end up in the
spammers' list if you are forwarding emails
outside of YCS. Most email users have the
tendency of not deleting email thread(s)
when sending out their emails
whereby exposing all email addresses you CCed.
- If you receive a
too-good-to-be-true email, it is most likely
a spam. Discard it! The notoriety of
419 Fraud, a.k.a.
Nigerian Scam is all over the Internet and
on TV yet many people succumbed to this
kind of fraud. Please verify the sender’s
intent or story, on
Happy and safe computing to everyone,
YCS IT Team
Download Teamviewer here