August 13th is International Left-Handers Day

August 13th is International Left-Handers Day

 

Happy left-handers day!

Being a left-hander in this world run by righties it’s nice to feel appreciated. Did you know that the day was first celebrated in 1976, to promote awareness of left-handed people that have inconveniences of living in a predominantly right-handed world. It also is aimed to show some of the amazing abilities and products designed just for left-handers.

Here are 3 products specially made for the left-handers out there.

  • The common scissors – we all know from school if you had that if you had more then one child that was a lefty it was a long wait to use the only pair of yellow and green scissors available. The science behind the left scissors is so that you can see the paper you are cutting. The blades are just reversed for a clearer view.
  • Tin opener–  These specialised openers are fully reversed for the safe opening of tins. They have a  more comfortable grip and designed to be safely used by left-handers.
  • Left-handed computer mouse – this product is very good and actually works in a more economical way to help left-handers control the mouse on the computer better. gone are the days when you had to fiddle about and move the mouse to the left-hand side and hold it in a very uncomfortable manner.left handed mouse

These products are all available here at the left-handed shop.

so as mentioned above international left-handed day does also celebrate the abilities of the lefty community. Below are some amazing facts about being left-handed.

5 facts about left-handed people

  1. They make up to be roughly 12% of the population
  2. Are more likely to pursue creative careers
  3. According to one study, they are faster typers because on a QWERTY keyboard, there are 1447 English words typed solely with the left hand, whilst only 187 are typed with the right hand
  4. Famous left-handed intellectuals include Albert Einstein, Isaac Newton, Charles Darwin, and Benjamin Franklin.
  5. Left-handedness runs in families. Lefties in the British royal family include the Queen Mother, Queen Elizabeth II, Prince Charles, and Prince William

If you didn’t know the struggles and strengths of being left-handed, now you know!  so if you know a lefty out there needing some help with computer accessories we could help and supply different solutions catering all budgets. Visit the link below to talk to our of our qualified technicians.

Contact us 

New Email Scam Uses Hacked Passwords

New Email Scam Uses Hacked Passwords

Recently many people people are being sent emails containing a new twist on an old e-mail scam, which could cause recipients to think the con is believable.

While the spam message has been around for some time (with some minor changes to the wording, spelling and grammar), the email now references a real password in the subject and beginning of the message that has been previously used by the recipients email address.

While this type of message is known as a sextortion scam email, the only item that changed in the past was the Bitcoin address that is asked to be used to pay the amount demanded. This new variant now begins with the line “<password formerly used by recipient> is your password.”

The content of the message is below:

Subject: <YOUR REAL PASSWORD>

<YOUR REAL PASSWORD> is your password and now Let me get straight to the
point. You do not know me whereas I know you and you are probably
thinking why you’re receiving this e mail, correct?

I actually installed malware on sex vids (sex sites) & guess what, you
visited this porn web site to have pleasure (know what I mean?). And
while you were busy enjoying those videos, your internet browser
started out working as a RDP (Remote Computer) with a keylogger which
allowed me accessibility to your display as well as your camera
controls. Immediately after that, the software obtained all of your
contacts from social networks, and e-mail.

What did I do?
It’s simply your bad luck that I got to know about your misdemeanor.
Next, I put in more days than I probably should have exploring into
your life and prepared a split screen sextape. 1st half shows the
video you were viewing and next half shows the recording of your
webcam (it is someone doing inappropriate things). Honestly, I am
ready to delete details about you and allow you to get on with your
daily life. And I am going to provide you a way out which will achieve
it. Those two choices are either to ignore this e mail (not
recommended), or pay me 1 BTC.

What should you do?
Let’s investigate those two options in depth. First Alternative is to
turn a blind eye to my message. You should know what will happen if
you take this path. I will, no doubt send out your sextape to your
entire contacts including friends and family, coworkers, and many
others. It won’t help you avoid the humiliation your self will feel
when relatives and buddies find out your dirty videotape in their
inbox. Option 2 is to make the payment of 1 BTC. We will name this my
“confidentiality charges”. Lets see what will happen if you go with
this way out. Your naughty secret Will remain private. I’ll keep my
mouth shut. Once you you pay me my fees, You can freely keep your
routine life and family as if none of this ever happened. You’ll make
the payment via Bitcoins

Transfer Amount: 1 BTC
BTC ADDRESS IS: <ADDRESS REMOVED>
(You need to Remove * from this address then note it carefully)

Note: You now have one day in order to make the payment. (I have a
unique pixel in this e mail, and right now I know that you’ve read
this mail). If I don’t get the BitCoins, I will definitely send out
your video to all of your contacts including close relatives,
colleagues, and many others. nevertheless, if I receive the payment,
I’ll destroy the video immediately. If you really want evidence, reply
with “yes!” and I definitely will send out your sextape to your 6
contacts. It’s a non-negotiable one time offer, so do not waste my
personal time & yours by replying to this e mail.

We have recently been contacted by customers who have received a similar email. In every case, the password shown had been previously used with an online account that was used with their E-Mail address.

It is likely the E-Mails are generated using automatic scripting, taking the email addresses (or usernames) and passwords as a result of a data breach from a popular website. There are a number of sites supplying stolen data that have listed usernames, email addresses and passwords stolen from data breaches. There are a couple of websites such as Have I Been Pwned which can be used to check to see if your email address may have been compromised in a known data breach.

While the senders could have obtained lists from multiple breaches, the only patten we have found so far was everyone was affected by the LinkedIn hack of 2012 where around 164 million email addresses and passwords were exposed 4 years after the data breach took place.

Here are some things you can do to avoid becoming a victim:

  • Never send compromising images of yourself to anyone, no matter who they are, or who they say they are.
  • Do not open attachments from people you do not know, and in general be wary of opening attachments even from those you do know.
  • Use different passwords for different services and change them or a regular basis.
  • Turn off and cover any web cameras when you are not using them. Some laptops have a tab which allows you to cover the webcam, and if it does not you could use a piece of black tape.

While most companies will contact you if your details have been compromised as a result of a data breach, there are also websites which list known breaches that can be used to check to see if you have used a service which has had a known breach.

Sextortion, even automated scams like this one is a serious crime and under no circumstances should you reply to the sender or send them any money. Further information on what to do if you have been affected can be found on the NCA Website.

 

 

We offer both on-site and remote support using Teamviewer.

We offer both on-site and remote support using Teamviewer.

TeamViewer a tool that is unique

TeamViewer is a great tool used to allow remote access to your computer. This can be to fix any issues that may be occurring. We offer this tool as part of our service because it is the fast approach to problem-solving paramount for any business, to get you back on track and working fast!

How it works

Once the software is downloaded, Teamviewer uses a port to make a connection to a central server. Once the connection is made, you get a unique ID, and the server knows you’re online. Then all communication can happen.TeamViewer is a clever and very powerful program that will let you take remote control of a PC over the internet. This makes it ideal for retrieving files, and it’s also a great way of solving computer issues. The short video below describes the basics of the software.

Issues that can be solved through TeamViewer:

There are several issues that can be resolved through remote access.

  • Internet Diagnostics
  • Email  Client Problems
  • File Transfers
  • Guides and support needed
  • Can treat many instances on the same network with one solution

These are just a few examples of issues that can be resolved but many can be. We try and support your business in ways that are convenient and practical for you. For more information about the assistance and support, click the link below.

Sevices and support 

 

 

 

 

 

 

Month: August 2018