Nam Nguyen's wire posts

    • Nam Nguyen

      By Nam Nguyen
      25 great ebook titles in 104 different languages (Afrikaans, Albanian, Amharic, Arabic, Armenian, Azerbaijani, Basque, Belarusian, Bengali, Bosnian, Bulgarian, Catalan, Cebuano, Chichewa, Chinese-Simplified, Corsican, Croatian, Czech, Danish, Dutch, English, Esperanto, Estonian, Filipino, Finnish, French, Galician, Georgian, German, Greek, Gujarati, Haitian Creole, Hausa, Hawaiian, Hebrew, Hindi, Hungarian, Icelandic, Igbo, Indonesian, Irish, Italian, Japanese, Javanese, Kannada, Kazakh, Khmer, Korean, Kurdish, Kyrgyz, Lao, Latin, Latvian, Lithuanian, Macedonian, Malagasy, Malay, Malayalam, Maltese, Mandarin Chinese, Maori, Marathi, Mongolian, Myanmar, Nepali, Norwegian, Nyanja, Pashto, Persian, Polish, Portuguese, Punjabi, Romanian, Russian, Scots Gaelic, Serbian, Shona, Sindhi, Sinhala, Slovak, Slovenian, Somali, Southern Sotho, Spanish, Sundanese, Swahili, Swedish, Tajik, Tamil, Telugu, Thai, Turkish, Ukrainian, Urdu, Uzbek, Vietnamese, Welsh, Western Frisian, Xhosa, Yiddish, Yoruba, Zulu.) Just check out at https://play.google.com/store/books/author?id=Nam+H+Nguyen https://www.amazon.com/s/ref=dp_byline_sr_ebooks_1?ie=UTF8&text=Nam+Nguyen&search-alias=digital-text&field-author=Nam+Nguyen&sort=relevancerank https://www.kobo.com/us/en/search?query=Nam%20Nguyen&fcsearchfield=Author
      • Nam Nguyen

        By Nam Nguyen
        Looking for mutilingual education eBooks like English, French, German, Italian, Japanese, Korean, Mandarin Chinese, Portuguese, Russian, Spanish and Vietnamese. Please support for further development in mutilingual education ebook in the future. See link at https://play.google.com/store/books/author?id=Nam+H+Nguyen
        • Nam Nguyen

          By Nam Nguyen
          SharePoint Consulting Services <=> We will make SharePoint work for you and your organization and are offering a broad range of SharePoint Consulting Services that help you save time, increase productivity, achieve comprehensive security and compliance, reduce complexity, and improve the overall user experience. Our team of SharePoint developers and administrators have extensive expertise leveraging technology to solve real-world business challenges for SharePoint 2010, 2013, 2016 and Office 365 SharePoint, Workflow, Flow, and Nintex Workflow. Please free to check out our multiple SharePoint Live Demo Sites first with user id and password below 1) BART Silicon Valley Project <=> https://lyfespace.sharepoint.com/sites/SVBX/Home3/ 2) Educational eBooks <=> https://lyfespace.sharepoint.com/sites/ee/ 3) Live News <=> https://lyfespace.sharepoint.com/sites/news/ 4) Blogs <=> https://lyfespace.sharepoint.com/sites/Blogs/ 5) SharePoint Consulting Services <=> https://lyfespace.sharepoint.com/sites/scs/ 6) Documents Center <=> https://lyfespace.sharepoint.com/ 7) SharePoint Third Party APPS <=> https://lyfespace.sharepoint.com/sites/stpa/ Sign in: <=> demo@langumania.com and Enter password: <=>Thursday! Please free to check out our multiple SharePoint Live Demo Sites first with user id and password below or share with your client.. 1) BART Silicon Valley Project https://lyfespace.sharepoint.com/sites/SVBX/Home3/ Sign in: demo@langumania.com and Enter password: Thursday! 2) Educational eBooks https://lyfespace.sharepoint.com/sites/ee/ Sign in: demo@langumania.com and Enter password: Thursday! 3) Live News https://lyfespace.sharepoint.com/sites/news/ Sign in: demo@langumania.com and Enter password: Thursday! 4) Blogs https://lyfespace.sharepoint.com/sites/Blogs/ Sign in: demo@langumania.com and Enter password: Thursday! 5) SharePoint Consulting Services https://lyfespace.sharepoint.com/sites/scs/ Sign in: demo@langumania.com and Enter password: Thursday! 6)Shared Documents https://lyfespace.sharepoint.com/ 7) SharePoint Third Party APPS https://lyfespace.sharepoint.com/sites/stpa/ Sign in: demo@langumania.com and Enter password: Thursday!
          • Nam Nguyen

            By Nam Nguyen
            Spamming<=> Spam is any form of unsolicited message, be it email, private forum message or even Tweet. Those behind spam know that the response rate to their rubbish will be incredibly low. They continue, however, because they can send many thousands of spam messages out every hour of the day at next to no cost. Therefore, even an incredibly tiny response rate can lead to huge profits for the spammers. Spam messages don’t usually pose any threat to your security but can be incredibly annoying and distracting. It is, however, possible for more savvy spammer to hide other unwelcome items within their spam messages, such as viruses, worms, spyware and other malware.
            • Nam Nguyen

              By Nam Nguyen
              Stay Safe <=> - Ensure that you are always running a fully updated anti-virus program - Make sure that you have a firewall and that it is fully operational - Choose secure and hard to guess passwords and change them on a regular basis - Install updates and patches for your operating system as soon as they become available - Never click on links in emails unless you are 100% certain that they are trustworthy - Lastly, engage your brain and employ commonsense – it really is the best security measure!
              • Nam Nguyen

                By Nam Nguyen
                Phishing<=> In some respects, phishing is a confidence trick, designed by would-be thieves in order to part unsuspecting computer users from their most precious personal and/or financial information. Traditionally, phishing attempts looked to acquire data such as bank account details, social security numbers, and credit card numbers, either for direct financial gain or to facilitate identity theft. - Over the last few years, however, other forms of data and information have become valuable too. - Phishing attempts are now just as likely to target users of social networking sites in order to try and steal their accounts either to use them as a launchpad for socially engineered scams or as a means of spamming the victim’s friends and other contacts. - Phishing scams usually arrive via email and are designed to appear to be from legitimate organisations so as to trick the recipient into responding with their personal information. - Many will even spoof email headers so that they appear to have come from a trusted source, or link to fake websites that are clones of the official sites that they purport to be.
                • Nam Nguyen

                  By Nam Nguyen
                  Worms<=> A worm is a self-replicating program which will attempt to spread itself around your network, either via routers, the internet or by email. Unlike a virus, a worm does not need to attach itself to another program in order to spread. While a virus has to attach itself to an existing program, a worm does not – it can replicate and spread on its own. Worms too can cause disruption to computer systems because of the excessive amount of bandwidth that they sometimes use.
                  • Nam Nguyen

                    By Nam Nguyen
                    SpyWare<=> Spyware can prove to be a major annoyance as it’s goal is usually to collect personal information and browsing habits in order to deliver targeted advertising to you as you browse the web, Spyware is software and, like a virus, is often deceptively added to the user’s machine. In addition to increasing the amount of advertising you are likely to see, or affecting the type of adverts served to you, it can also impact upon the performance of your computer by hogging resources.
                    • Nam Nguyen

                      By Nam Nguyen
                      Viruses <=> Computer viruses are programs which are designed in order to gain entry onto unsuspecting users’ computers. Once they have gained a foothold within a computer system they will then attempt to duplicate themselves before spreading via email, networks and/or removable storage devices. Typically, their remit is to corrupt or destroy data or otherwise damage the operation of the machine on which they reside.Viruses can be acquired in many ways but some of the more popular ones are through email, peer-to-peer downloading, internet messaging services and downloading infected files found on the internet.
                      • Nam Nguyen

                        By Nam Nguyen
                        Trojan horse <=> by downloading an application they thought was legitimate but was in fact malicious. Once inside your computer, a Trojan horse can do anything from record your passwords by logging keystrokes (known as a keystroke logger) to hijacking your webcam to watch and record your every move.
                        • Nam Nguyen

                          By Nam Nguyen
                          computer virus <=> small piece of software that can spread from one infected computer to another. The virus could corrupt, steal, or delete data on your computer—even erasing everything on your hard drive. A virus could also use other programs like your email program to spread itself to other computers.
                          • Nam Nguyen

                            By Nam Nguyen
                            Rootkit <=> collection of tools that are used to obtain administrator-level access to a computer or a network of computers. A rootkit could be installed on your computer by a cybercriminal exploiting a vulnerability or security hole in a legitimate application on your PC and may contain spyware that monitors and records keystrokes.
                            • Nam Nguyen

                              By Nam Nguyen
                              Phishing <=> scams are fraudulent attempts by cybercriminals to obtain private information. Phishing scams often appear in the guise of email messages designed to appear as though they are from legitimate sources. For example, the message would try to lure you into giving your personal information by pretending that your bank or email service provider is updating its website and that you must click on the link in the email to verify your account information and password details.
                              • Nam Nguyen

                                By Nam Nguyen
                                Malware <=> could be computer viruses, worms, Trojan horses, dishonest spyware, and malicious rootkits—all of which are defined below.
                                • Nam Nguyen

                                  By Nam Nguyen
                                  Hackers <=> Hackers are people who attempt to breach or circumvent online security measures for a number of reasons.Their motives are, occasionally, honourable in that they merely wish to highlight shortfalls to corporations and other website owners so that they can tighten their security up. Other hackers look to make financial gains by copying private information, whilst others are purely out to cause mischief. Irrespective of the hacker’s reasons for doing what they do, they can pose a serious threat to your security.