SNX Consulting
  • Services
    • Managed Services
      • Remote Monitoring & Management
    • Support
      • Make an Appointment
      • Remote Service Desk
  • Resources
    • Knowledge Base
    • Webinars
    • Industry Terms
    • Legal
      • Agreements
        • Managed Services Agreement
        • Service Level Agreement
        • Business Associate Agreement
        • Breach Indemnification Agreement
      • Policies
        • Acceptable Use Policy
        • Fees & Pricing Policy
        • Privacy Policy
        • Responsible Disclosure Policy
        • Support Policy
        • Security Policy
        • Trademark Policy & Guidelines
        • Terms of Service
  • Contact Us
  • Blog
Select Page

The Top Five Online Scams and How to Avoid Them

by Joseph Forbes | Feb 13, 2019 | Blog Entry

We’ve all come across content that seems to good to be true in our Web surfing travels. How can you be sure what you’re looking at is the real deal? If you’re concerned about your safety on the Web (and who isn’t), then you’ll want to...

What Is ‘Email Spoofing’? How Does Spoofing Work?

by Joseph Forbes | Feb 1, 2019 | Blog, Blog Entry, HACKING, INTERNET

Question: What Is an ‘Email Spoof’? Is It a Type of Phishing Attack? Answer: Email spoofing, like phone spoofing, is fraud and deception.  Spoofing is the most common form of the modern con game called ‘phishing’. The word “spoof” means...

School Projects for IT and Computer Networking Students

by Joseph Forbes | Oct 9, 2018 | Blog Entry, INTERNET, REVIEWS, Technicals

High school and university students studying computer networking and Information Technology are sometimes asked to complete class projects as part of their course work. These projects may be designed by the instructor or ones that the students choose for themselves....

What Is the Internet of Things? (IoT)

by Joseph Forbes | Oct 4, 2018 | Blog Entry, Cloud Apps, HARDWARE, INTERNET, SECURITY, SOFTWARE, Technicals

The term Internet of Things (often abbreviated IoT) was coined by industry researchers but has emerged into mainstream public view only more recently. Some claim the Internet of Things will completely transform how computer networks are used for the next 10 or 100...
What Phishing and Email Scams Look Like

What Phishing and Email Scams Look Like

by Joseph Forbes | Sep 30, 2018 | Blog Entry, Internet Scam Notices, SECURITY

1 Internet Phishing Scam, Example 1 (Examples of Common Phish Emails and Online Cons) Here they are, revealed: the phishing con games of the Internet. They prey on ignorance, tug your heart strings, and promise professional services while secretly taking your account...
« Older Entries
Next Entries »

User Menu

  • Log in
  • Entries RSS
  • Comments RSS
  • SNX Consulting

Recent Posts

  • Spring Break – Maintenance
  • March Announcements
  • Event – March 11th – Technology Clinic!
  • Announcement – We made changes
  • Feb Announcements
  • Happy New Year 2023!

Archived Posts

  • Facebook
  • X
  • Instagram
  • RSS
Designed by SNX Consulting's WebDev Team | Powered by Insomnia and Electricity
  • 180Share on Facebook
  • 106Share on Twitter
  • 11Share on Reddit
  • 18Share on LinkedIn
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it. How do we use these cookies?  A: The structure of our site, everything is parsed to their specific Db tables. And after 90 days, deleted. Fine... Privacy Policy