It happens! Here in IT, we see our community members dealing with liquid spills on their laptops and phones all the time. Unfortunately, many people make the same mistakes that ultimately lead to the death of their laptop, phone or other electronic device. Here are a few quick tips to help you survive this disaster! Continue reading “What to Do if You Spill Liquid on Your Device!”
To simplify your online life, you should keep your Brewster and personal email completely separate. If you have a personal Gmail account, you can easily toggle between accounts in Chrome. Continue reading “Manage Two Gmail Accounts in Chrome”
When making the transition to Google Drive you may have numerous files and folders to upload and convert. In the process of uploading folders and files, it can be confusing what you have uploaded and what is remaining to be uploaded. If you worried that you may have already uploaded the folder of files, Google will let you know by issuing them with unique file names. If there are uploading files with the same name as existing files in your Google Drive, the new files will be saved with a number suffix in the file name. This ensures that nothing will be overwritten and lost.
Using templates will help you with everything from essays to t-shirt order forms. Templates are available in Google Docs, Sheets, Slides and Forms. Be sure to check out all the templates as they will make your work easier by providing an outline for you to insert your information and work.
Did you know that you have a YouTube account? It’s part of your Brewster Google Suite of Apps just like Google Docs and Gmail. Taking video from your computer and uploading it to YouTube is rather simple. Here’s how to do it from scratch! Continue reading “Upload Video to YouTube”
The following excerpts were pulled from an article posted on TechRepublic
It all starts in a Gmail account that has already been compromised. Reports say that perpetrators are accessing hacked accounts immediately and sending phishing messages to other Gmail addresses in the hacked accounts contacts list.
An email lands in the target inbox from the hacked address, and here’s where it gets tricky: The phishing email uses a legitimate subject line, text, and attachments from emails already sent by that account, making it look completely legitimate. Continue reading “Tricky Gmail Phishing Attack”