631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Intro to Your Tech: Link

Intro to Your Tech: Link

Navigation is critical to success in just about any computing system, and the Internet is no exception. In essence, it’s a compilation of web pages, images, videos, and countless other bits of content that are all interconnected by what are called “links.”

Links, more commonly called hyperlinks, are basically just calls to specific information that can be clicked on (or tapped with your finger on a touch-screen device). Even if it’s not specifically called a link, chances are that buttons and other on-screen elements contain hyperlinks that are connected to specific bits of information.

Links are often shared amongst users to provide a direct means of accessing specific webpages, files on a network, and just about any other asset in an online environment. Links can be used in text to direct users to something else while reading a blog article, or they can be used as a text anchor to direct users to a specific part of a web page.

For example, if you see an image on a website, depending on how it’s configured, you might be “navigated” to another page where the picture is hosted when you click on it. The same can be said for when you’re trying to click on a link to a PDF or similar downloadable file. Depending on how the link is set up, they can initiate the download on-click.

While links can be helpful, they can also be dangerous. You should always hover over a link before clicking on it so you can see its file path. The file path can be seen in the information bar at the bottom of your browser when hovering over the link. If any part of the hyperlink address looks suspicious, think twice before clicking on it. After all, the last thing you want is to download a malicious file on accident. Hackers are more crafty than you might give them credit for--in fact, they can create entire malicious sites that look like the genuine article--only to get you to download malicious files or submit sensitive information. You can generally avoid these by paying attention to--you guessed it--the links in the address bar.

If you found this information interesting, be sure to subscribe to our blog.

Cloud System Security Can Be Tricky
Why Your Employees Aren’t as Productive as You’d L...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, October 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Cloud Privacy Cybersecurity Network Security Managed IT Services Malware Communications Tech Term Microsoft Communication Backup Productivity Smartphones Hardware Passwords Hosted Solutions Hackers Business Google Business Management Ransomware Internet VoIP Android Outsourced IT Email Small Business Software Browser Efficiency User Tips Wi-Fi Save Money Alert Social Media Internet of Things Data Backup Router Computer Data Data Recovery Windows 10 Cloud Computing Bandwidth Business Intelligence Twitter Microsoft Office Applications Smartphone Innovation Collaboration Miscellaneous Saving Money Employer-Employee Relationship Access Control Phishing Excel Virtualization Mobile Devices Office Mobile Device Network Automation Analytics Password VoIP Apps Workplace Tips Marketing Gadgets Settings Patch Management Vulnerability Government Managed IT Services Data Breach BDR Users IT Services Data Management IT Support Blockchain Spam Law Enforcement Wireless Virus Holiday Workers Mobile Device Management VPN WiFi Cybercrime Information Word Computers Scam Artificial Intelligence How To Company Culture Networking Battery Politics Wireless Charging Cortana Productivity Data Protection Physical Security Managed IT Service Windows Gmail App Compliance Hacking Business Continuity Tech Terms Paperless Office Dark Web Website Office 365 IT Support Cost Management Virtual Assistant Retail Chrome Tip of the week Remote Computing Remote Monitoring Specifications HP Database CrashOverride Reporting Staff Access RAM Spam Blocking Business Technology WannaCry Environment Remote Monitoring and Management eCommerce Server Management Downloads Update Copy Apple Backup and Disaster Recovery Telecommuting Hard Drives Antivirus Ink Microsoft Office 365 Microsoft Teams Two-factor Authentication Multi-Factor Security Conferencing Document Management Tactics Medical IT News Websites BYOD Outlook Email Management Sales HIPAA e-waste Phone System Analysis Licensing Online Shopping Server Education Smart Technology Trends Paste iPhone Google Maps SSD Amazon Millennials IT budget PowerPoint Authentication SaaS Managing Stress Tech Support Content Filtering Digital Internet Explorer GDPR Telephone System Tablet Hard Drive disposal Managed Service Safety Travel Machine Learning A.I. Inventory Staffing IT Management Sports Authorization Spotify Dongle G Suite Edge Threat Storage Knowledge Processors Value Gadget Live Streaming Telecommute Information Technology Movies Big Data Telephone Systems File Sharing Lead Generation Mobile Security Plug-In Files Telephony Hiring/Firing Connectivity Printer Server Bring Your Own Device Cables User Tip Laptop Printing Error Remote Support Google Drive Comparison Spyware Facebook Shortcut WhatsApp Work/Life Balance Entertainment Data loss Biometrics Unified Communications Remote Control User Security Recovery Operating System Proactive IT Voice over IP Network Attached Storage Managed IT Disaster Recovery Streaming Media Troubleshooting Office Tips Cleaning Technology Tips Automobile Printers Hybrid Cloud Voice over Internet Protocol Botnet Maintenance Paper Touchscreen Hosted Solution Current Events Leadership Windows 10 Yahoo Emergency Encryption Computer Care Public Speaking Search Net Neutrality Presentation Personal Information Lithium-ion battery Vendor Management Augmented Reality Gaming Console Autocorrect Avoiding Downtime Wireless Technology 5G IBM Dark Data Scalability Scheduling The Internet of Things Video Games Samsung Hacker Synergy IaaS Budget Managed Service Provider Worker Customer Relationship Management DDoS Credit Cards Competition Television Instagram IP Address Emoji Money Quick Tips HaaS Employer Employee Relationship Printer Customer Service Fun Regulation Upgrade Freedom of Information Mobile Office Unified Threat Management Domains

Newsletter Sign Up