631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Intro to Your Tech: Link

Intro to Your Tech: Link

Navigation is critical to success in just about any computing system, and the Internet is no exception. In essence, it’s a compilation of web pages, images, videos, and countless other bits of content that are all interconnected by what are called “links.”

Links, more commonly called hyperlinks, are basically just calls to specific information that can be clicked on (or tapped with your finger on a touch-screen device). Even if it’s not specifically called a link, chances are that buttons and other on-screen elements contain hyperlinks that are connected to specific bits of information.

Links are often shared amongst users to provide a direct means of accessing specific webpages, files on a network, and just about any other asset in an online environment. Links can be used in text to direct users to something else while reading a blog article, or they can be used as a text anchor to direct users to a specific part of a web page.

For example, if you see an image on a website, depending on how it’s configured, you might be “navigated” to another page where the picture is hosted when you click on it. The same can be said for when you’re trying to click on a link to a PDF or similar downloadable file. Depending on how the link is set up, they can initiate the download on-click.

While links can be helpful, they can also be dangerous. You should always hover over a link before clicking on it so you can see its file path. The file path can be seen in the information bar at the bottom of your browser when hovering over the link. If any part of the hyperlink address looks suspicious, think twice before clicking on it. After all, the last thing you want is to download a malicious file on accident. Hackers are more crafty than you might give them credit for--in fact, they can create entire malicious sites that look like the genuine article--only to get you to download malicious files or submit sensitive information. You can generally avoid these by paying attention to--you guessed it--the links in the address bar.

If you found this information interesting, be sure to subscribe to our blog.

Cloud System Security Can Be Tricky
Why Your Employees Aren’t as Productive as You’d L...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Cloud Privacy Network Security Productivity Cybersecurity User Tips Malware Microsoft Communications Tech Term Managed IT Services Smartphones Hardware Passwords Efficiency Backup Internet Email Communication Software Hackers Business Google Android Ransomware Outsourced IT Hosted Solutions Small Business Browser Innovation Business Management Windows 10 Data Recovery VoIP Mobile Device Wi-Fi Data Collaboration Data Backup Holiday Internet of Things Cloud Computing Mobile Devices Applications Network Save Money Alert Microsoft Office IT Support Smartphone IT Services Social Media Router Business Intelligence Computer Password Apps Bandwidth Twitter Access Control Users Managed IT Services Miscellaneous Saving Money Employer-Employee Relationship Wireless Virtualization Excel Office Patch Management Settings BDR Vulnerability Information Automation Analytics Marketing Blockchain VoIP Gadgets Government Workplace Tips Data Breach Business Continuity Office 365 Word Data Management Networking Phishing Mobile Device Management G Suite VPN WiFi Cybercrime Workers Wireless Charging Scam Data Protection Physical Security Managed IT Service BYOD Gmail Remote Monitoring and Management Tech Terms Connectivity Company Culture Battery Medical IT Cortana Virtual Assistant Dark Web Politics Data Security Productivity Mobility App Hacking Chrome Windows Tip of the week Remote Computing Managed Service Virus Computers Paperless Office Website Cost Management IT Support Compliance Artificial Intelligence Facebook Retail Remote Monitoring Spam Law Enforcement How To Telephone System Troubleshooting Inventory Access Content Filtering Proactive IT instant Messaging IT Management Sports CrashOverride Dongle Tablet Voice over Internet Protocol Wearables Edge Threat Hard Drives Travel Touchscreen Telecommute Movies Antivirus Two-factor Authentication Help Desk Processors Value Reporting Server Update Lead Generation Mobile Security Personal Information Vulnerabilities Microsoft Office 365 Bring Your Own Device Education Smart Technology Google Maps Knowledge Healthcare Laptop Printing Phone System Live Streaming Data loss Unified Communications Tech Support Telephone Systems File Sharing Certification Spyware Files Telephony Remote Support Outlook Operating System SaaS Safety User Tip Analysis Network Attached Storage Streaming Media WhatsApp Authentication Technology Tips Hybrid Cloud Google Drive Comparison Amazon Paper Staff RAM Spotify Remote Control User Security HP Database Staffing Voice over IP GDPR Hosted Solution Profitability WannaCry Environment Server Management Downloads Authorization Backup and Disaster Recovery Information Technology Specifications E-Commerce Ink Gadget Hiring/Firing Big Data Websites Microsoft Teams Spam Blocking Business Technology Training Document Management Tactics eCommerce Storage Work/Life Balance Copy Apple Eliminating Downtime HIPAA e-waste Printer Server Telecommuting Trends News SSD Entertainment Biometrics Multi-Factor Security Conferencing Plug-In Payment IT budget PowerPoint Shortcut Upgrade Managed IT Managing Stress Disaster Recovery Office Tips Automobile Email Management Sales Cables Security Cameras Digital Internet Explorer Recovery Botnet Licensing Online Shopping Error Machine Learning A.I. Maintenance Paste iPhone Wireless Internet Hard Drive disposal Cleaning Printers Millennials Leadership Yahoo Current Events Windows 10 Encryption Public Speaking Computer Care Search Presentation Vendor Management Lithium-ion battery Net Neutrality Autocorrect Augmented Reality Avoiding Downtime Gaming Console Wireless Technology 5G IBM Scheduling Dark Data Cryptocurrency Hacker Samsung Scalability The Internet of Things Synergy Budget Video Games Managed Service Provider Worker Customer Relationship Management Instagram IaaS Competition DDoS Television IP Address Credit Cards Money Emoji Employer Employee Relationship Emergency Printer Customer Service HaaS Fun Quick Tips Freedom of Information Mobile Office Unified Threat Management Domains Regulation

Newsletter Sign Up