How to recognize phishing email messages, links, or phone calls

[Origin]: https://www.microsoft.com/en-us/safety/online-privacy/phishing-symptoms.aspx

How to recognize phishing email messages, links, or phone calls

Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer.

Cybercriminals also use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. They might email you, call you on the phone, or convince you to download something off of a website.

What does a phishing email message look like?

Here is an example of what a phishing scam in an email message might look like.

What is phishing

  • Spelling and bad grammar. Cybercriminals are not known for their grammar and spelling. Professional companies or organizations usually have a staff of copy editors that will not allow a mass email like this to go out to its users. If you notice mistakes in an email, it might be a scam. For more information, see Email and web scams: How to help protect yourself.
  • Beware of links in email. If you see a link in a suspicious email message, don’t click on it. Rest your mouse (but don’t click) on the link to see if the address matches the link that was typed in the message. In the example below the link reveals the real web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company’s web address.

    Phishing scams masked web address

    Links might also lead you to .exe files. These kinds of file are known to spread malicious software.

  • Threats. Have you ever received a threat that your account would be closed if you didn’t respond to an email message? The email message shown above is an example of the same trick. Cybercriminals often use threats that your security has been compromised. For more information, see Watch out for fake alerts.
  • Spoofing popular websites or companies. Scam artists use graphics in email that appear to be connected to legitimate websites but actually take you to phony scam sites or legitimate-looking pop-up windows. For more information, see Avoid scams that use the Microsoft name fraudulently.

    Cybercriminals also use web addresses that resemble the names of well-known companies but are slightly altered. For more information, see Protect yourself from cybersquatting and fake web addresses.

Beware of phishing phone calls

Cybercriminals might call you on the phone and offer to help solve your computer problems or sell you a software license. Neither Microsoft nor our partners make unsolicited phone calls (also known as cold calls) to charge you for computer security or software fixes.

Once they’ve gained your trust, cybercriminals might ask for your user name and password or ask you to go to a website to install software that will let them access your computer to fix it. Once you do this, your computer and your personal information is vulnerable.

Treat all unsolicited phone calls with skepticism. Do not provide any personal information.

For more information, see Avoid tech support phone scams.

Report phishing scams

If you receive a fake phone call, take down the caller’s information and report it to your local authorities.

Whenever you receive a phone call or see a pop-up window on your PC and feel uncertain whether it is from someone at Microsoft, don’t take the risk. Reach out directly to one of our technical support experts dedicated to helping you at the Microsoft Answer Desk. Or you can simply call us at 1-800-426-9400 or one of our customer service phone numbers for people located around the world.

You can use Microsoft tools to report a suspected scam on the web or in email.

  • Internet Explorer. While you are on a suspicious site, click the gear icon and then point to Safety. Then click Report Unsafe Website and use the web page that is displayed to report the website.
  • Outlook.com (formerly Hotmail). If you receive a suspicious email message that asks for personal information, click the check box next to the message in your Outlook inbox. Click the arrow next to Junk and then point to Phishing scam.
  • Microsoft Office Outlook 2010 and 2013. Right-click the suspicious message, point to Junk, and then click Report Junk.

SmartObjectServiceFunctions – Authentication Failed: The target principal name is incorrect

[Origin] http://community.k2.com/t5/K2-blackpearl/SmartObjectServiceFunctions-Authentication-Failed-The-target/ta-p/87586

Symptoms 

SmartObjectServiceFunctions – Authentication Failed: The target principal name is incorrect

Diagnoses
When you receive an error when trying to Create CRM Entity Item within K2 Studio.

As a result you are unable to connect to the CRM Server despite being able to use the Smart Object Tester to create records using the relevant Smart Object.

Resolution

You can resolve this issue by refreshing the ‘SmartobjectServicefuction’ service instance and service object. After this you should be able to drag in the event to any activity within studio.

Note: use the server tool ‘SmartObjects Service Tester’ to refresh it.

How to enable NumLock on the Logon screen and Lock screen in Windows 10

[Origin] http://winaero.com/blog/enable-numlock-logon-screen-windows-10/

How to enable NumLock on the Logon screen and Lock screen in Windows 10

If your Windows account password or user name includes numerals, you might need to frequently use the numeric keypad to enter them. For that you need to enable NumLock, which may not on by default on your Logon screen/Lock screen in Windows 10. In this article, we will see how to enable Num Lock by default. This trick will also work in Windows 8.1, Windows 8 and Windows 7.

Enable NumLock by default in Windows 10, Windows 8, Windows 8.1 and Windows 7

This does not require any Registry hacks or changes to system settings.
Simply boot to the login screen or the Lock screen and do the following:

  1. On the Logon/Lock screen, press the NumLock key on the keyboard to turn it on.
  2. The Login screen contains a power button in the bottom right corner. Use it to reboot Windows:Windows 10 reboot from login screen

The next time Windows boots, NumLock will be automatically enabled. If this trick does not work for you for some reason, try the Registry tweak below. It should work in all modern Windows versions including Windows 10 and Windows 8.x.

Enable NumLock by default using Registry tweak

Here we go.

  1. Open Registry Editor.
  2. Go to the following Registry key:
    HKEY_USERS\.DEFAULT\Control Panel\Keyboard

    Tip: You can access any desired Registry key with one click.
    If you do not have this Registry key, then just create it.

  3. Find the string value called “InitialKeyboardIndicators”. In Windows 7, set its value data to 2. In Windows 8 and above, set its value to 80000002. A note for Windows 10 users: if your Windows 10 does not save the state of NumLock after the reboot, try to set the value “InitialKeyboardIndicators” to 2147483650. This will turn on NumLock on the logon screen starting from the next boot.enable numlock Windows 10

Bonus tip:Using the InitialKeyboardIndicators parameter, it is possible to control other keys besides NumLock. See the table for its possible values for Windows 7:

InitialKeyboardIndicators value Purpose
0 Turn all indicators off (NumLock, CapsLock, ScrollLock)
1 Turn CapsLock on
2 Turn NumLock on
3 Turn CapsLock and NumLock on
4 Turn ScrollLock on
5 Turn CapsLock and ScrollLock on
6 Turn NumLock and ScrollLock on
7 Turn all indicators on (NumLock, CapsLock, ScrollLock)

For Windows 8 and above you should try to use values like 80000000,80000001,80000002, i.e. add 80000000 to Windows 7 value.

You can save your time and use Winaero Tweaker instead. It comes with the following feature:

Winaero Tweaker Enable Numlock

You can download it here: Download Winaero Tweaker.
That’s it.