Tuesday, April 23, 2019

Custom Cursor for Chrome

Fun custom cursors for Chrome™. Use a large collection of free cursors or upload your own.
Customize your experience of using the Chrome browser with cool free mouse cursors.

Create your own collection of mouse cursors from any images.

For your uploading we recommend using:
- Small images (optimally 16x16, 32x32 pixels, not more than 128x128);
- Images on a transparent background, such as .png format.

! After installing this extension, refresh the previously opened tab if you want to use it on this page.

! According to the rules of the Chrome Web Store extension can not work on the store pages and home page.
Please open any other website (for example, google.com) after installing this extension and check how the extension will work on it.

Use collection of over 100 different cursors, distributed according to categories and for every taste:
- Minecraft;
- Lightsaber;
- Pizza;
- And many, many other funny cursors.

Some of our cursors are bundled with Custom Cursor browser extension, but most of them await you on our website. Be sure to check the website often because new and trending cursors  are constantly being added.

But if you still did not find that you like - use "UPLOAD CURSOR" button and Add your own.

Create your personal collection of cute cursors and manage your collection on Upload page.
Easily adjust the size of your cursor in the "Manage" section.

For easier navigation through the cursors, we divided them into bright cursor collections. Each of them has its own unique theme. For example, you can find your cursor faster in the general collections:

- Starters;
- Color;
- Holidays;
- Animals;
- Life style;
- Sport;
- Food;
- Job;
and much, much more on our website.

Your newly added collections will be uploaded to extension and can be found in the bottom of the extensions collection list. If you upload your own cursors, they will appear in the extension window, in “My Collection”.

Also, you can immediately preview how it will look by clicking on it in the extension window and move mouse slightly to the side to the empty space of the extension window.

Tuesday, April 16, 2019

Kami a great annotation app for teachers

Best PDF and Document Annotation and Markup Tool. Works with Google Drive and Google Classroom
Your Digital Classroom Hero

Kami is the no. 1 PDF and document annotation app for Chrome. With Kami as your digital pen and paper, you can improve productivity and collaboration by using our interactive tools wherever, whenever.

Why Kami?
✓ Teachers save time and work more efficiently
✓ Students engage and work collaboratively 
✓ School Districts save money on printing costs
✓ Automatically sync and store your files in Google Drive

Tuesday, April 2, 2019

Phishing 101: 5 ways to spot fraudulent emails

Phishing 101While it might be hard to admit, cyber criminals are pretty good students of human behavior. 
From manipulating complex emotions to subtly Miss Spelling (pun intended) run-of-the-mill URLs, feigned sincerity and the illusion of respectability are just as likely to elicit meaningful responses online as in real life.  If not more so.    
One illustration of the psychological prowess of cyber criminals is the well known “social engineering” technique known as phishing, in which electronic communications—emails, mostly— are sent to gain sensitive information from a victim.  Phishing attacks must be convincing enough to bypass security screening and bait a recipient into clicking through to an infected website, potentially compromising the entire network.  
Molding workers into hardened cynics to defend against phishing isn’t the path forward. Instead, businesses need to recognize the signs of an attack and train their employees on how to act when something small is just not quite right.

What to do?
The first assessment is to look at the email and ask if the context fits. Ask – “is the information I’m being asked to give within my role? Basically, does this make sense for me to be getting this email, in this context, right now?”  
Second, examine the content. Is there a hyperlink, and where does it go?
Third, what can you tell from the text and layout: phishing text can seem slightly discolored or wrongly formatted.  
Fourth, who is this from? It’s a good idea to verify the sender’s name and email.   Hovering over the senders address will often show you the full email address of the sender rather than one formatted for presentation. Often this is where a look-alike domain name can be spotted. 
Finally, the poor spelling often found in phishing emails has less to do with a need for remedial grammar lessons and more to do with lessons learned over the years. Savvy cyber criminals are using social engineering techniques to position themselves as non-English-speaking individuals as a form of emotional manipulation.  Even savvier cyber criminals now use misspellings and grammatical errors to self-select more vulnerable targets.  
But even with these helpful pointers, the phishing pond is only half full.  A more secure bet is to partner with cyber security professionals, who can help businesses mitigate risk related to increasingly sophisticated social engineering techniques. With the help of hosted services, security professionals will be able to teach cyber criminals a lesson – that this phishing hole is closed.