Limitless Possibilities

At CourseVector, we work with each client to produce a tailored menu of services that meets their needs as well as their budget. See how our affordable SEO, web design, hosting, and other services can build your online identity.

Blog

Malware and Social Engineering – An Introduction

Malware and Social Engineering are the two key tools used to compromise computers, phones, tablets and other devices. Understanding what they are and how they work will help to keep your systems safe and secure. Sans has provided an excellent article explaining, in common terms, what social engineering is and how it can be used ...

Link to a YouTube Video at a Specific Location

To create a YouTube link that starts at a certain point within the video, play the clip and press the pause button when the video is at the starting location. Click the Share Button below the video. Turn on the checkbox next to “Start at:”. The video’s web address should now be part of ...

SEO Search Engine Optimization Experiments

SEO Search Engine Optimization is an ever-changing pursuit. An article in Search Engine Watch documented some pretty interesting SEO experiments done during 2016 and the results. There is really nothing new about the findings, however they do lend credence to what most professional SEO technicians have always said. Following is a summary ...

PHPMailer Vulnerability and WordPress

The PHPMailer Vulnerability has created a lot of “chatter” about about potential issues with WordPress. For the record, the vulnerability does and did not affect WordPress or any WordPress plugins. Some plugins with poor coding could potentially have a problem, however it is very unlikely. The next patch for WordPress, 4.7.1, will ...

Domain Registration Scams

Domain Registration Scams usually happen when registrars send out notices, and bills, even though you do not have your domain name registered with them. Worse, they tend to charge more money, and, sometimes they can tie up your domain name to the point where you end up losing it or paying an extraordinary sum ...

Yahoo Breached Again 1 Billion Users Affected

Yahoo breached again resulting in more than one billion user accounts being compromised. The breach occurred in August 2013. This breach is believed to be separate from the reported this September. The stolen data may include names, email addresses, telephone numbers, dates of birth, hashed passwords and, possibly encrypted or unencrypted security questions ...

DNSChanger Router Exploit

The DNSChanger Exploit is distributed via malvertising and is unique because the malvertising component of the attack doesn’t target browsers but rather a victim’s router. This exploit is unrelated to the Netgear Router Exploit announced earlier. DNSChanger attacks begin with hackers buying and placing ads on mainstream websites. Those ads contain malicious code ...

Flash Blocked and No Longer Supported

As of January 2017, flash will no longer be supported by most major browsers. Most search engines including Google will also be blocking access to web pages that are using flash. Some search engines and browsers will just be displaying a warning but will still allow the user to visit the site; however, ...

Ready to get started?