(415) 246-0101

Microtechs Blog

Intro to Your Tech: Link

Intro to Your Tech: Link

Navigation is critical to success in just about any computing system, and the Internet is no exception. In essence, it’s a compilation of web pages, images, videos, and countless other bits of content that are all interconnected by what are called “links.”

Links, more commonly called hyperlinks, are basically just calls to specific information that can be clicked on (or tapped with your finger on a touch-screen device). Even if it’s not specifically called a link, chances are that buttons and other on-screen elements contain hyperlinks that are connected to specific bits of information.

Links are often shared amongst users to provide a direct means of accessing specific webpages, files on a network, and just about any other asset in an online environment. Links can be used in text to direct users to something else while reading a blog article, or they can be used as a text anchor to direct users to a specific part of a web page.

For example, if you see an image on a website, depending on how it’s configured, you might be “navigated” to another page where the picture is hosted when you click on it. The same can be said for when you’re trying to click on a link to a PDF or similar downloadable file. Depending on how the link is set up, they can initiate the download on-click.

While links can be helpful, they can also be dangerous. You should always hover over a link before clicking on it so you can see its file path. The file path can be seen in the information bar at the bottom of your browser when hovering over the link. If any part of the hyperlink address looks suspicious, think twice before clicking on it. After all, the last thing you want is to download a malicious file on accident. Hackers are more crafty than you might give them credit for--in fact, they can create entire malicious sites that look like the genuine article--only to get you to download malicious files or submit sensitive information. You can generally avoid these by paying attention to--you guessed it--the links in the address bar.

If you found this information interesting, be sure to subscribe to our blog.

Cloud System Security Can Be Tricky
Why Your Employees Aren’t as Productive as You’d L...

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, December 11 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term User Tips Privacy Internet Cybersecurity Smartphones Productivity Microsoft Communication Efficiency Malware Cloud Browser Hardware IT Support Email Passwords Wi-Fi Google Android Saving Money Users Managed IT services Mobile Device Communications Applications Data Backup Network Data Business Management Backup Windows 10 Ransomware Software IT Services Small Business Data recovery Hosted Solutions Outsourced IT VoIp Marketing Networking Wireless Social Media Collaboration Workplace Tips Mobile Devices Business Managed IT Services Employer-Employee Relationship Cloud Computing Information Internet of Things Innovation Business Intelligence Blockchain Tech Terms Hackers Apps Phishing Remote Computing Computers Government VPN Smartphone Save Money Excel Cost Management Managed Service Router Computer Data Breach Managed IT Service Patch Management Compliance Bandwidth Wireless Charging Data Protection Cortana Virtual Assistant Gmail Analytics Automation BDR Miscellaneous Virtualization Remote Monitoring and Management Artificial Intelligence Connectivity Data Management SSD Sales Movies WannaCry Wireless Internet Virus Chrome Voice over IP Big Data Error Cables Update Machine Learning iPhone Value Conferencing Edge Medical IT Company Culture Authorization Operating System HP Analysis File Sharing Ink Tablet HIPAA Help Desk Antivirus Maintenance Holiday Streaming Media Network Attached Storage Voice over Internet Protocol Outlook Office SaaS Technology Tips Managing Stress Server Management Telecommuting Document Management Dongle PowerPoint Battery IT budget Touchscreen Facebook Unified Communications Hard Drive Plug-In Business Continuity Staff Law Enforcement Internet Explorer eCommerce Physical Security Business Technology Downloads Lead Generation Password Profitability Telecommute Database Content Filtering GDPR G Suite Environment Paperless Office Sports Microsoft Office 365 Twitter Knowledge Tip of the week RAM Processors Proactive IT Upgrade Threat User Tip Online Shopping Laptop Backup and Disaster Recovery Trends Eliminating Downtime Data loss Cybercrime Office 365 Storage Bring Your Own Device How To e-waste Comparison Workers Digital Gadgets IT Management Access Control Inventory Vulnerability Websites Printing Hard Drives A.I. Amazon BYOD Spam Tactics Telephony Dark Web Hybrid Cloud Troubleshooting Apple disposal Specifications Millennials Reporting User Security Server Microsoft Teams Authentication Mobile Security Spyware Microsoft Office Safety Paper Settings Alert Quick Tips Thank You Disaster Recovery Congratulations Printers Regulation Certification