Those Famous Dirty Words
By pressing the "F3" key, Pearl Echo automatically searches the active log based on George Carlin's "Seven Dirty Words". For more information on this topic see http://www.pearlsoftware.com/help/carlin.htm.
You can right-click on any entry in a Pearl Echo Log Window to link to and view a site, restore data like email content and chat, update a control list or decode email attachments.
For Web sites you can also view the Echo.Filters category to which the web site belongs.
Auto-Refresh the Activity Log
To automatically update the Pearl Echo Activity Log, select "Auto-Refresh" from the File menu. While in Auto-Refresh mode other Pearl Echo console features are unavailable. Press Alt+F5 to escape Auto-Refresh mode.
Internet Acceptable Use Policy
You can inform users of your Acceptable Use Policy by summarizing it in the Warning message box in the Options menu. Your message can be a maximum of 256 characters.
You can also set you user's browser to redirect to an web page that hosts your AUP.
The year-end saw an unprecedented number of emails from retailers and businesses looking for you to visit them and make a purchase. Unfortunately, this time of year also brings a large increase in spam and hack attempts that arrive in your inbox alongside the overflow of retailer emails. These emails are also known as “Phishing” emails.
Whether you're on a corporate network or personal network you will be putting yourself at risk by opening these fraudulent emails. Phishing emails are getting harder and harder to differentiate from legitimate emails and when opened on a network can cause major havoc and security issues for your business data. So how do you know whether an email is legitimate or a “Phishing” email?
The tips below will help you identify and avoid falling prey to a phishing email: More about this topic...