Jump to content
ATX Community

Medlin Software, Dennis

Donors
  • Posts

    1,617
  • Joined

  • Last visited

  • Days Won

    62

Everything posted by Medlin Software, Dennis

  1. And it is always blamed on the sender, since the recipient likely has zero idea how their email gets to them, if at all. Thinking back on my Moose Lodge customers, the interesting thing is their cloud filter company has full and instant access to the entire content of all messages which pass through their system. The "tech" who resolved the issue I was having was able to pull up messages I had sent, read them, and white list my information so I do not get filtered. Another item to consider, is any outside company likely has the same ability, so one must consider all email as being posted on a wall for anyone to read, unless you control the entire process (which is possible if you manage your own domain). What I have had to do, on the fly, was add a way for my customers to also provide their text message number, and carrier (because of number portability, one cannot "detect" the carrier automatically), so I can send a subset of their receipt by text. Of course., not all carriers are part of a public list (to know their domain), so for some, I have to send text messages to all text messaging domains I can document (~60), and deal with the rejections... I could pay for a third party to send the text messages, but I do not like messaging out of my control.
  2. For business use, the server should not be doing any filtering at all, other than "maybe" for certain items You setup. Filtering must be done locally, so it is in your full control, and yes, you must check your spam every time you check any mail. The message you miss, or do not see as soon as it was received, could be one which costs you a large amount. While I don't do it present'y, as I have a well setup system (over years of use), I "used" to wash my mail through a test only system, so there was no way to open or click "links", or to have html images link to =the outside. I would delete unwanted in the text system, then the remainder I would see in a reader which allowed html messages. It was an extra step, but reduces the change of a loose nut at the keyboard opening something they should not. I suppose the most practical advice is if you never see a spam message get past your filters, or if you see a good message in your spam folder, your filters need adjustment as they are too strict. "Greylisting" is not terrible wen available, if your situation can work with slightly delayed incoming messages, since spammers do not usually try to resend.
  3. At least new to me... There are cloud based (claiming to be) spam filters which are increasing in use. The problem is their customers usually have no idea how to see the blocked messages - if they even can - and not all are bouncing blocked messages. These cloud filters aggregate all mail washed through them - from al of their customers. One which is annoying me at present has a rule where any untrusted sender (IP address) which passes more than 20 messages in a day to any combination of their customers, gets blocked for 14 days. They offer no way to contest their trust status. I am seeing this mostly on corporate type domains, but the number is spreading to other common domains as well. I share this as a warning, that more than ever, sending an email, and not getting a bounce, it is no guarantee your message made it to the recipient's account, not even to their spam folder. This is the same type of issue which makes antivirus programs nearly useless, as over protection blocks good things, and means one has to look at all things to make sure nothing was lost. Most of my customers who are affected had no idea their mail was being handled in a way which blocks wanted messages... so this is something all should check for themselves if you want to be sure you are not losing good messages.
  4. It is not what I think, it is clear passwords can be worked around as described in the second post. Most password schemes have a reset function, which can be used, with relative ease, to reset 9guessing using pet names, etc.). It is my contention that any password which can be reset is of no use against a pro hacker, since the reset process may not be secure. Your physical phone does not have to be stolen to be "lost". Someone can claim they are you, and get a SIM card for your number, then change the info so your number is no longer in your control. With your number, they may be able to access things with two factor, since they will have your phone number to receive calls and text messages. Phone providers have implemented auth methods to prevent this, but you have to "enable" the new security process. For instance, one of my family plan members needed a new sim, and had to get me to share my secret code (or add them as an auth admin) to be able to get the new sim. Had I not had the additional security on, with the proper phone number and name, they could have gotten a sim for any number on my account...
  5. Thus, showing again, passwords are often a complete waste of time (such as meeting the security practices item in another topic). Any password which has a workaround or reset capability should not be bothered with (if it can be avoided). Even two factor items, such as getting a code via text message is untrustworthy, since it is still fairly easy for someone to "steal" your cell phone number away from you (unless, ironically, you setup a security process such as two step with your cell provider!).
  6. Cash tips, if the employee reports them to the employer, do appear on a paycheck as income for tax and other calculations, then deducted (since already received). If the employee elects to pocket their cash tips, and not declare through payroll (presumably - ha - reporting on their own), then they lose out on including their actual income for many purposes, which those types of employees learn the hard way if they ever need to show all income for a car or property loan, or to qualify for things like housing programs. -- Tipped employees do get the shaft often. Some states do not consider tips as "income" when needed to calculate unemployment, family leave, or other benefits (good employer lobbies, no employee lobbies).
  7. Just for my own amusement, is someone else preparing the payroll and then putting the filing onus on you? Payroll liability is convoluted enough, many will not prepare forms unless they prepared/handled the entire payroll, because of the chain of deep pockets liability potential. The liability potential is a stretch, but defense is not cheap.
  8. I have not look at this specific item in a while. As I remember it, while the IRS prefers/suggests one set of forms per EIN, they (at least used to) accept multiple forms from one EIN. Personally, I would do one or the other for all forms, and not issue one global 941 with separate (by location) W2/W3 submissions.
  9. IIRC, the exception is valid unless specifically revoked. Have not seen any revocation, but I have not looked hard either.
  10. I would end services with both. I would likely provide copies of all relevant documents (what I was required to have kept ONLY, nothing extra) to each, and prepare two more sets, one for each attorney to be sent as soon as I receive authorization from each party. This may keep me out of subpoena/court, which is an expense I may not be able to recover recover easily. Preparation at my timing may be better than under pressure of a court order. If each knows the other will get the same set of required documents, it may reduce the need to involve me in any squabble. Depending on my requirements/restrictions, maybe I can ethically use the same letter to each, with a cc statement or something at the bottom. I would make sure I was not in possession of anything I was not required to have. For instance, if I am required to keep 4 years of documents, I would rid anything more than 5 years old. (The extra year is to avoid any issue with calculating the time down to a day or month.) Documents I am not supposed to have cannot do me any harm... The process should be exact, or close to, my process for firing a client. Upon final dissolution, if asked, I might choose one to resume services for one. I would not entertain accepting either until final dissolution.
  11. A necessity for any computer with data or information other than your own (and really, for all computers these days). It is a reasonable protection step which, if ignored, can be used against you if there is a breach. At least with the editions of Windows I use, it is "baked" in and seamless. The other encryption to be aware of is to encrypt your backups before they go to other media or the cloud. Do not rely on the backup service to encrypt for you. In other words, you handle the encryption first, using your own key, then upload or copy to storage.
  12. For applications which did not succumb to the direction to store items in the Windows Registry, this can still be true... But, most device users are so well insulated from file management, the odds of a good copy are slim. Like is often the case, this is a good and bad thing.
  13. From a support perspective (if you ever want a reasonable chance at receiving support), let software install and use the folders the maker determines work best for their software. Makers have reasons for selecting the folders they do. When you elect to use something else, you are "on your own" in most cases. If you are looking for security with the encryption, with a current computer, running encryption on all drives is not a huge burden. If encryption is desired, encrypt all, since not doing so may miss something on the raw drive you were not aware of.
  14. The reliability of manual copy of data or apps went away with DOS... All applications should be "installed', and all data should be backed up and restored using the application's built in backup and restore functions. In many cases, the same application version used to make the backup should be used for the restore (contact the application vendor for specifics).
  15. Agreed, but some may choose not to. My point was not about the merits of paying MS for extended support, it was the fact that it can be done, that W7 can be safely used after Jan 2020, if one wishes to avail themselves of the paid support. Companies (such as WK!) and individuals who claim otherwise are simply incorrect. Even further, while no one should believe XP is still viable, MS has, and continues to (May 2019 for instance) release security updates for XP and other unsupported editions. It is easy to do the math and realize MS knows many use XP, and it is cheaper to support XP unofficially than to deal with XP security issues. There is a good chance this policy will repeat with W7 after Jan 2020, but then again, offering paid extended support may be a trial balloon so see if they can really stop supporting an OS. I suspect that if there is another major need for a security update, which would save MS support costs, they will provide it free, XP to present.
  16. From the OP: "The company they are contracted with requires them to receive their pay in their own personal name with a 1099, they can't receive it in the name of the company they are starting." This is a common red flag that the person doing the work is really an employee, but to take the job, they capitulate to the employer's policy. If the entity receiving the 1099 must be a particular person, then it is an employee/employer relationship since the "employee" cannot send someone else to perform the task, and cannot be in business for themselves (since it must be reported to a particular person, not the person's business). As provided in the OP, nothing more than a scam to avoid WC, matching taxes, benefits, etc. Think Uber, DoorDash, FedEx, etc. DD is one I am slightly familiar with based on reading their documents. DD has verbiage making it appear the dasher can hire out the deliveries to others, but it is not really practical, since DD actually has verbiage which would limit the dasher's selection of employee's or subs.
  17. Jack offers a great tip. it is usually less risky to obtain a new computer with the desired OS preinstalled, compared to upgrading an OS. Arguably the main bene is having a known working setup (the old machine) on standby for 6 to 12 months while you get moved into the new machine. Hardware is CHEAP compared to recovering from a loss of data (via hardware failure, human failure, etc.).
  18. False. W7 can be used as safely as today, via paid support, for three more years. The paid support is not cheap, but it is available.
  19. Indeed! As seen when the OS is updated, having application items affected by an OS upgrade causes issues (which is should not), and while the issue is MS caused, the support is pushed away from MS. There are other ramifications, but the result is still the same, so what cbslee says.
  20. Can't offer an opinion on how ATX will operate after the upgrade. But, there are "unexpected" things to be aware of, and not panic. For instance, if you have software which installs and uses a custom font, the new version of Windows may not "see" the custom font until you reinstall the application which provided and uses the font.
  21. I see society in a way where sense is no longer common, and where the first reaction to any issue is "it could not have been my fault, who can I get to pay". Nuisance/go away/key money is large enough to be life changing to some, and those who pay (us) seem to not want to fight with dollars, and would rather pay for the problem to go away. My first message of the day was from someone who just updated their computer to a new OS version, and wrote me a nastygram about how my software failed after the OS upgrade (it did not). Now uncommon sense would have triggered the OS upgrade as the cause of the issue, but I can be easily reached, MS cannot, so MS successfully offloads their support on others (again).
  22. Unless this is a voluntary "come clean", only send exactly what is ordered in the form ordered. Nothing extra, nothing missing per the order(s). Sent with proof of delivery and signature required. (The last part is "new" for me, but I had to send something not too long ago. It arrived the day before the government shut down, and having that proof of delivery helped later when the office reopened.) Why I say only what is ordered is maybe the agency only goes back part way, not the full ten, and maybe even more likely, to not ever provided "extra".
  23. "see themselves". Tough to defend unless it matches some sort of regulation :). I have trouble seeing how a 1099 to a specific person for work done personally ("they must pay to the 1099 worker directly") can be transferred to another entity to then be converted to W2 wages. How can it be a proper 1099 situation if the person receiving the 1099 could not have sent someone else to do the work (since it, if the entity policy is in place, would have had to issue a separate 1099 to the person sent to do the work)?
  24. New computers are needed, but the "moving" is alway6s tough, even if one practices and has loads of experience. #1 Do NOT reply on someone such as the you know who squad. While they may transfer most things, they will more than likely not transfer everything. Then, when you pint out things are missing, they cannot really help as they have their "one way" of making the transfer, and do not really go any deeper. #2 Make a list off all applications which have important data. Contact the application vendor for their instructions for moving to a new computer. The application vendor is the expert with their product, so rely on them for their expertise. Remember, software is best "installed", not copied or moved, then use the software vendor's instructions for backup.restore/moving data - after the software has been installed on the new computer. #3 Do the steps learned #2, DO NOT wipe or discard the new computer for several months (I use 6) in case you discover something was missed. #4 While I have not used one in decades, there is still likely specialty software to mass move data to a new computer. (This is likely what the squad people do as well). The problem is, things WILL be missed, and you will still have to install your needed software anyway, so these things, without loads of experience, may not really save time. If you ignore #1, those in #2 cannot help after the fact.
×
×
  • Create New...