General Internet FAQs

Table of Contents





What is a Firewall? Do I need one?

A firewall can be a piece of hardware, such as a router, or software installed on your computer. Firewalls are designed to block incoming and/or outgoing connections to a user's computer through the Internet. Firewalls are used specifically to keep hackers and other attacks from connecting to your computer through the Internet. They are not required, but provide an added layer of security.

A firewall can be divided into two types, hardware and software. A hardware firewall is a physical device that is plugged in between the Internet connection and your computer or network. This type of firewall may be within most network routers. This type of firewall is not shared with other programs and is less likely to slow things down and potentially become unstable. It also is capable of protecting a network of computers rather then just one. The disadvantage is that its update procedure has a few more steps then simply clicking a button.

A software firewall is a software program that is installed onto your personal computer. This type of firewall is included in most Internet Security Suites. This type of firewall can be easier to update. Most software has a single click experience. Unfortunately firewall software will only protect the PC it is installed on. Also, they require more configuring to be properly setup. A misconfigured firewall may end up blocking the programs you wish to use to access the Internet.

For more information on purchasing or configuring a hardware or software firewall, you may wish to contact a local computer sales person or computer repair technician.


What is Windows Update? Should I use it?

Windows Update is system designed by Microsoft to fix bugs and security holes in the supported windows operating systems and the Internet Explorer browser. With this Microsoft can readily provided fixes to broken parts (bugs) of these programs and patch any security problems (holes) that could put the information on your computer at risk to viruses or hackers.

Microsoft has defined three categories of updates: high priority (critical), software (windows), and hardware (driver). The names in parenthesis are used with versions of windows other then XP. We recommend using this system to update at least the high priority or critical updates.  It is also recommended to review the descriptions for the updates in the remaining categories to decide if they are needed. After running windows update, go back and see if there are any new updates that are available because of an update you just installed. Most configurations of the windows operating system have a windows update program you can run. If you cannot find this program, visit to www.windowsupdate.com in an Internet Explorer window.


Do I need Antivirus Protection?

Yes, you do need protection from computer viruses. Viruses can infect a computer from many different sources. If you receive an email with an attachment do not open it unless you are expecting it, even if it is from an address you recognize. If the email attachment was from an address you recognize, get some kind of confirmation from the sender that they intended to send it. Otherwise delete the email and attachment immediately.

A strange email is still the most common way of infection, but in today’s information sharing world it is not the only one. Many home users are joining file-sharing networks to trade videos, music, and documents. Few of these networks have administrators protecting their users from viruses and other harmful activity.

Updating windows and all programs that use an Internet connection can patch security holes that would otherwise allow viruses to connect and infect the computer. For more information on windows update, see 'What is Windows Update'.

We strongly recommend running antivirus software on any computer as well turning on its auto-update features to update daily. New viruses can be created everyday and old viruses can be changed to avoid being detected by outdated antivirus software. Most antivirus software will scan incoming email, outgoing email, and files being copied to the computer. Once a virus is located, the antivirus software should give the option of removing the virus or locking it up to avoid infection until a removal method is known.


What is Spyware, Adware, or Malware and what can I do about them?

Spyware is basically any technology that helps gather information about a computer user without their knowledge. Adware is any software with banner advertisements displayed while it is running. Malware is any software that is harmful to a computer user, such as a virus or spyware.

Invasion of privacy is not the only harm these can do. Some spyware and adware are classified as malware because they alter the files used for connecting to the Internet in an unwanted way. This change causes the operating system to process more information about what the malware wants rather then what the user wants. As a result, the Internet access will seem slow or disconnected, or so many pop-ups will spawn that the Internet or computer is unusable. If you are seeing an annoying amount of pop-ups please also see 'Why am I seeing pop-ups'.

We strongly recommend the following things:

  1. Use Windows Update. See the section 'What is Windows Update' for more information.
  2. Install and update Antivirus software. See the section 'Do I need Antivirus Software' for more information.
  3. Install software to find and remove spyware and adware. You may wish to contact our Internet Help Desk (1-855-368-3684 or 507-387-6430) or for any current recommendations.

Why am I seeing pop-ups? What can I do about it?

Pop-ups can be caused by the code in the webpage you have visited. Most reputable web pages may generate only one harmless pop up; other web sites cause the installation of adware and spyware that will cause many pop-ups. When visiting a web site remember this; the company is attempting to tell you about itself, so if it looks professional, it probably is professional. Don’t install any software or ‘active-x controls’ without knowing what they are. If you’re running a windows update or visiting your antivirus software’s web site, these are reputable companies that are OK to trust.

Pop-ups can also be caused by adware that is installed with some free software. The free software may include adware that is not harmful.  Eudora, for example, is an email program. The free version has a single ad for itself, but does not cause pop-ups and is not harmful. However, most free file sharing networks include adware with their software to help pay for its development. This adware will connect to its servers and display the current pop-up ads and may use your Internet access so it seems slow or nonexistent. If you are running any free software you may want to view its license agreement to know if it includes adware.

We strongly recommend installing software to find and remove spyware and adware. Some pop-ups may advertise software that will falsely claim to remove the problem. This software usually ends up removing the adware already installed but then installs their adware. You may wish to contact our Internet Help Desk (1-855-368-3684 or 507-387-6430) for any current recommendations. If you use any spyware removal software please remember to read the licenses for any free software on your computer. Removal of the adware may be a violation of that agreement and therefore break the free software.


How do I set up my Email on my computer using an Email client (such as Outlook Express, Windows Mail, or Mac Mail)?

Consolidated Communications' Email system uses a few settings that differ from the defaults your email client holds. Please use the following information when setting up your email account:

  • For Server Type, select POP.
  • In the Incoming mail server box, enter the POP3 server name:
    • POP3: pop.hickorytech.net Port: 110
    • Do NOT click Requires a secure connection (SSL)
    • Under Authenticate Using, select Clear text
  • In the Outgoing mail server (SMTP) box, enter the SMTP server name:
    • SMTP: smtp.hickorytech.net Port: 587 *Some devices, such as the iPhone, may require that you use port 465*
    • Click Requires a secure connection (SSL) and Requires authentication.
  • In the Logon user name box, enter your Full Email Address

If you are not sure how to change these settings within your specific email client, please visit Consolidated Communications.com/support/residential-support/internet-email-support/email-settings-user-guides.aspx for more detailed information. From this page, you may select the email client of your choice. Please note that your email can always be accessed online.


How do I change my password to something I can remember?

  • To change your password, please visit webmail.hickorytech.net. Click on the Forgot Your Password link next to the password field, and then click on the link that says Change Your Password.
  • You will need to know your username, your current password, and the password you want to change it to. Your new password must be 3-16 characters in length and must contain both letters and numbers. Your password cannot be the same as the username. Please note that your password is case sensitive.
  • If this is the first time you have changed your password, you will be prompted to enter a security question and answer before your change of password is complete. You can type any question you want; whatever you type here will be displayed to you if you ever use the Forgot Your Password link and wish to change your password.
  • IMPORTANT! Your password change does NOT take place until you see a confirmation page that states "Password for User: username changed to new_password (Self Change)." It will show you your secret question and answer, and the username one more time.
    Note: It may take up to 10 minutes for your change to take effect.