More Virtual Threats through your Browser: COOKIES
What is a Tracking Cookie? A tracking cookie can be used to follow people around the Web as they jump from site to site. Though your IP address or your HTTP request header’s referral field can also be used to accomplish this, in part, tracking cookies allow for more accurate tracks. When you visit a […] Continue Reading…
Computer Threats: Fake Updates from Symantec Products
One of the fastest-growing methods cybercriminals are using of disseminating malware is through fake antivirus software. Fake antivirus software can either be a program that claims to be antivirus software that does little or no work, or it can actually be a Trojan horse, disguised to actually implant malware onto a computer. The purpose of […] Continue Reading…
True Impact of The Cloud
The cloud model is the result of the creative reimagining of several technologies, most notably virtualization. It takes advantage of the widespread availability of high-bandwidth Internetworking, and grid-like scalability of hardware and software, all fueled by the availability of commoditized (i.e. affordable) infrastructure. This has enabled the realization of a true services-focused approach to IT […] Continue Reading…
Held Hostage By Your Computer Guy?
Don’t hire the wrong IT Vendor. Helpful tips to use when hiring the right candidate.
Continue Reading…Top Stories of Disaster Recovery 2011
It’s unfortunate, but computer hardware is bound to fail at some point… Here are the Top 10 Data Disasters of 2011: Triple whammy: When a lightning strike caused a fire that sent a famous Caribbean island home up in smoke, the computer servers were burned and then doused with water by the fire squad. The media […] Continue Reading…