Cyber-Attacking Directed Towards Small Businesses
Since early June, one gang has been using a uniquely insidious type of automated attack to inject malicious code on some 20,000 to 30,000 sites, many of them small businesses that rely on the Internet to reach customers, says Wayne Huang, chief technical officer at website security firm Armorize. Many small business owners don’t realize […]
Continue Reading...Evaluating E-Mail Cloud Security from Microsoft and Google
Office 365 Vs. Google Apps: Top 10 Enterprise Concerns By Mathew J. SchwartzJune 29, 2011 04:52 PM Security remains a persistent question for potential cloud suite adopters, and with the debut of Microsoft Office 365 on Tuesday, one question from small and midsize businesses will no doubt be the cloud’s reliability and security track record, […]
Continue Reading...iPhones Tracking Your Location without Permission? Here Are Some Tools to Help…
By: Elinor Mills Want to wipe location-tracking data that’s being stored on your iPhone without your permission? There’s an app for that, but you’ve got to jailbreak your iPhone first. What is Jailbreaking? The process used to open the software of an iPhone, iTouch, or iPad, to allow the user greater access to the device […]
Continue Reading...Gmail’s Easy Access Password Breach!
Recently, Twitter suffered an embarrassment as a hacker obtained quite a bit of confidential information and passed it along to tech news sites. Apparently, the hacker accessed a Twitter employees’ Gmail account and used that to gain access to Google Docs, company systems, and more. Break into Gmail The employee most likely thought they had […]
Continue Reading...Increase your productivity with Dual Monitors
Dual Display is an excellent hardware solution for any multitasking Computer User. Historically, gamers, designers, engineers and editors were the only system users seen with this type of luxury (change word) configuration. Our society today craves technology gadgets and there has been a surge in consumer demand for increased productivity. Studies by: Jon Peddie Research […]
Continue Reading...Microsoft: Internet Explorer 9 Best at Sparing Your Laptop Battery!
By: Stephen Shankland Microsoft’s real-world power consumption measurements for several browsers with a news site open. (Credit: Microsoft) After some real-world tests, Microsoft has concluded Internet Explorer 9 is the most energy-efficient of the major browsers on the market. Microsoft compared its new browser with Opera 11, Firefox 4, Chrome 10, and Safari 5 on […]
Continue Reading...McAfee’s Anti Viral Program Finds “Holes”
By: Elinor Mills Researchers disclosed on a public security e-mail list today three vulnerabilities in the Web site of security firm McAfee, whose site has been found to have bugs several times before. The YGN Ethical Hacker Group told the Full Disclosure list that it had reported the problems to McAfee on February 10 and […]
Continue Reading...why orange county computer
At Orange County Computer® we take the initiative to make sure that we are always learning and applying our knowledge towards the newest of technologies ranging from: Network Infrastructure & Security Desktop/Laptop Repairs Hardware/Software Solutions Data Recovery in all levels (at a lower cost!) Virus Removal with long term prevention options DC Jack Repairs System […]
Continue Reading...