by Christopher Diamond | Aug 9, 2013 | Blog |
Guess again. Most hackers use your trust of humanity rather than their computer skills to gain access to your data. Here a great interview with a hacker on how he uses Social Engineering to get information and use that information to get in to secure systems. ...
by Christopher Diamond | Jul 19, 2013 | Blog |
Check out this MIT project called Immersion that will show you a graphic view of your Gmail history. Once you log in, Immersion will use only the From, To, Cc and Timestamp fields of the emails in the account you are signing in with. It will not access the subject or...
by Christopher Diamond | Jul 10, 2013 | Blog |
Are you tired of bumping you knee the giant box under your desk? Well them maybe you need to move to a NUC, Next Unit of Computing. The NUC is a 4″ x 4″ x 2″ computer that will fit neatly on any desk. They currently come as Bare Bone kits meaning...
by Christopher Diamond | Apr 25, 2013 | Blog |
Here’s a video from 1990 where Kim Komando explains this new fangled thing called a Computer…
by Christopher Diamond | Feb 20, 2013 | Blog |
If Bud Abbott and Lou Costello were alive today, their famous sketch, ‘Who’s on First? might have turned out something like this: COSTELLO CALLS TO BUY A COMPUTER FROM ABBOTT ABBOTT: Super Duper computer store. Can I help you? COSTELLO: Thanks I’m...
by Christopher Diamond | Nov 12, 2012 | Blog |
FBI Moneypak virus is the fastest spreading computer plaque these days , infecting a large number of computers each day . Around a year ago , FBI put their hands on the rogue antivirus scammers , which brought about an enormous decrease in malware business for some...