Summer is here, thunderstorms are coming, here are a couple simple tips to protect your business from a serious problem:
Tom McDonald
Recent Posts
Thunderstorms, 6 simple steps to protect your IT service!
See Which Sites LulzSec has Hacked and How You Can Protect Yourself
A rogue hacking organization, LulzSec, has been terrorizing different internet sites as a way of protesting certain corporations and governments that they find to be corrupt, and then adding in their own random hijinks into the mix taking down legitimate sites also which they state that they do it for the Lulz. LulzSec has “hacked” the various sites to different degrees, sometimes with the intent to hurt the company by stealing customer data and forcing them to update and fix their security flaws, other sites they do it to prove that there are security holes with no malicious intentions, and finally some sites are hit with DDoS attacks, (Distributed Denial of Service) which is overloading the server with requests so it becomes unavailable for its intended users.
Some of the high profile attacks the group LulzSec has attacked have been:
- PBS (Stole user data and posted a fake news story)
- Sony (Stole user data of up to 1 million users causing Sony to take down the Playstation network for over a month
- Nintendo (Stole a Config file and apologized to Nintendo, stating they love the N64 too much to hurt them)
- Black & Berg Cybersecurity Consulting (Who had posted a hacking challenge that was completed by LulzSec)
- Pron.com (A pornographic website in which 26,000 of its user’s emails and passwords were posted online with encouragement from LulzSec to try them on Facebook and other sites)
- Bethesda Game Studios (Posted information taken from their site, but did not post the 200,000 account information that they had stolen from the site also)
- Minecraft (DDoS attack from their “Titanic Take-down Tuesday”)
- League of Legends (DDoS attack from their “Titanic Take-down Tuesday”)
- The Escapist (DDoS attack from their “Titanic Take-down Tuesday”)
- FinFisher (An IT security company that was also hit with a DDoS attack from their “Titanic Take-down Tuesday”)
- EVE Online (DDoS attack from their “Titanic Take-down Tuesday”)
- Writerspace.com (62,000 User emails and passwords were posted, later it was revealed it was from Writerspace.com)
- InfraGard (a Company that works the FBI for botnet detection, they hacked and leaked some user accounts from their data base)
- British National Health Service (They emailed the administratiors letting them know they found a security hole, and did not intend on exploiting it)
- Senate.gov (Released emails and passwords of users of senate.gov)
- Cia.gov ( Used a DDoS attack to take down the site after the Pentagon said that cyberattacks could be considered an act of war)
Lenovo Leads as Most Reliable Laptop Brand with Asus Trailing Close Behind
RescueCom has released their quarterly report outlining the top 5 Laptop brands based on quality. Lenovo laptops ranked highest with a score of 254, followed by Asus with 242. Toshiba took third with 164, followed by Apple with 149 and HP with 122.
RescueCom is a computer repair center and has been recording their data since 2006. They determine each brand’s reliability rating by looking at 3 different factors:
- Looking at each brands market share in that given time period compare to the percentage of repair calls for that specific brand
- Component Quality used within the laptops; the better the quality of the components the less likely they are going to fail
- Likelihood the customer will need a third party support on their PC; a lack of manufacturer support sends more customers to third party vendors for support
Amazon Removes Itself from Connecticut and Arkansas in order to Avoid Paying Sales Tax
15 Run Commands to Help You Become a Power User
A power user is someone who uses the advanced features of the OS that a "normal" user wouldn't need access to. For many power users, getting to the right menu's and utilities as quickly as possible is a must have. Below is a list of 15 Run Commands that every power user should be acquainted with.
Subscribe by email
Popular Articles
Post By Topics
- A Single Physical Server (1)
- About Us (6)
- Amazon (6)
- Apple (8)
- Backup Solutions (34)
- Biz Events (1)
- Cloud (2)
- Cloud Applications (14)
- Cloud Computing (24)
- Cognos (1)
- Computer Tips (33)
- Customer Video (2)
- Cyber Security Tips (19)
- Desktop Server (1)
- Desktop Virtualization (3)
- Disaster Recovery (20)
- Education (7)
- Fault Tolerance (2)
- Hackers (5)
- Healthcare (7)
- High Availability (5)
- IBM (1)
- Insurance (3)
- IT Effectiveness (43)
- IT Management Complexity (2)
- IT News (46)
- IT Projects (23)
- IT Support (39)
- IT Support Connecticut (43)
- IT Support CT (37)
- IT Tips (2)
- ITSupport (4)
- K-12 (9)
- LulzSec (1)
- Managed IT Services (14)
- Managed Print Services (7)
- Managed Service Provider CT (10)
- Managed Service Providers (20)
- Manufacturing (5)
- Mobile Security (1)
- Mobile World (11)
- MS Office 365 (2)
- MSP (11)
- Network (2)
- Network Downtime (4)
- Network Support CT (4)
- NewEgg (3)
- NSI (19)
- NSI TotalCare (1)
- Outcome-as-a-Service (1)
- PC Basics (12)
- Physical Server (1)
- Printers (9)
- Sales & Marketing Tip (1)
- Security (36)
- Security Features (6)
- Server OS (2)
- Small Business (26)
- Small Businesses (54)
- Smart Phone (15)
- Smartphone Security (4)
- SMB (33)
- Sonicwall (1)
- Streamline Management (1)
- Study (13)
- Totalcare (12)
- Upgrade (4)
- Using a Desktop PC as a Server (1)
- VDI (2)
- Virtualization (14)
- Virus (1)
- vMotion (5)
- VMware (10)
- VMware features (7)
- Xerox (6)