Tom McDonald

President of NSI, Tom has been helping small and medium businesses succeed in Connecticut for over 25 years.

Recent Posts

Comparison Between Open Source and Closed Source Software

By Tom McDonald | Apr 8, 2011 2:03:00 PM

With Android and iOS being the top 2 OS’s in the mobile market many analysis compare the two by looking at the software model that Google applies versus Apple. Google’s Android is considered an Open Source mobile OS, while Apple’s iOS is considered closed source and each has its own benefits and issues. Google uses an open model, which means that they release the source code for the mobile OS, the source code is the code in English before it compiled into 1’s and 0’s, this gives developers the option to look deeper into the code and alter things as they wish. 

Read More >

Do's and Don'ts of Creating Passwords

By Tom McDonald | Apr 6, 2011 3:55:00 PM

Password security is one of those things that you don't think about until its too late, here we outline a simple list of Do's and Don'ts when picking a secure password. Hint: if you password is a simple dictionary word with a couple numbers its not secure.

Read More >

New Research Leads to New Ways to Better Increase Password Security

By Tom McDonald | Apr 4, 2011 10:26:00 AM

Its always been difficult for users and security experts to come to an agreement when it comes to password creation. Users want something simple and easy to remember so they can just log in without having to think of which password they need for that site, while security experts would like each person to have a to complex password with a mixture of capital letters, numbers and symbols. On top of that they say its best practice to use different passwords for each site, having the same password for each site leaves you vulnerable if your password leaks once it leaks for everything. But new research from Max-Planck-Institute for Physics of Complex Systems has come up with a way to help stop brute force attacks when it comes to hackers trying to steal your password.

Brute force attacks are when hackers run a program to try every letter combination in order to get into your account. This means that the longer and more complex the password is the longer it will take the hacker to try all the combinations.

Read More >

Disk Fragmentation, how it happens and what Defragging actually does

By Tom McDonald | Apr 1, 2011 9:15:00 AM

What Causes Fragmentation

As you use your computer fragmentation happens overtime, this is caused from adding and deleting files. What happens is when you delete a file the file isn’t actually delete it is just marked as ok to write over, so the next time windows needs to write a new file it just looks for the first available spot that is ok to write to and adds it there.

Read More >