Managed Antivirus Solutions for Your Business

November 26, 2018
Computer viruses include all kinds of programs like worms, adware, spyware, ransomware, and Trojan horses that attack computers and devices across your network, with truly harmful effects on your business. Managed antivirus solutions protect your ability to continue doing business – preventing infection of your network, shielding your clients’ data, and keeping you from experiencing […]
Read MoreCommon RAID Levels For Storage

July 23, 2018
For enterprise storage, RAID configuration is a must. RAID stands for Redundant Array of Independent Disks, it’s basically a bunch of hard drives working together. When you have some redundancy in the form of extra hard drives working together in a RAID array, they can be used to provide additional protection against data loss, and […]
Read MoreWhy You Should Send Your Child to Coding Camp this Summer

May 31, 2018
Many things pull for the attention of parents and children during the months of June, July and August. Vacations, sporting activities and downtime. However, I encourage you to set aside at least one week this summer for your child to attend a tech camp designed to teach them how to code. This post will explain […]
Read MoreHow To Ensure That Your ISP Isn’t Lying

January 10, 2017
How many times has your internet service provider told you you should be getting X up and Y down yet you cant even play your games when your mom is watching Netflix in the other room? Well now it is easier than ever to make sure your ISP isn’t ripping you off. Ookla, the company […]
Read MoreWhy You Should Get MacOS 10.12.2

December 20, 2016
There is more of reason to switch to Apples new macOS 10.12.2 than better battery life. A Swedish hacker made a device that steals passwords off a mac just by connecting a cable. By simply connecting a device running his PCILeech software to a MacBook’s Thunderbolt port, then forcing a reboot, you can gain the system’s password in less […]
Read MoreTesla Gigafactory Construction Flyover

May 21, 2015
The first 4k ultra-high-definition video of the Tesla Gigafactory under construction. Located 15 minutes East of Reno, NV the Gigafactory is being built at a brisk pace. You only need to watch the first 50 seconds or so to get the idea.
Read MoreComputer Security Watch – Jan 30, 2014 With Virus Removal

January 30, 2015
A Virus Filled World Out There Today’s Top Threat W32.Tempedreve.C!inf The Tempedreve worm creates a host of files on your PC, and creates a fake invoice document to try to get you to pay for the removal of the virus. The worm will connect to other network devices including jump drives and network drives. […]
Read MoreIs Your Firewall Good Enough For You?

November 21, 2014
Firewalls are easily considered one of the most essential features of security for your computer. A firewall is a network security system that controls the incoming and outgoing network traffic based on applied rule set. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is assumed […]
Read MoreComputer Security Watch – Nov 3, 2014

November 3, 2014
Gone Phishing Today’s Top Threat SONAR.SuspBeh!gen254 The Sonar.Suspbeh is a heuristic analysis, which means that it’s a virus that masquerades as an antivirus trying to trick you into getting more viruses. They tend to steal information from the willing and unwilling. Today’s Top Stories 2015 Predictions: The Invisible Becomes Visible “2014 brought with it […]
Read MoreComputer Security Watch – Oct 13, 2014

October 13, 2014
Viruses Are Like A Potato Chip Today’s Top Threat Android.Gomal The Android.Gomal is a Trojan virus directed at Android phone systems, its primary function is to steal information from the device and send it back to the user. When in doubt it’s a good idea to scan your phone to make sure you do […]
Read More