• Posted on 2017/03/27 14:45

    The Cyber Division of the U.S. Federal Bureau of Investigation (FBI) has issued an alert to warn the healthcare industry that malicious actors are actively targeting File Transfer Protocol (FTP) servers that allow anonymous access. According to the law enforcement agency, attackers have targeted the FTP servers of medical and dental facilities in an effort to obtain access to protected health information (PHI) and personally identifiable information (PII), and use it to intimidate, blackmail and harass business owners. “The FBI recommends medical and dental healthcare entities request their respective IT services personnel to check networks for FTP servers running in anonymous mode. If businesses have a legitimate use for operating a FTP server in anonymous mode, administrators should ensure sensitive PHI or PII is not stored on the server,” the FBI said. The agency cited research conducted in 2015 by the University of Michigan, which showed that more than one

  • Posted on 2017/03/26 12:00

    This list describes common causes of slow Internet connections in homes. A poorly performing connection can be caused by broadband router configuration errors, wireless interference, or any of several other technical issues with your home network. Use these tips to not only diagnose but also fix the causes of slow Internet connections. Many of them apply to wireless hotspot connections, too. 1 Check Your Broadband Router Settings stefanamer/iStock As the centerpiece of a network, a broadband router can be responsible for slow Internet connections if configured improperly. For example, the MTU setting of your router will lead to performance issues if set too high or too low. Ensure your router's settings are all consistent with the manufacturer's and your Internet Service Provider (ISP) recommendations. Carefully record any changes you make to your router's configuration so that you can undo them later if necessary. 2 Avoid Wireless Signal Interference United States

  • Posted on 2017/03/19 11:16

    Websites getting blacklisted is a very extensive problem faced by businesses. When it happens, web masters panic and the vendors face an interruption in their daily business as they struggle to assist their concerned consumers to clean their websites and return online. It can happen due to a variety of reasons. Even Google may blacklist a website, and on an average, it's been estimated that about 10,000+ websites get blacklisted on a daily basis.​ Getting to Know about the Mishap Many businesses cannot afford to install costly monitoring programs or employ security experts and often take time to realize that their site has been blacklisted. Almost 50% of the business owners are warned about the compromised site by a search engine, browser or other alert when they try to visit their own site. Time is the biggest enemy of blacklisted websites as every minute that the site remains blocked is precious

  • Posted on 2017/03/14 11:45

    Several small and midsize businesses are susceptible to Distributed Denial of Service (DDoS) attacks. What would be the best way for such businesses to handle this problem? Plan ahead – this is what security experts suggest based on their experiences in the past! A majority of the small businesses and start-ups have small teams with very little resources to defend DDoS attacks. As indicated by the name of the attack, it stops users from accessing the services and a site by hurling lot of data against the firm’s web and hosting services. If you are wondering if DDoS attacks are really so common that businesses need to be concerned about it, statistics indicate that around 2,000 such attacks happen on a daily basis costing a loss of revenue in the range of $5,000 - $40,000 per hour for businesses. Hackers can be fake vandalists, competitors, hactivists or extortionists. If your

  • Posted on 2017/03/10 12:02

    The term Denial of Service (DoS) refers to events that render systems on a computer network temporarily unusable.  Denials of service can happen accidentally as the result of actions taken by network users or administrators, but often they are malicious DoS attacks. One of the more recent DDoS attacks (more on these below) occurred on Friday, October 21, 2016, and rendered many popular websites completely unusable for most of the day. Denial of Service Attacks DoS attacks exploit various weaknesses in computer network technologies. They may target servers, network routers, or network communication links. They can cause computers and routers to shut down ("crash") and links to bog down. They usually do not cause permanent damage. Perhaps the most famous DoS technique is Ping of Death. The Ping of Death attack works by generating and sending special network messages (specifically, ICMP packets of non-standard sizes) that cause problems for systems that receive them. In

  • Posted on 2017/03/01 14:54

    An Overview of Bittorrent P2P File Sharing Question: What exactly is "bittorrent" sharing? Answer: Bittorrent networking is the most popular form of modern P2P (peer-to-peer) file sharing. Since 2006, bittorrent sharing has been the primary means for users to trade software, music, movies, and digital books online. Torrents are very unpopular with the MPAA, the RIAA, and other copyright authorities, but are much beloved by millions of college and university students around the planet. Bittorrents (also known as "torrents") work by downloading small bits of files from many different web sources at the same time. Torrent downloading is extremely easy to use, and outside of a few torrent search providers, torrents themselves are free of user fees. Torrent networking debuted in 2001. A Python-language programmer, Bram Cohen, created the technology with the intent to share it with everyone. And indeed, its popularity has taken off since 2005. The torrent community

  • Posted on 2017/02/24 11:49

    What would you do if your most private information was suddenly available online, for anyone to see? Just imagine: pictures, videos, financial information, emails... all accessible without your knowledge or consent to anyone who cares to look for it.  We've probably all seen news items come out about various celebrities and political figures who have been less careful than they should be with information that was not meant for public consumption. Without proper oversight of this sensitive information, it can become available to anyone with an Internet connection. Keeping information safe and protected online is a growing concern for many people, not just political figures and celebrities. It's smart to consider what privacy precautions you might have in place for your own personal information: financial, legal, and personal. In this article, we're going to go over five practical ways you can start protecting your privacy while online to guard yourself

  • Posted on 2017/02/12 18:50

    Well it always happens (short post), eventually automation gets comfortable with itself and BOOM!  An Update overwrote our custom theme. Across my SNX Consulting network, I accidently applied a theme update to my custom "Vanilla" theme which I'm using as a placeholder.  Welp, it just happens to be the same name of another theme that is publically available through WordPress.   So through my "left-clicky" of Apply Updates, I ended up overwriting my custom theme. Basically means, my homepage is now showing someone else's theme work, and a nice scoop of vanilla ice cream. A Yummy Mistake!, So after I go get a bowl of Vanilla Ice Cream, I'll look for my backup. Maybe have it fixed by Monday

  • Posted on 2017/02/10 11:39

    Welcome to the exciting world of bittorrent downloading! While file sharing is controversial and often accused of being 'music piracy', millions of users continue to share their files, and thousands of new torrent users are added every day. To get you started, here are 5 quick tutorials for beginning torrent users. We recommend that you read the following articles in order. We also recommend that you install reliable antivirus software before you actually start downloading. Happy reading, and enjoy your new torrent download experience!   1 Torrents 101: Understand How Bittorrent File Sharing Works Paul Taylor/Stone/Getty ImagesIf you are new to torrent downloading, then you will definitely want to read about how the system works.  Torrents, aka 'bittorrents',  are pointer files that help you locate dozens of other users' computers.  You then connect to those private computers with your special torrent software, and copy their music and movie files to

  • Posted on 2017/02/08 11:55

    Do you suspect your email account has been hacked? Can't login to your email account? Are you getting undeliverable and bounce messages for email you never sent? Are friends and family complaining of receiving email you never sent? Is it malware? A hacker? Here's how to tell. Undeliverable and Bounce Messages Spammers frequently spoof the From sender on the email they send. They just substitute their real email address with a random email address found on a mailing list or one just randomly made up. Some poorly configured email gateway products don't distinguish between the manually editable "From" address and the actual sender origin, so they simply send any undeliverable messages to the spoofed From address. To better understand how this works, and help you track down the real origin of an email, see: Reading Email Headers. Best defense: Simply delete the undeliverable/bounce messages. In other cases, email worms will

  • Posted on 2017/02/04 12:36

    My run-in with the dark side of automatic updates One of the advantages I've touted for Windows 10 is the fact that updates are installed automatically. In effect, you don't have a choice, or at least your choices are limited. Microsoft pushes updates through to your computer and that's more or less it. I've called this a good thing, and I stand by that statement. The biggest security problem with Windows systems, after all, is unpatched computers -- not malware, nor Trojans, or viruses. No, it's people who don't update their systems, allowing malicious software easy entry into the operating system (OS). However, it's not all sunny days when it comes to automatic updates in Windows 10. I experienced the downside of those updates during the early days of the OS and thought I'd share my experiences here. It's a tale of fear, loss, and, ultimately, relief. An experience that almost crashed my

  • Posted on 2017/02/03 11:33

    Using keyboard shortcuts help you use your laptop without a mouse Keyboard shortcuts greatly enhance your productivity and save you a whole lot of time. Instead of pointing and clicking with the touchpad or external mouse, you can keep your hands on the keyboard and simply press combinations of keys on to get things done. Besides making you more efficient, using keyboard shortcuts also can reduce wrist strain. Here are the best Windows shortcuts you should know or print for quick reference. 16 Essential Keyboard Shortcuts Copy, cut and paste: Use these basic key combinations when you want to duplicate (copy) or move (cut) a photo, snippet of text, web link, file, or anything else into another location or document by pasting it. These shortcuts work in Windows Explorer, Word, email, and pretty much everywhere else. CTRL+C: Copy the selected item CTRL+X: Cut the selected item CTRL+V: Paste the selected item Selecting items: