• Posted on 2017/03/14 11:45

    Several small and midsize businesses are susceptible to Distributed Denial of Service (DDoS) attacks. What would be the best way for such businesses to handle this problem? Plan ahead – this is what security experts suggest based on their experiences in the past! A majority of the small businesses and start-ups have small teams with very little resources to defend DDoS attacks. As indicated by the name of the attack, it stops users from accessing the services and a site by hurling lot of data against the firm’s web and hosting services. If you are wondering if DDoS attacks are really so common that businesses need to be concerned about it, statistics indicate that around 2,000 such attacks happen on a daily basis costing a loss of revenue in the range of $5,000 - $40,000 per hour for businesses. Hackers can be fake vandalists, competitors, hactivists or extortionists. If your

  • Posted on 2017/03/10 12:02

    The term Denial of Service (DoS) refers to events that render systems on a computer network temporarily unusable.  Denials of service can happen accidentally as the result of actions taken by network users or administrators, but often they are malicious DoS attacks. One of the more recent DDoS attacks (more on these below) occurred on Friday, October 21, 2016, and rendered many popular websites completely unusable for most of the day. Denial of Service Attacks DoS attacks exploit various weaknesses in computer network technologies. They may target servers, network routers, or network communication links. They can cause computers and routers to shut down ("crash") and links to bog down. They usually do not cause permanent damage. Perhaps the most famous DoS technique is Ping of Death. The Ping of Death attack works by generating and sending special network messages (specifically, ICMP packets of non-standard sizes) that cause problems for systems that receive them. In

  • Posted on 2017/03/01 14:54

    An Overview of Bittorrent P2P File Sharing Question: What exactly is "bittorrent" sharing? Answer: Bittorrent networking is the most popular form of modern P2P (peer-to-peer) file sharing. Since 2006, bittorrent sharing has been the primary means for users to trade software, music, movies, and digital books online. Torrents are very unpopular with the MPAA, the RIAA, and other copyright authorities, but are much beloved by millions of college and university students around the planet. Bittorrents (also known as "torrents") work by downloading small bits of files from many different web sources at the same time. Torrent downloading is extremely easy to use, and outside of a few torrent search providers, torrents themselves are free of user fees. Torrent networking debuted in 2001. A Python-language programmer, Bram Cohen, created the technology with the intent to share it with everyone. And indeed, its popularity has taken off since 2005. The torrent community

  • Posted on 2017/02/24 11:49

    What would you do if your most private information was suddenly available online, for anyone to see? Just imagine: pictures, videos, financial information, emails... all accessible without your knowledge or consent to anyone who cares to look for it.  We've probably all seen news items come out about various celebrities and political figures who have been less careful than they should be with information that was not meant for public consumption. Without proper oversight of this sensitive information, it can become available to anyone with an Internet connection. Keeping information safe and protected online is a growing concern for many people, not just political figures and celebrities. It's smart to consider what privacy precautions you might have in place for your own personal information: financial, legal, and personal. In this article, we're going to go over five practical ways you can start protecting your privacy while online to guard yourself

  • Posted on 2017/02/12 18:50

    Well it always happens (short post), eventually automation gets comfortable with itself and BOOM!  An Update overwrote our custom theme. Across my SNX Consulting network, I accidently applied a theme update to my custom "Vanilla" theme which I'm using as a placeholder.  Welp, it just happens to be the same name of another theme that is publically available through WordPress.   So through my "left-clicky" of Apply Updates, I ended up overwriting my custom theme. Basically means, my homepage is now showing someone else's theme work, and a nice scoop of vanilla ice cream. A Yummy Mistake!, So after I go get a bowl of Vanilla Ice Cream, I'll look for my backup. Maybe have it fixed by Monday