web analytics

Apple Virus Warning Appeal Letter

Friends, This past week, you may have heard about the Apple computer Flashback virus. Perhaps you’ve already scanned and cleaned your computer. If so, that’s great. If not, read on. Here’s what’s unique and significant about the Flashback virus: The Flashback virus infected over 600,000 Apple computers world-wide. More than any other previous Apple malware.… Continue reading Apple Virus Warning Appeal Letter

Apple Java Flashback Trojan Virus Malware Detection Checker and Removal Tool Instructions

Technology > Apple Summary. In April 2012, the Backdoor Flashback trojan virus was discovered to have infected over 600,000 Apple computers world-wide. This virus is also known as the Flashfake virus or the Backdoor.Flashback.39 virus. Previous Apple malware required a deceived user to approve installation of fake software. The Flashback virus infected computers without user… Continue reading Apple Java Flashback Trojan Virus Malware Detection Checker and Removal Tool Instructions

Hewlett-Packard Security Alert Regarding HP Printers Being Hacked

Technology Summary. A potential security vulnerability has been identified with certain HP printers and HP digital senders. The vulnerability could be exploited remotely to install unauthorized printer firmware. [source] A full list of effected printers and devices is available on HP’s website. For general information on Secure Printing and Imaging please refer to http://www.hp.com/go/secureprinting  

Creating a Custom iPhone or iPad Lock Screen Wallpaper Image With Your Name and Contact Information

Technology > Apple > iPhone Summary. These days, most people have their  smart phones locked. This is good for security, but if the phone is lost and then found by someone, they won’t ever be able to get into the phone and find out who to return it to. These instructions describe how to create a custom… Continue reading Creating a Custom iPhone or iPad Lock Screen Wallpaper Image With Your Name and Contact Information

Best Security Practices for TeamViewer, GoToMyPC, LogMeIn, and other Remote Computer Access Support Software

Technology Summary. Remote computer access support software such as TeamViewer, GoToMyPC, LogMeIn, and others make it very convenient to support users from a distance, or monitor your own computer while performing time consuming installations and updates. Below are instructions for configuring TeamViewer for maximum security. Security Threats. Considering that about 90% of all companies say they’ve… Continue reading Best Security Practices for TeamViewer, GoToMyPC, LogMeIn, and other Remote Computer Access Support Software

Computer Security Update – Summer 2011

Technology Summary. This year has been busy for anyone involved in computer support and security. Hijacked Computers. Computers are being taken over by viruses that turn them into remote controlled drones. In one group alone, more than 4.5 million computers that have been hijacked by hackers for their use. This is just one of many groups of… Continue reading Computer Security Update – Summer 2011

Bicycle Stolen – Sign of the Times

Effective Living Summary. With the recent news of rampant hacking in the digital world, it’s not surprising that we’d see a rise in crime in our physical world. When well financed businesses, organizations, and institutions are having their computers broken into, one begins to wonder how secure an individual could possibly be. Commentary. Below is… Continue reading Bicycle Stolen – Sign of the Times

Computer Usage Monitoring, Tracking, and Reporting Systems – Using System Log Files or Commercial Software

Technology Summary. This document provides some retail solutions as well as do-it-yourself solutions for computer usage reporting. Monitor. It’s sometimes helpful to know computer usage over a given period of time. For example, when evaluating the use of shared or public computers, one wants to know the utilized value of those computers compared to the cost… Continue reading Computer Usage Monitoring, Tracking, and Reporting Systems – Using System Log Files or Commercial Software

YouTube Most Viewed This Week Rankings and Ratings Hacked

Technology Summary. Hackers have recently been manipulating search engine results and content ratings. On 3 June 2011, we saw an example of this on YouTube. Under the Most Viewed category for This Week, in position #12 with 4.8 million views was a 31 second commercial for Dish network. Click here, or the image to the… Continue reading YouTube Most Viewed This Week Rankings and Ratings Hacked

Facebook Friend Request – Safety and Security Guidelines for Accepting, Evaluating, Identifying and Discerning Fake from Authentic

Technology > Facebook Support Summary. This page provides guidelines for evaluating friend requests on social networks like Facebook. While this document refers specifically to Facebook, these guidelines apply to just about any online social network. Background. Some online discussion boards and special interest groups are moderated to filter out fake requests to join. This helps… Continue reading Facebook Friend Request – Safety and Security Guidelines for Accepting, Evaluating, Identifying and Discerning Fake from Authentic

Microsoft Office 2011 for Apple Mac Update Error – “The installation failed. The Installer encountered an error that caused the installation to fail.”

Technology > Resources | Apple Summary. On 13 December 2010, Microsoft released a critical security update (14.0.2) for their Microsoft Office 2011, the Apple Mac version of their office suite. A few days prior, on 8 December 2010, Microsoft announced a critical security update (1.1.8) to their XML File Format Converter for Apple Mac. An… Continue reading Microsoft Office 2011 for Apple Mac Update Error – “The installation failed. The Installer encountered an error that caused the installation to fail.”

Yahoo BrowserPlus Removal Instructions Wrong for Snow Leopard

Technology Summary. BrowserPlus by Yahoo is a browser plugin that allows sophisticated programming on top of a simple website making it possible to launch programs written on the BrowserPlus platform. It is similar to Adobe Flash, Adobe Shockwave, and Adobe Air. Because BrowserPlus can potentially allow access to your hard drive and other computer components,… Continue reading Yahoo BrowserPlus Removal Instructions Wrong for Snow Leopard