by wwarren | Jul 16, 2011 | Cloud Computing
Not if this trend by just about every internet provider type continues….at least not in the United States. Frankly given the rash of security problems and the fact this is old technology wrapped up into a new term it really needs to be scaled back anyway....
by wwarren | Jul 13, 2011 | Cloud Computing, Microsoft, Office, Windows, Windows 8
Listen to the podcast either at the linked article or download the mp3 here. Rumor has it that Windows 8 – the first version of Windows for ARM as well as x86 and billed as Microsoft’s answer for the PC to iOS and the iPad – will actually ship early: next April....
by wwarren | Jul 12, 2011 | Hardware, Microsoft, Windows 8
The Microsoft Partner Conference is always a good source of information. This makes things intriguing for Win8. If it truly runs on vista class machines then it’ll run on my 5 year old notebook(which currently run win7) just fine. Worried that you’ll...
by wwarren | Jul 9, 2011 | Internet, Security
Unless you have a good product like Astaro protecting your edge i would highly suggest NOT running open wifi. However with the proper precautions in place it is possible to mitigate the possibility of getting tangled up in this. Under the new voluntary...
by wwarren | Jul 8, 2011 | Cloud Computing, Internet, Microsoft, Security
That’s just the LEGAL way to get at it. There’s very little stopping the illegal ones as well. Thanks to the Patriot Act, US spooks no longer have to waste their time having to crack into European company servers to steal their secrets. They can...
by wwarren | Jul 8, 2011 | Cloud Computing, Internet, Security
It is going to come to pass that the best place to have your data is back on your own systems where you control the security. The cloud with it’s high level of centralization is going to mean your data is just waiting to be stolen. Matt Johansen, a...
by wwarren | Jul 2, 2011 | Internet, Security, Security Alerts
p2p software is a great thing but highly dangerous when not properly configured. By default p2p software shares files..sometimes everything on your hard drive depending on the program used. A good gateway firewall is your best bet if you don’t have airtight...
by wwarren | Jun 30, 2011 | Internet, Security, Security Alerts
You can waste time creating a new MBR then trying to clean ALL the infected files from not just the rootkit but it’s buddies as well. Save your clients time and money and their security. Backup/format/reload. An antivirus of its own Just like Sinowal, TDL-4 is...
by wwarren | Jun 30, 2011 | Internet, Microsoft, Security, Security Alerts
I am seeing more and more infections on client computers using this rootkit. The common vector i see if either flash or IE ActiveX exploits. It is nearly time to just block flash at the firewall as well as ActiveX. ‘Indestructible’ rootkit...
by wwarren | Jun 29, 2011 | Cloud Computing, Internet
I’ve seen this for many years but nobody at Mozilla came out and said it…until now. If you are a business entity use Either Google Chrome or…IE. I have not used Firefox in over a year. their underlying technology is over 3-5 years old and they...