<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

Oh No ! I have been infected by CryptoWall ! What should I do? - Part 2

Posted by Davide Palumbo on Fri, Oct 31, 2014

CryptoWallIn one our previous articles (Click here to know more), we introduced you to CryptoWall a malicious virus also known as ransomware, which “ransoms” and extorts money from innocent victims by forcing them to pay for a private key to decrypt the encrypted files on computers. Users of Windows 8, 7, Vista and XP can easily get infected with CryptoWall virus.

Read More

Topics: Disaster Recovery, New Technology

Office 365 and the new SharePoint?

Posted by Davide Palumbo on Thu, Oct 16, 2014

SharePointIn my previous blog entry, I introduced to you to SkyDrive and SkyDrive for Business, and I tried to illustrate the principle differences between them. I also highlighted how OneDrive for Business allows for more flexibility in what we can do thanks to SharePoint, which is the platform behind it. At this point, I believe that it is only fair to dedicate the present article to learn more about SharePoint and the advantages it can provide.

Read More

Topics: Microsoft, Managed Services, New Technology

Dropbox has been hacked ... Or not

Posted by Davide Palumbo on Tue, Oct 14, 2014

dropbox logoAn anonymous hacker has recently declared to have leaked a few hundred usernames and passwords from Dropbox accounts. A series of posts have in fact been made to Pastebin claiming to contain login credentials for hundreds of Dropbox accounts. The leak, which comes from an anonymous user taking Bitcoin donations for the full disclosure, contains accounts with email addresses starting with the letter "B". The hacker claims that more username/password pairs will be released as soon as they receive donations to their Bitcoin address. According to the hacker a total of 6,937,081 account credentials have so far been compromised.

Read More

Topics: Cloud Computing, Disaster Recovery, New Technology, Data Security

Apple's Continuity and the Internet of Things

Posted by Ben Olcott on Fri, Jun 06, 2014

Apple’s keynote at this year’s Worldwide Developers Conference confirmed (as if it were really ever in doubt) their spot at the top of tech. CEO Tim Cook spoke first, followed by Senior Vice President of Software Engineering Craig Federighi and his eighty-minute presentation of attractions packed into the coming OS X 10.10 Yosemite and iOS 8. There’s improved operating system aesthetics, huge application updates, and something they call “Continuity”. The first two of those are nice, improve on an already-nice, industry-leading product, but the third part is a big deal. Continuity is Apple’s push for complete and seamless integration of OSX and iOS, of its desktop and mobile platforms. With Continuity, you can search Safari on your desktop and pick up the search exactly where you left it with your iPhone with a feature called handoff; with iCloud Drive, you can easily work on projects, be sure any project-edits will save and hold across platforms, pick up on them whenever, and you can organize the cloud space however you like; Continuity allows you to pass a call from your iPhone to your computer. Working on one is working on the other.

handoff resized 600 

Read More

Topics: Cloud Computing, Managed Services, New Technology

Net Neutrality: Where Did It Come From and Why Might It Go?

Posted by Ben Olcott on Thu, May 29, 2014

You’ve likely heard something about net neutrality at some point in the past few weeks; if not, it is, simply, the concept that all Internet traffic should be treated equally, that no one entity, however large or small, should have more or less access to data transfer than another. This is so intrinsic to the way we expect the Internet to work that it’s difficult to imagine the opposite, an Internet in which data transfer speed – Internet speed – is bought into instead of de facto had. Imagine that a favorite site, ran by an entity of lesser, say, economic stature, is many times slower, takes many more seconds just to load than a site ran by an economically superior entity. Imagine that your favorite political blog, written by an intelligent, responsible person from their desk, has to match what Huffington Post pays to have their data load just as quickly. Of course, the favorite blogger could never compete with this buy-in “fast lane”, as it’s been called. This, a version of non-neutral net, is what the FCC’s new regulations would institute, and it’s going to dramatically change the way the Internet works. As Lawrence Lessig and Robert W. McChesney, co-founders of the media reform group Free Press, describe in their 2006 (yup, this has been around for a while) Washington Post article “No Tolls on the Internet”:

Without net neutrality, the Internet would start to look like cable TV. A handful of massive companies would control access and distribution of content, deciding what you get to see and how much it costs. Major industries such as health care, finance, retailing and gambling would face huge tariffs for fast, secure Internet use—all subject to discriminatory and exclusive deal making with telephone and cable giants.[1]

Read More

Topics: New Technology, Data Security