HCP Computer and Business Solution
To the business owner and IT professional this allows access to a wealth of expertise, knowledge, and manpower on an as-needed basis.
Banner Ads Spreading CryptoWall
A new threat to your computers can be contracted simply by visiting certain high-profile sites. Through a technique known as “malvertising,” banner ads are being used to spread a form of malware known as ransomware. In this case, CryptoWall 2.0, on such prominent Web sites as Yahoo, AOL, Match.com, The Atlantic, and MajorLeagueBaseball.com. The websites themselves
A new threat to your computers can be contracted simply by visiting certain high-profile sites. Through a technique known as “malvertising,” banner ads are being used to spread a form of malware known as ransomware. In this case, CryptoWall 2.0, on such prominent Web sites as Yahoo, AOL, Match.com, The Atlantic, and MajorLeagueBaseball.com. The websites themselves
Read full post on hcpcomputers.com
How To Upgrade Adobe Flash Player
Click on the following link to go to the Adobe site: https://www.adobe.com/software/flash/about/ Click on the Player Download Center link. The following screen (or something similar) will come up. Make sure to uncheck the boxes in the middle “0ptional offers” section. Then, click Install Now in the lower right-hand corner of the screen. If you are
Click on the following link to go to the Adobe site: https://www.adobe.com/software/flash/about/ Click on the Player Download Center link. The following screen (or something similar) will come up. Make sure to uncheck the boxes in the middle “0ptional offers” section. Then, click Install Now in the lower right-hand corner of the screen. If you are
Read full post on hcpcomputers.com
Cryptolocker Virus Alert
In the wild, this month is a new version of ongoing cryptography-based viruses. This new version calls itself Cryptowall 2.0. From research, there are a few key differences in this new version. In the original Cryptolocker viruses, the payments were to be made by using Bitcoin. In the way that the virus author crafted the
In the wild, this month is a new version of ongoing cryptography-based viruses. This new version calls itself Cryptowall 2.0. From research, there are a few key differences in this new version. In the original Cryptolocker viruses, the payments were to be made by using Bitcoin. In the way that the virus author crafted the
Read full post on hcpcomputers.com
Wipe Old Data
You’ve upgraded your electronic devices. You’re planning to sell or donate your old equipment. Just make sure you clean out all your sensitive data before you do so. The Naked Security blog recently offered up a cautionary tale of why it’s essential to take this important step. A Canadian used-computer dealer claims to have a pile
You’ve upgraded your electronic devices. You’re planning to sell or donate your old equipment. Just make sure you clean out all your sensitive data before you do so. The Naked Security blog recently offered up a cautionary tale of why it’s essential to take this important step. A Canadian used-computer dealer claims to have a pile
Read full post on hcpcomputers.com
What is a Router?
What to Look for in a Router Let’s start with the basics. What is a router? It’s a device that sits between the internet and your computers. Its primary job is to take incoming information from the internet and route it to various computers within your network. But that’s just the initial role of the router.
What to Look for in a Router Let’s start with the basics. What is a router? It’s a device that sits between the internet and your computers. Its primary job is to take incoming information from the internet and route it to various computers within your network. But that’s just the initial role of the router.
Read full post on hcpcomputers.com
What is a firewall
A simple concept has taken on a whole new meaning in this computerized era. As the term suggests, a firewall has always been a wall meant to prevent fire from spreading and to protect important areas within a structure. Today’s firewall technology serves much the same purpose – to protect business computer networks from threats
A simple concept has taken on a whole new meaning in this computerized era. As the term suggests, a firewall has always been a wall meant to prevent fire from spreading and to protect important areas within a structure. Today’s firewall technology serves much the same purpose – to protect business computer networks from threats
Read full post on hcpcomputers.com
Charity Scams
There are people on the Internet waiting to exploit your generous nature. A little research can help your charity dollars reach those that you intend to assist. First, get the exact name of the organization and search for it online, paired with the words “complaint” or “scam”; Check to see if the charity must be
There are people on the Internet waiting to exploit your generous nature. A little research can help your charity dollars reach those that you intend to assist. First, get the exact name of the organization and search for it online, paired with the words “complaint” or “scam”; Check to see if the charity must be
Read full post on hcpcomputers.com
CyberVor Russian Hacker Data Breach
Data security has once more been brought to the public consciousness in recent days with the revealing of the largest data breach in history. A gang of Russian hackers, nicknamed CyberVor, stole 1.2 billion username and password combinations, along with more than 500 million email addresses, from 420,000 sites. They did this using botnets, computers
Data security has once more been brought to the public consciousness in recent days with the revealing of the largest data breach in history. A gang of Russian hackers, nicknamed CyberVor, stole 1.2 billion username and password combinations, along with more than 500 million email addresses, from 420,000 sites. They did this using botnets, computers
Read full post on hcpcomputers.com
Stop the Unwanted Emails
In our last blog entry, we addressed ways to prevent unwanted email. Now we will explore methods to block and report spam that does make it to your private email address. Most email providers have systems in place to block and report unwanted email. Following are directions for three of the biggest providers: Gmail: Most
In our last blog entry, we addressed ways to prevent unwanted email. Now we will explore methods to block and report spam that does make it to your private email address. Most email providers have systems in place to block and report unwanted email. Following are directions for three of the biggest providers: Gmail: Most
Read full post on hcpcomputers.com
Spam, No thank you.
Editor’s note: This is the second of a three-part series on spam. In our last blog entry, we addressed ways to identify spam. Now we will explore ways to prevent spam from flooding your email: Don’t volunteer your email address online, as scripts created to search websites can harvest addresses from websites where such addresses
Editor’s note: This is the second of a three-part series on spam. In our last blog entry, we addressed ways to identify spam. Now we will explore ways to prevent spam from flooding your email: Don’t volunteer your email address online, as scripts created to search websites can harvest addresses from websites where such addresses
Read full post on hcpcomputers.com