
DoorDash Data Breach Affects 4.9 Million People
DoorDash, a food-delivery service, disclosed a data breach affecting 4.9 million people. Drivers, restaurants, and customers are affected.
The company said in a blog post, user information was accessed by an unauthorized third party. Here’s a partial list of personal data that could have been affected.
- Names
- Email addresses
- Delivery addresses
- Phone numbers
- Hashed and salted passwords (which can make the passwords indecipherable to third parties).
The DoorDash data breach occurred on May 4, 2019. Only users who joined the platform on or before April 5, 2018 were affected. Those nearly 5 million accounts include customers who order food, restaurants that prepare it, and “Dashers,” the drivers who deliver it.
What other information was accessed in the DoorDash data breach?
For some users, additional information was exposed in the DoorDash data breach. Here are the details and who might be impacted.
Customers. The DoorDash data breach accessed the last four digits … Read the rest

Download Sonicwall NetExtender VPN Software
You came to the right place to easily Download SonicWALL NetExtender VPN Software. We have some old versions and new versions of the SonicWALL NetExtender VPN Software.
SonicWALL SSL VPN NetExtender is a software application for Windows users that enables remote users to securely connect to the remote network. With NetExtender, remote users can securely run any application on the remote network. Users can upload and download files, mount network drives, and access resources as if they were on the local network. The NetExtender connection uses a Point-to-Point Protocol (PPP) connection. You must have a SonicWALL firewall to be able to utilize this vpn software.
If you have questions regarding downloads please contact me or contact SonicWALL support line or you can go to the following URL for Downloads : https://www.mysonicwall.com/muir/freedownloads
- Fixing WebView2 Issues on ARM64: Why Outlook and Teams Keep Breaking (and How to Fix Them)
- How to Enable

Explanation of Hard Drive Storage for 2020: HDD, Hybrid, SSD, M.2 NVMe
In this article I will explain the main differences between four storage types you can find in modern Windows-based desktops and laptops – hard disk drives (HDD), hybrids (HHDD / SSHD), solid state drives (SSD) and M.2 NVMe storage.
Hard Disk Drive Storage (HDD)
Hard disk drives or HDDs are the traditional storage devices for personal computers. You can find them in the majority of notebooks, especially inexpensive ones. These are hard drives are based on rotating magnetic platters and reading heads. HDDs are the slowest kind of storage in modern PCs. In today’s era of fast processors and large system memory amounts, these hard drives are oftentimes your system performance bottleneck. On the positive side, HDD is the cheapest kind of storage.
Solid State Drive (SSD) Storage
Solid state drive-based storage is newer technology than the decades old hard drive storage (HDD). SSDs have no … Read the rest

Microsoft Update Broke Windows Defender
All your Windows Defender is broken thanks to a recent Microsoft Windows Update. The signature update was to fix a file causing system file checks to fail but the patch caused an even bigger issue, making Defender antivirus scans to fail altogether.
The issue was in place for about a day before Microsoft re-patched the antivirus endpoint protection software but not before a ton of press reports and user complaints have gone to the masses.
The fix for that bug was issued on Tuesday in a silent update – but that update ended up causing manual or scheduled Defender malware scans to fail if the “Quick” or “Full” scan options were selected – causing users to take to online forums to report the bug. Real-time scanning was still enabled; and the “Custom” scan option, where users can choose the folders they want to be checked, was also still working, … Read the rest

Xeon and Other Intel CPUs Hit by NetCAT Security Vulnerability
Intel’s server-grade processors are suffering from a vulnerability, which they dubbed NetCAT. The researchers at Vrije University in Amsterdam revealed on Wednesday The vulnerability enables a side-channel attack that can infer what a CPU is working on and is said to rely on issues with two Intel technologies found primarily in the Xeon CPU line: Data-Direct I/O Technology (DDIO) and Remote Direct Memory Access (RDMA). According to the researchers,
“While NetCAT is powerful even with only minimal assumptions, we believe that we have merely scratched the surface of possibilities for network-based cache attacks, and we expect similar attacks based on NetCAT in the future,” the researchers, from the Vrije Universiteit Amsterdam and ETH Zurich, wrote in a paper published on Tuesday. “We hope that our efforts caution processor vendors against exposing microarchitectural elements to peripherals without a thorough security design to prevent abuse.”
NetCAT is a complex attack and … Read the rest

Inside The New Microsoft Edge Browser
Microsoft did the right move with the new Microsoft Edge Browser which in a December post they have revealed moving to chromium.
Making the web a better place for everyone
“Back in December, we announced our intention to adopt the Chromium open source project in the development of Microsoft Edge on the desktop to create better web compatibility for our customers, and less fragmentation of the web for all web developers. Now we’re ready to show you what we’ve been working on, and invite you to come along on our journey.”
Microsoft Edge Insider channels are ready to be synced with your Microsoft Edge mobile app. You can install the preview builds on all supported versions of Windows or macOS, and explore syncing capabilities with the current version of the Microsoft Edge mobile app available for iOS and Android devices. They are excited to get your feedback and suggestions as … Read the rest

How To Shrink SQL Server LDF Log File
In this article, we will cover how to shrink SQL Server .LDF log file, with some simple operations overview and examples covering everything you need to know.
- Locate your Microsoft SQL Server Management Studio software. You can download it from here if you do not have it installed.
- Once you have access to SSMS you have have to expand Databases.
- Find the database in question , Right Click > Properties .
- Once the following window is open click on Options and then find the Recovery model drop down and select (Simple) and then click OK.
- Now lets move forward and run the process to shrink the SQL Server LDF log file.
- Find the database in question and right click it > Tasks > Shrink > Files.
- Change the File type to Log and leave everything else the same and click OK.
- It shouldn’t take too long to shrink the log

Social Media Website Logins Can Compromise Your Account
Many websites are offering alternative login methods but they could potentially compromise your social media account if your not careful.
Our attention to internet security has been 110% focus these days. Why use them? Google, Facebook, LinkedIn and Microsoft all offer multi-factor authentication meaning that if someone guesses, steals or cracks your password then they still can’t get in to your account without the second piece of authentication (e.g. SMS). But this means you have to enable the available multi-factor authentication which is not enabled by default and the majority of end users do not use this useful security option.
The internet is full of interesting websites and many of them allow us to interact with them as long as we provide some sort of login information. Some of these websites could have these social media plugins that allow you to use your social media login to gain access to … Read the rest

Sonicwall Global VPN 5.0 Client Download
Fix slow internet and connection issues with remote computers and users by using the Sonicwall Global VPN 5.0 Client Download.
What is SonicWALL Global VPN Client?
For secure vpn access to your SonicWALL product, you will need to download and install the GVC client locally on your system. When you configure the vpn on the SonicWALL. The Global VPN Client software is recommended to securely connect computers to the SonicWALL through public WAN.
Overview
SonicWALL Global VPN Client is a program developed by SonicWALL. It adds a background controller service that is set to automatically run. Delaying the start of this service is possible through the service manager. The software is designed to connect to the Internet and adds a Windows Firewall exception in order to do so without being interfered with.
If you have questions regarding downloads please contact me or contact SonicWALL support line or you can go … Read the rest

Your vCIO Should Achieve These 10 Technology Priorities For 2020
There are 10 priorities that your vCIO should accomplish for 2020. But if your not sure what a vCIO is or does the term “vCIO” stands for “virtual Chief Information Officer” – basically an outsourced IT department or department head. The idea of outsourced IT is becoming more viable throughout the business world. After all, if one can virtualize an entire administration crew, why not outsource C-level employees in the same way if it is more efficient?
Many companies do not have the need for a full-time CIO, yet almost every company benefits from the expertise of a digital information specialist. The vCIO is the perfect compromise. Here are a few reasons that your business should be looking to invest in one.
What Is A VCIO?
The vCIO collaborates with and advises clients’ IT departments and performs the same functions as a conventional CIO. Those duties include formulating strategic IT … Read the rest