Category Archives: Uncategorized


Tech Tools For Beginners

Package Contents: 2 x Plastic Opening Tools 3 x ESD Tweezers 1 x Utility Knife 1 x Anti-Static Wrist Strap 1 x SIM Card Ejector Pin and LCD Suction Cup 4 x Triangle Plectrums  2 x Plastic Spudgers 3 x Metal Spudgers 1 x Tin Scraper 1 x Large Plastic Double Headed Opening Tool 1 x cleaning Cloth 1 x Magnetizing and Demagnetizing Tool 3 x SIM Card Shells 2 x Magnetic Protect Mats 1 x 60 in 1 Screwdriver Kit

Tech Tools For Beginners

  • Multi-Magnetic Screwdriver Set : 86 in 1 Precision Screwdriver Set have more tools, which includes utility knife, Anti-Static tweezers, Anti-Static Wrist Strap, SIM card ejector pin and LCD Suction Cup, Triangle plectrum, plastic spudgers, metal spudgers, SIM card shells, Magnetizing and demagnetizing tool, etc.
  • High Quality & Well Perform : These durable screwdriver bits are made of CRV steel, whose hardness can reach to HRC52-56,
Read the rest

Many Critical Vulnerabilities In VNC

Many critical vulnerabilities found in Virtual Network Computing (VNC). The VNC software was found to have 37 different memory corruption vulnerabilities and many of these could result in remote code execution. The researchers at Kaspersky said around 600,000 web-accessible servers use the code.

Kaspersky researchers wrote in an analysis of the bugs for ICS CERT, released Friday.

“The prevalence of such systems in general, and particularly ones that are vulnerable, is a significant issue for the industrial sector as potential damages can bring significant losses through disruption of complex production processes,” 

Kaspersky found many critical vulnerabilities in VNC client , but also on the server-side of the system which can be exploited after password authentication. Kaspersky said there are two main attack vectors:

“An attacker is on the same network with the VNC server and attacks it to gain the ability to execute code on the server with the

Read the rest

The Benefits Of Managed IT Service Providers

Managed IT Services is a term that refers to the practice of outsourcing your company’s IT computer network support and management to improve business operations. Companies that provide these managed services are called Managed Services Providers (MSP).

These MSP companies would take the place of a full-time IT professionals that you would normally have on staff. But that’s not the only advantage of managed services.

1. REDUCE RISK

Every investment your business makes carries a certain risk. Government regulations, technologies, markets, financial conditions and markets all change at a rapid pace. When you utilize an outsourcing provider, they tend to manage a lot of this risk for you because of our industry knowledge in areas such as compliance and security issues.

2. PROACTIVE SOLUTIONS

When you choose to outsource your IT as a proactive effort, you receive better performance, nearly zero downtime and fewer glitches. They help detect problems to … Read the rest


Your vCIO Should Achieve These 10 Technology Priorities For 2020

There are 10 priorities that your vCIO should accomplish for 2020. But if your not sure what a vCIO is or does the term “vCIO” stands for “virtual Chief Information Officer” – basically an outsourced IT department or department head. The idea of outsourced IT is becoming more viable throughout the business world. After all, if one can virtualize an entire administration crew, why not outsource C-level employees in the same way if it is more efficient?

Many companies do not have the need for a full-time CIO, yet almost every company benefits from the expertise of a digital information specialist. The vCIO is the perfect compromise. Here are a few reasons that your business should be looking to invest in one.

What Is A VCIO?

The vCIO collaborates with and advises clients’ IT departments and performs the same functions as a conventional CIO. Those duties include formulating strategic IT … Read the rest


Microsofts April 9th security update impacts some antivirus software vendors

People have been noticing that Microsoft’s recent April 9th security update is causing some problems with a few antivirus vendors like Sophos, Avira, Avast, McAfee and some others. 

Microsoft has stated that the the Security Update is causing end user computers to have very slow startup times bad performance and be unresponsive and even causing systems to fail to boot.

“Microsoft is working on a resolution and will provide an update in an upcoming release,” according to Microsoft.

Currently the root cause of the issue by the April 9th security patch is unclear. But both McAfee and Avast suggest that the problems are tied to the change Microsoft made within the Windows Client-Server Runtime Subsystem (csrss.exe). This CSRSS process is a vital part of Windows and is responsible for many windows functions.

Currently there is no fix for this issue.

Read the rest

Microsoft Outlook.com Email Accounts Breached By Hackers

Many users received a notification from Microsoft Outlook.com letting them know about accounts being breached by hackers. 

A Motherboard report said that the breach is “much worse” than what was reported. The hackers were able to access emails and attachments and that the hackers were able to access a large number of Outlook, MSN and Hotmail email accounts.

“We addressed this scheme, which affected a limited subset of consumer accounts, by disabling the compromised credentials and blocking the perpetrators’ access,” a Microsoft spokesperson meanwhile said in a statement.

“Upon awareness of this issue, Microsoft immediately disabled the compromised credentials, prohibiting their use for any further unauthorized access,” Microsoft said. “Our data indicates that account-related information (but not the content of any emails) could have been viewed, but Microsoft has no indication why that information was viewed or how it may have been used.”

Public Announcement from Microsoft

Microsoft said to … Read the rest


Say Goodbye Google+

Recently on January 30th 2019 Google has announced that they will be shutting down Google+ on April 2, 2019.

Google’s Letter Below

In December 2018, we announced our decision to shut down Google+ for consumers in April 2019 due to low usage and challenges involved in maintaining a successful product that meets consumers’ expectations. We want to thank you for being part of Google+ and provide next steps, including how to download your photos and other content.

On April 2nd, your Google+ account and any Google+ pages you created will be shut down and we will begin deleting content from consumer Google+ accounts. Photos and videos from Google+ in your Album Archive and your Google+ pages will also be deleted. You can download and save your content, just make sure to do so before April. Note that photos and videos backed up in Google Photos will not be deleted.

The

Read the rest

Top Worst Passwords Of All Time

Take security serious, here is a lists of the top 500 worst passwords. Any password documented publicly or available in the darkweb can be used in a dictionary attack. This is a form of brute force attack technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary.
 

NOTop 1-100Top 101–200Top 201–300Top 301–400Top 401–500
1123456porschefirebirdprincerosebud
2passwordguitarbutterbeachjaguar
312345678chelseaunitedamateurgreat
41234blackturtle7777777cool
5pussydiamondsteelersmuffincooper
612345nascartiffanyredsox1313
7dragonjacksonzxcvbnstarscorpio
8qwertycamerontomcattestingmountain
9696969654321golfshannonmadison
10mustangcomputerbond007murphy987654
11letmeinamandabearfrankbrazil
12baseballwizardtiger
Read the rest

DuckDuckGo better than Google for privacy

#1 — Google tracks you. DuckDuckGo Doesn’t

You share your most intimate secrets with your search engine without even thinking: medical, financial and personal issues, along with all the day to day things that make you, well, you. All of that personal information should be private, but on Google it’s not. On Google, your searches are tracked, mined, and packaged up into a data profile for advertisers to follow you around the Internet through those intrusive and annoying ever-present banner ads, using Google’s massive ad networks, embedded across millions of sites and apps.

In fact, it’s a myth that you need to track people to make money in web search. When you search ‘car’ they can show you a car ad without knowing anything about you. That’s how they make money and it doesn’t involve tracking because it is based on the keyword and not the person. Google could … Read the rest


User Email Security Tips

Email security isn’t just the email provider or your IT administrator’s responsibility. It’s everybody’s responsibility. We all want to avoid having to produce a new resume. Here are some Safety Tips to help you all be protected and keep spam & malware to an absolute minimum.

  1. Change your password often.
  2. Use strong passwords. Never use a password that contains “password” or “letmein” or “welcome”.
  3. Use a different password for each of your accounts. If you use the same password for your bank account as you do for your email account, you become much more vulnerable to data theft.
  4. Don’t open an attachment unless you know who it is from & are expecting it.
  5. Be cautious about email messages that instruct you to enable macros before downloading Word or Excel attachments.
  6. Use anti-virus software on your local machine, and make sure it’s kept up-to-date with the latest virus updates.
Read the rest