Categories
How-To Software Technical

Using built in Windows tool to secure wipe free disk space

So your working and had to make a backup copy of the CEO’s outlook data file onto your local computer. After your work on his or her mailbox, you delete the backup.  So you think!  We know this isn’t the true and with the many free and paid tools out today a person would attempt […]

Categories
News Software Technical

Man-in-the-Middle (MITM)

You are on vacation or spending the weekend at the beach. Like normal your using your laptop or smartphone.  You may be computer savvy; so you don’t allow onlookers view you typing your secure passwords. But its not those that you can see you need to worry about. Its the person watching your network activity; […]

Categories
How-To Software Technical

How to submit malware / virus to antivirus and malware companies

So you got yourself infected with a virus and hopefully you got rid of it before it did any serious damage.  If it had you may wish you had something like “CrashPlan” to get your files back. And while a backup solution is always the best tool to recovery today we are going to talk […]

Categories
How-To Software Technical

Set SharePoint Content Database in Read-Only Mode

This weekend I am working on a SharePoint 2010 to 2013 upgrade. One of the steps; the beginning steps I will do is set the databases I am upgrading into read only mode to prevent users or automated process from upgrading the database during the upgrade window. Now I could have taken the system offline […]

Categories
How-To News Software Technical

Tech Short: CryptoLocker

CryptoLocker is a type of “ransomware” that encrypts the data on an infected computer so that it can’t be read and then demands payment to decrypt it. A CryptoLocker attack may come from various sources; one such is disguised as a legitimate email attachment. When activated, the malware encrypts certain types of files stored on […]

Categories
News Software Technical

Tech Short: Data Encryption

Data Encryption is the intentional scrambling of information into unreadable form – until it is later converted back into its original form by the intended recipient. Looking for data encryption tools or info have a look below: GNU Privacy Guard – GNU Privacy Guard (GnuPG) is an open-source implementation of the famed Pretty Good Privacy (PGP) […]