Mashable has a very interesting article suggesting some New Years’ resolutions regarding technology. It’s important to take a step back from our work and follow some of these steps for the sake of organization, if nothing else.
“OMG! My email is hacked!” This is a true account of an email hack we’ve just witnessed and helped a client through. It all started with one of our client’s bank account manager calling our client (will call him Bob in this email): Bank: Bob, Happy New Year! We have received an email from your […]
The enterprise tech-focused weekly podcast This Week in Enterprise Tech had it’s first question and answer episode this week, and it was absolutely fascinating, as they dedicated the entire podcast to answering listeners/viewers’ burning questions about business technology.
We’ve all seen them – programs insisting we update them, or updating on their own without our approval. Here are a few settings you can change if you want to have more control over when programs or applications update.
It is estimated that more than a billion computers are at serious risk of a new Java exploit discovered by researcher Adam Gowdiak. Oracle chose not to include a patch for this critical vulnerability in its October 2012 update, but has planned to release a patch in February of 2013. In the mean time, Nerds […]
Ransomware is malware that takes over your computer and holds it hostage and demands payment before your computer will function properly again. Ransomware seizes control of the computer, can terminate programs, encrypts data so it will not open up, and makes programs inaccessible – except to reach locations which allow you to pay the ransom. […]
If you have a Joomla! site with a contact form or any other type of mail functions, it is important to ensure it is configured correctly to use a proper, secured SMTP connection. This video tutorial will walk you through the steps to accomplish this.
If you have a WordPress site with a contact form or any other type of mail functions, it is important to ensure it is configured correctly to use a proper, secured SMTP connection. This video tutorial will walk you through the steps to accomplish this.
These are the general guidelines that need to be followed before a domain name can be transferred: 1. Domain privacy services need to be disabled. 2. Verify that your administrative email address in the domain registration record is accurate. 3. Your domain needs to be unlocked. 4. Acquire your domain’s transfer authorization code (also referred […]