Technology Summary. A potential security vulnerability has been identified with certain HP printers and HP digital senders. The vulnerability could be exploited remotely to install unauthorized printer firmware. [source] A full list of effected printers and devices is available on HP’s website. For general information on Secure Printing and Imaging please refer to http://www.hp.com/go/secureprinting
Tag: security
Creating a Custom iPhone or iPad Lock Screen Wallpaper Image With Your Name and Contact Information
Technology > Apple > iPhone Summary. These days, most people have their smart phones locked. This is good for security, but if the phone is lost and then found by someone, they won’t ever be able to get into the phone and find out who to return it to. These instructions describe how to create a custom… Continue reading Creating a Custom iPhone or iPad Lock Screen Wallpaper Image With Your Name and Contact Information
Best Security Practices for TeamViewer, GoToMyPC, LogMeIn, and other Remote Computer Access Support Software
Technology Summary. Remote computer access support software such as TeamViewer, GoToMyPC, LogMeIn, and others make it very convenient to support users from a distance, or monitor your own computer while performing time consuming installations and updates. Below are instructions for configuring TeamViewer for maximum security. Security Threats. Considering that about 90% of all companies say they’ve… Continue reading Best Security Practices for TeamViewer, GoToMyPC, LogMeIn, and other Remote Computer Access Support Software
Computer Security Update – Summer 2011
Technology Summary. This year has been busy for anyone involved in computer support and security. Hijacked Computers. Computers are being taken over by viruses that turn them into remote controlled drones. In one group alone, more than 4.5 million computers that have been hijacked by hackers for their use. This is just one of many groups of… Continue reading Computer Security Update – Summer 2011
Bicycle Stolen – Sign of the Times
Effective Living Summary. With the recent news of rampant hacking in the digital world, it’s not surprising that we’d see a rise in crime in our physical world. When well financed businesses, organizations, and institutions are having their computers broken into, one begins to wonder how secure an individual could possibly be. Commentary. Below is… Continue reading Bicycle Stolen – Sign of the Times
Computer Usage Monitoring, Tracking, and Reporting Systems – Using System Log Files or Commercial Software
Technology Summary. This document provides some retail solutions as well as do-it-yourself solutions for computer usage reporting. Monitor. It’s sometimes helpful to know computer usage over a given period of time. For example, when evaluating the use of shared or public computers, one wants to know the utilized value of those computers compared to the cost… Continue reading Computer Usage Monitoring, Tracking, and Reporting Systems – Using System Log Files or Commercial Software
YouTube Most Viewed This Week Rankings and Ratings Hacked
Technology Summary. Hackers have recently been manipulating search engine results and content ratings. On 3 June 2011, we saw an example of this on YouTube. Under the Most Viewed category for This Week, in position #12 with 4.8 million views was a 31 second commercial for Dish network. Click here, or the image to the… Continue reading YouTube Most Viewed This Week Rankings and Ratings Hacked