Hewlett-Packard Security Alert Regarding HP Printers Being Hacked

Technology Summary. A potential security vulnerability has been identified with certain HP printers and HP digital senders. The vulnerability could be exploited remotely to install unauthorized printer firmware. [source] A full list of effected printers and devices is available on HP’s website. For general information on Secure Printing and Imaging please refer to http://www.hp.com/go/secureprinting  

Creating a Custom iPhone or iPad Lock Screen Wallpaper Image With Your Name and Contact Information

Technology > Apple > iPhone Summary. These days, most people have their  smart phones locked. This is good for security, but if the phone is lost and then found by someone, they won’t ever be able to get into the phone and find out who to return it to. These instructions describe how to create a custom… Continue reading Creating a Custom iPhone or iPad Lock Screen Wallpaper Image With Your Name and Contact Information

Best Security Practices for TeamViewer, GoToMyPC, LogMeIn, and other Remote Computer Access Support Software

Technology Summary. Remote computer access support software such as TeamViewer, GoToMyPC, LogMeIn, and others make it very convenient to support users from a distance, or monitor your own computer while performing time consuming installations and updates. Below are instructions for configuring TeamViewer for maximum security. Security Threats. Considering that about 90% of all companies say they’ve… Continue reading Best Security Practices for TeamViewer, GoToMyPC, LogMeIn, and other Remote Computer Access Support Software

Computer Security Update – Summer 2011

Technology Summary. This year has been busy for anyone involved in computer support and security. Hijacked Computers. Computers are being taken over by viruses that turn them into remote controlled drones. In one group alone, more than 4.5 million computers that have been hijacked by hackers for their use. This is just one of many groups of… Continue reading Computer Security Update – Summer 2011

Bicycle Stolen – Sign of the Times

Effective Living Summary. With the recent news of rampant hacking in the digital world, it’s not surprising that we’d see a rise in crime in our physical world. When well financed businesses, organizations, and institutions are having their computers broken into, one begins to wonder how secure an individual could possibly be. Commentary. Below is… Continue reading Bicycle Stolen – Sign of the Times

Computer Usage Monitoring, Tracking, and Reporting Systems – Using System Log Files or Commercial Software

Technology Summary. This document provides some retail solutions as well as do-it-yourself solutions for computer usage reporting. Monitor. It’s sometimes helpful to know computer usage over a given period of time. For example, when evaluating the use of shared or public computers, one wants to know the utilized value of those computers compared to the cost… Continue reading Computer Usage Monitoring, Tracking, and Reporting Systems – Using System Log Files or Commercial Software

YouTube Most Viewed This Week Rankings and Ratings Hacked

Technology Summary. Hackers have recently been manipulating search engine results and content ratings. On 3 June 2011, we saw an example of this on YouTube. Under the Most Viewed category for This Week, in position #12 with 4.8 million views was a 31 second commercial for Dish network. Click here, or the image to the… Continue reading YouTube Most Viewed This Week Rankings and Ratings Hacked