Author Archive

Identity Theft – How Hackers Do It & How To Prevent It? »

Internet users are susceptible to attacks pertaining to malware or malicious software. Besides sending fake applications that corrupt your device, hackers have also indulged in another form of crime which involves theft of identity. Identity theft refers to the stealing of an individual’s identity and pretending to be that person. Hackers often misuse an identity […]

Chrome Extensions – What’s Not to Love? »

All businesses need to save time and thankfully Google Chrome is available to help! A range of Chrome extensions are also at hand to make life smoother, and not only streamline your browsing experience but streamline your tendency to become distracted. Image Search “Image Search” is a perfect tool for taking the trawl out of […]

Recovering from Event ID 455 in MS Exchange Server »

MS Exchange Server uses a logging mechanism to record all changes to the Exchange database. These changes are stored in Exchange database transaction logs. If your database becomes corrupt, the transaction logs are used to restore the database to a consistent state. These files ensure a high level of recoverability. When some of these log […]

Dome9’s new iPhone Security App: Network Admins Take a Seat »

Dome9 (the nanny) is the provider of firewall hosting services meant for protecting cloud servers, and it just created a very useful iPhone Security App that you may want to check out. What is Dome9 and what does it offer? Dome9 is an Israeli security company that enables the users to lockdown SSH access or admin […]

Vodio App For iPad Review »

The Vodio App is an awesome application for the iPad that organizes your video stream. It not only allows you to easily watch videos from different sources but also has an impressive display, thanks to the iPad. The Vodio iPhone app however, requires iOS 4.3 or later and is compatible with the iPad. The controls […]