Providing custom IT consuting services to small / medium businesses and residential. Full scope of services including networking, new system sales, computer repairs, tune-ups, virus removal. Also provide full integration of major business systems (security, telephone, copiers, etc.) to business computer / network systems. Fully bilingual speaking PC as well as Mac.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

US: COMPUTER SECURITY RESEARCHER UNCOVERS DATABASE OF 191 MILLION VOTERS

International Business Times | December 29, 2015

news image

An independent computer security researcher uncovered a database of information on 191 million voters that is exposed on the open Internet due to an incorrectly configured database, he said on Monday. The database includes names, addresses, birth dates, party affiliations, phone numbers and emails of voters in all 50 US states and Washington, researcher Chris Vickery said in a phone interview. Vickery, a tech support specialist from Austin, Texas, said he found the information while looking for ...

Read More

ORACLE TO FIX 167 VULNERABILITIES, INCLUDING A BACKDOOR-LIKE FLAW IN ITS E-BUSINESS SUITE

computerworld | January 07, 2016

news image

Oracle's monster batch of security updates expected Tuesday will include a fix for a serious misconfiguration issue in its E-Business Suite product that can give hackers access to databases full of sensitive business records....

Read More

HACKER LEXICON: MALVERTISING, THE HACK THAT INFECTS COMPUTERS WITHOUT A CLICK

wired | September 12, 2015

news image

MALVERTISING IS WHEN hackers buy ad space on a legitimate website, and, as the name suggests, upload malicious advertisements designed to hack site visitor’s computers....

Read More

GHOST FLAWS POSES HIGH RISK TO LINUX DISTRIBUTIONS

computerworld | January 27, 2015

news image

A fault in a widely used component of most Linux distributions could allow an attacker to take remote control of a system after merely sending a malicious email. The vulnerability, nicknamed "Ghost," is in the GNU C Library known as glibc, according to security vendor Qualys, which disclosed the issue on Tuesday as many Linux distributions released patches. Glibc is a C library that defines system calls....

Read More
news image

US: COMPUTER SECURITY RESEARCHER UNCOVERS DATABASE OF 191 MILLION VOTERS

International Business Times | December 29, 2015

An independent computer security researcher uncovered a database of information on 191 million voters that is exposed on the open Internet due to an incorrectly configured database, he said on Monday. The database includes names, addresses, birth dates, party affiliations, phone numbers and emails of voters in all 50 US states and Washington, researcher Chris Vickery said in a phone interview. Vickery, a tech support specialist from Austin, Texas, said he found the information while looking for ...

Read More
news image

ORACLE TO FIX 167 VULNERABILITIES, INCLUDING A BACKDOOR-LIKE FLAW IN ITS E-BUSINESS SUITE

computerworld | January 07, 2016

Oracle's monster batch of security updates expected Tuesday will include a fix for a serious misconfiguration issue in its E-Business Suite product that can give hackers access to databases full of sensitive business records....

Read More
news image

HACKER LEXICON: MALVERTISING, THE HACK THAT INFECTS COMPUTERS WITHOUT A CLICK

wired | September 12, 2015

MALVERTISING IS WHEN hackers buy ad space on a legitimate website, and, as the name suggests, upload malicious advertisements designed to hack site visitor’s computers....

Read More
news image

GHOST FLAWS POSES HIGH RISK TO LINUX DISTRIBUTIONS

computerworld | January 27, 2015

A fault in a widely used component of most Linux distributions could allow an attacker to take remote control of a system after merely sending a malicious email. The vulnerability, nicknamed "Ghost," is in the GNU C Library known as glibc, according to security vendor Qualys, which disclosed the issue on Tuesday as many Linux distributions released patches. Glibc is a C library that defines system calls....

Read More