Author Archive

Data Recovery

DriveSavers is the worldwide leader in data recovery services.
Reference this number for special discounts, DS16457 …

Our U.S.-based Data Recovery Advisers are standing by 24/7

  • Free Shipping
  • Free Evaluation
  • No Data, No Charge!

Live Advisers 24/7

We know data loss emergencies happen day or night, every day of the week. We’re here 24/7 to take your call and get your recovery started.

We are dedicated to giving our customers a positive experience by utilizing our expert knowledge and skills and to perform the services that will suit all your unique needs.

Call Toll Free: 800·440·1904


Jungle Computer
67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Talk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com

Dictionary Attack

Hacked how, my password is mycutepuppy …

Jungle ComputerA dictionary attack is a technique or method used to breach the computer security of a password-protected machine or server. A dictionary attack attempts to defeat an authentication mechanism by systematically entering each word in a dictionary as a password or trying to determine the decryption key of an encrypted message or document.

Dictionary attacks are often successful because many users and businesses use ordinary words as passwords. These ordinary words are easily found in a dictionary, such as an English dictionary.

Dictionary attacks are not effective against systems that make use of random permutations of lowercase and uppercase letters (NOT JUST THE FIRST LETTER) combined with numerals and special characters.


Talk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com
by Paul Gil
Updated March 13, 2017
https://www.lifewire.com/top-internet-email-scams-2483614

Cradlepoint NetCloud Engine

Cradlepoint NetCloud: Securely Connecting People, Places and Things with 4G LTE, SD-WAN and Cloud Services …

Jungle Computer is a Cradlepoint Reseller …
Distributed and mobile enterprises across many industries are embracing cloud, mobile, and Internet of Things (IoT) technologies to increase business agility, empower distributed workforces, and gain operational insights—driving the need for always-connected people, places, and things.

As a result, an increasing amount of enterprise network traffic is moving off private IP networks and onto the public Internet. The Cradlepoint NetCloud platform is designed specifically for this new “Interprise” era and allows companies to deploy private cloud networks over wired and wireless broadband Internet services for branch, mobile workforce, vehicle, and IoT networks.

Jungle Computer
67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Talk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com

Why do they still use Windows XP?

A lot of Large organizations still use Microsoft Windows XP.

Riddled with security vulnerabilities, is there really any excuse for running an obsolete operating system?


Jungle Computer
67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Talk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com

Why you need ransomware protection

Protect your computers …
MALWAREBYTES 3 & ESET Internet Security

MalwareWhy you need ransomware protection
In 2016, the U.S. Department of Justice revealed that the Internet Crime Complaint Center (IC3) had received nearly 7,700 public complaints regarding ransomware since 2005, totaling $57.6 million in damages. Those damages include ransoms paid—generally $200 to $10,000, according to the FBI—as well as costs incurred in dealing with the attack and estimated value of data lost. In 2015 alone, victims paid over $24 million across nearly 2,500 cases reported to the IC3.

Reports of two massive, global ransomware attacks are dominating the news. As workers in Europe are heading home for the weekend, ransomware is shutting down their systems. Here’s what we know so far.

The ransomware is spread using a known, and patched, vulnerability (MS17-010) that came from a leaked NSA set of exploits that we reported on our blog in April. Our research shows the encryption is done with RSA-2048 encryption. That means that decryption will be next to impossible, unless the coders have made a mistake that we haven’t found yet.

The demanded ransom of $300 per device and the potential risks to the public that come with the targets being big utility and healthcare companies seem to be in shrill contrast. We can only hope that the companies that were hit will be able to get their backups deployed quickly and can start the recovery from this cyberattack.

Computer DangerProtection
Consumers and businesses alike should be sure their systems and software are updated with all current patches in order to stop the spread of infection. Both our consumer product, Malwarebytes, and our business product, Malwarebytes Endpoint Security, already provide proactive protection against this threat. Malwarebytes signature-less anti-exploit technology blocks the infection vector, while our anti-malware technology blocks the payload pre-execution. Our anti-ransomware technology prevents users’ files from being encrypted and will stop any future unknown ransomware variants. Malwarebytes combines multiple security layers with the best-informed telemetry to block an attacker at every stage of the kill chain.

https://www.malwarebytes.com/

https://www.eset.com/us/

JungleComputer.com