Tag Archive

Buying Computer Hardware

Buying computer hardware can be a mind-numbing and mystifying task.

Jungle Computer will help you select the best possible hardware and software solution for your business. Cost-effective installation services are available for your entire business, including Servers, PCs, mobile devices, routers, switches, VPNs and peripheral devices.

Jungle ComputerTalk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com
Pennsylvania Contractor License: #PA114006

Jungle Computer
67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Jungle Computer is dedicated to giving our customers a positive experience by utilizing our expert knowledge and skills and to perform the services that will suit all your unique needs.

Cradlepoint NetCloud Engine

Cradlepoint NetCloud: Securely Connecting People, Places and Things with 4G LTE, SD-WAN and Cloud Services …

Jungle Computer is a Cradlepoint Reseller …
Distributed and mobile enterprises across many industries are embracing cloud, mobile, and Internet of Things (IoT) technologies to increase business agility, empower distributed workforces, and gain operational insights—driving the need for always-connected people, places, and things.

As a result, an increasing amount of enterprise network traffic is moving off private IP networks and onto the public Internet. The Cradlepoint NetCloud platform is designed specifically for this new “Interprise” era and allows companies to deploy private cloud networks over wired and wireless broadband Internet services for branch, mobile workforce, vehicle, and IoT networks.

Jungle Computer
67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Talk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com

ATM Security Hoax

ATM Security Hoax:
ATM HoaxWho needs 911 when you’ve got your trusty PIN number? This scam reports that if you need to call the police at an ATM machine, you can subtly make the call by typing in your PIN number backwards. The website Hoax-Slayer.com reports that the scam “stated that this method of calling the police is very seldom used because people don’t know it exists,” and assures customers that “the machine will still give you the monies you requested,” despite having typed in your code backwards.

Question; My ATM PIN number is 5665, how’s that going to work???

Fax Thru Email

faxReplace your bulky old fax machine with a fast, paper-free solution. It’s eco-friendly too!

Forget the waste and expense of a fax machine – with Fax Thru Email, you send and receive faxes over the Web, using your own unique fax number. Incoming faxes go directly to your email inbox; you send outgoing faxes right from your email or by logging on to FaxThruEmail.com.

Technology makes it fast, our features make it easy.
Fax Thru Email uses the Internet, rather than a phone line, to send and receive faxes. There’s no equipment to buy or phone line to install – you send faxes directly from any device you use for email or browsing the Internet. View and manage your fax history, including sent/received logs, account information, help and billing details from our easy Web-based manager.

Learn more …

  • Save money.
    • SaleThere’s no need to install or maintain a landline or fax machine – we give you your own, personal fax number.
  • Save trees.
    • Cut down on paper use and increase privacy – no paper copies left lying around for someone else to read.
  • Two easy ways to fax.
    • Fax from your email account – just put the receiver’s fax number in the Subject line. You can also send your fax from FaxThruEmail.com.
  • Add attachments with one click.
    • Attach a file from your computer or your Online Storage account.
  • No activation or per-fax fees.
    • Choose your plan based on how many pages you think you’ll need. Change it at any time.
  • Want to increase your page limit?
    • It’s easy. Just buy additional Page Packs once you purchase a Fax Thru Email plan.

MoneyJungle Computer LLC.
67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Talk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com

Basics Computer Security

The basics of computer security, and how to make sure you’re protect.

Let’s cover computer security.

The first thing we’re going to talk about is something called a dictionary attack which has to do with your passwords. When creating your passwords, some sites require extremely specific and complicated passwords, which is actually a bit unnecessary. The type of attacks they’re trying to guard you from are dictionary attacks.

Dictionary attacks are programmed to try every word in the dictionary, or in its own database of common words and passwords, as the password for a large mass of usernames. If your password is Kangaroo, they’re probably going to break into your account. Most passwords aren’t this simple, but that doesn’t matter. They attack such a massive amount of accounts that they only need a few passwords that are relatively simple. When creating a password, you want to use different cases, numbers, and symbols, but one of the most effective ways to create a good password is to throw some random letters in there (ex: kangarooSyCA67). Also, stay away from sequential numbers.

SecurityPhishing, another thing to watch out for, is emails or webpages that mimic other valid sites to try and trick people into entering their personal information, though the site truly isn’t connected to the site it’s trying to mimic. In general, two ways to safeguard from these attacks are checking the address in the browser and to open a new browser and go to the website that is claiming to contact you.

Let’s also discuss encryption and HTTPS. If you are at Starbucks trying to access your bank account, you have reason to be suspicious that someone could see and take your information. You will want to look for a green HTTPS instead of HTTP at the beginning of the web address. That means that the site you’re sending your information to is encrypting your passwords and other information, scrambling up data according to a code that only they know.

In general, whenever you’re showing private or sensitive information, check for HTTPS. A few other general tips: don’t share passwords between important accounts. If a site you use gets hacked into, your password may be compromised regardless of its strength. Also, don’t download strange files. If you don’t recognize the file type like .pdf, .txt, .jpg, be wary. Some of these files you download can be very powerful and even run your computer from the inside.

Lastly, keep your software updated, particularly software that interacts with the internet. One way that information can be compromised is when ‘bad guys’ find holes and gaps in security of older versions of software. Those bugs have been patched in newer versions, so if you keep everything updated, you’ll avoid lots of problems. These are very basic things you should know about how to keep your information safe on your computer.


Jungle Computer LLC.
67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Talk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com