Tag Archive

Buying Computer Hardware

Buying computer hardware can be a mind-numbing and mystifying task.

Jungle Computer will help you select the best possible hardware and software solution for your business. Cost-effective installation services are available for your entire business, including Servers, PCs, mobile devices, routers, switches, VPNs and peripheral devices.

Jungle ComputerTalk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com
Pennsylvania Contractor License: #PA114006

Jungle Computer
67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Jungle Computer is dedicated to giving our customers a positive experience by utilizing our expert knowledge and skills and to perform the services that will suit all your unique needs.

There will be no Windows 11

Windows 11Microsoft says that Windows 10 will be its final release of the iconic operating system that’s installed on over 90% of computers.

“Right now we’re releasing Windows 10, and because Windows 10 is the last version of Windows, we’re all still working on Windows 10,” said Jerry Nixon, Microsoft’s developer evangelist, at the Ignite tech conference.

Instead of releasing an entirely new and different version of its desktop OS every few years, Microsoft is taking an Apple-like approach to subsequent Windows releases, standardizing on Windows 10 as its Cupertino-based rival has done with OS X. Under this new strategy, Microsoft will deliver regular improvements to Windows through software updates.

http://www.techradar.com/news/software/operating-systems/microsoft-confirms-there-will-be-no-windows-11-1293309


Jungle Computer
67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Talk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com

Pennsylvania Contractor License:
# PA114006

Jungle Computer is dedicated to giving our customers a positive experience by utilizing our expert knowledge and skills and to perform the services that will suit all your unique needs.

Why you need ransomware protection

Protect your computers …
MALWAREBYTES 3 & ESET Internet Security

MalwareWhy you need ransomware protection
In 2016, the U.S. Department of Justice revealed that the Internet Crime Complaint Center (IC3) had received nearly 7,700 public complaints regarding ransomware since 2005, totaling $57.6 million in damages. Those damages include ransoms paid—generally $200 to $10,000, according to the FBI—as well as costs incurred in dealing with the attack and estimated value of data lost. In 2015 alone, victims paid over $24 million across nearly 2,500 cases reported to the IC3.

Reports of two massive, global ransomware attacks are dominating the news. As workers in Europe are heading home for the weekend, ransomware is shutting down their systems. Here’s what we know so far.

The ransomware is spread using a known, and patched, vulnerability (MS17-010) that came from a leaked NSA set of exploits that we reported on our blog in April. Our research shows the encryption is done with RSA-2048 encryption. That means that decryption will be next to impossible, unless the coders have made a mistake that we haven’t found yet.

The demanded ransom of $300 per device and the potential risks to the public that come with the targets being big utility and healthcare companies seem to be in shrill contrast. We can only hope that the companies that were hit will be able to get their backups deployed quickly and can start the recovery from this cyberattack.

Computer DangerProtection
Consumers and businesses alike should be sure their systems and software are updated with all current patches in order to stop the spread of infection. Both our consumer product, Malwarebytes, and our business product, Malwarebytes Endpoint Security, already provide proactive protection against this threat. Malwarebytes signature-less anti-exploit technology blocks the infection vector, while our anti-malware technology blocks the payload pre-execution. Our anti-ransomware technology prevents users’ files from being encrypted and will stop any future unknown ransomware variants. Malwarebytes combines multiple security layers with the best-informed telemetry to block an attacker at every stage of the kill chain.

https://www.malwarebytes.com/

https://www.eset.com/us/

JungleComputer.com

ATM Security Hoax

ATM Security Hoax:
ATM HoaxWho needs 911 when you’ve got your trusty PIN number? This scam reports that if you need to call the police at an ATM machine, you can subtly make the call by typing in your PIN number backwards. The website Hoax-Slayer.com reports that the scam “stated that this method of calling the police is very seldom used because people don’t know it exists,” and assures customers that “the machine will still give you the monies you requested,” despite having typed in your code backwards.

Question; My ATM PIN number is 5665, how’s that going to work???

Basics Computer Security

The basics of computer security, and how to make sure you’re protect.

Let’s cover computer security.

The first thing we’re going to talk about is something called a dictionary attack which has to do with your passwords. When creating your passwords, some sites require extremely specific and complicated passwords, which is actually a bit unnecessary. The type of attacks they’re trying to guard you from are dictionary attacks.

Dictionary attacks are programmed to try every word in the dictionary, or in its own database of common words and passwords, as the password for a large mass of usernames. If your password is Kangaroo, they’re probably going to break into your account. Most passwords aren’t this simple, but that doesn’t matter. They attack such a massive amount of accounts that they only need a few passwords that are relatively simple. When creating a password, you want to use different cases, numbers, and symbols, but one of the most effective ways to create a good password is to throw some random letters in there (ex: kangarooSyCA67). Also, stay away from sequential numbers.

SecurityPhishing, another thing to watch out for, is emails or webpages that mimic other valid sites to try and trick people into entering their personal information, though the site truly isn’t connected to the site it’s trying to mimic. In general, two ways to safeguard from these attacks are checking the address in the browser and to open a new browser and go to the website that is claiming to contact you.

Let’s also discuss encryption and HTTPS. If you are at Starbucks trying to access your bank account, you have reason to be suspicious that someone could see and take your information. You will want to look for a green HTTPS instead of HTTP at the beginning of the web address. That means that the site you’re sending your information to is encrypting your passwords and other information, scrambling up data according to a code that only they know.

In general, whenever you’re showing private or sensitive information, check for HTTPS. A few other general tips: don’t share passwords between important accounts. If a site you use gets hacked into, your password may be compromised regardless of its strength. Also, don’t download strange files. If you don’t recognize the file type like .pdf, .txt, .jpg, be wary. Some of these files you download can be very powerful and even run your computer from the inside.

Lastly, keep your software updated, particularly software that interacts with the internet. One way that information can be compromised is when ‘bad guys’ find holes and gaps in security of older versions of software. Those bugs have been patched in newer versions, so if you keep everything updated, you’ll avoid lots of problems. These are very basic things you should know about how to keep your information safe on your computer.


Jungle Computer LLC.
67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Talk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com