Tag Archive

Basics Computer Security

The basics of computer security, and how to make sure you’re protect.

Let’s cover computer security.

The first thing we’re going to talk about is something called a dictionary attack which has to do with your passwords. When creating your passwords, some sites require extremely specific and complicated passwords, which is actually a bit unnecessary. The type of attacks they’re trying to guard you from are dictionary attacks.

Dictionary attacks are programmed to try every word in the dictionary, or in its own database of common words and passwords, as the password for a large mass of usernames. If your password is Kangaroo, they’re probably going to break into your account. Most passwords aren’t this simple, but that doesn’t matter. They attack such a massive amount of accounts that they only need a few passwords that are relatively simple. When creating a password, you want to use different cases, numbers, and symbols, but one of the most effective ways to create a good password is to throw some random letters in there (ex: kangarooSyCA67). Also, stay away from sequential numbers.

SecurityPhishing, another thing to watch out for, is emails or webpages that mimic other valid sites to try and trick people into entering their personal information, though the site truly isn’t connected to the site it’s trying to mimic. In general, two ways to safeguard from these attacks are checking the address in the browser and to open a new browser and go to the website that is claiming to contact you.

Let’s also discuss encryption and HTTPS. If you are at Starbucks trying to access your bank account, you have reason to be suspicious that someone could see and take your information. You will want to look for a green HTTPS instead of HTTP at the beginning of the web address. That means that the site you’re sending your information to is encrypting your passwords and other information, scrambling up data according to a code that only they know.

In general, whenever you’re showing private or sensitive information, check for HTTPS. A few other general tips: don’t share passwords between important accounts. If a site you use gets hacked into, your password may be compromised regardless of its strength. Also, don’t download strange files. If you don’t recognize the file type like .pdf, .txt, .jpg, be wary. Some of these files you download can be very powerful and even run your computer from the inside.

Lastly, keep your software updated, particularly software that interacts with the internet. One way that information can be compromised is when ‘bad guys’ find holes and gaps in security of older versions of software. Those bugs have been patched in newer versions, so if you keep everything updated, you’ll avoid lots of problems. These are very basic things you should know about how to keep your information safe on your computer.


Jungle Computer LLC.
67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Talk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com

We Do Intranets

Intranet

Intranet ServicesAn intranet is a set of networks that are under the control of a single administrative entity.

The intranet uses the IP protocol and IP-based tools such as web browsers and file transfer applications. The administrative entity limits use of the intranet to its authorized users. Most commonly, an intranet is the internal LAN of an organization. A large intranet typically has at least one web server to provide users with organizational information. An intranet is also anything behind the router on a local area network.

Intranet allows company information and resources to be shared more easily among employees. An intranet can also be used to facilitate working in groups and for teleconferences.


Jungle Computer LLC.
67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Talk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com

Owned by a United States Military Veteran

USAFLocally owned and operated, Jungle Computer LLC., is a Small Business Owned By A United States Military Veteran that covers the Wilkes-Barre, Scranton and Hazleton Pennsylvania area.

Because we are local we can provide you a varied range of Internet technology solutions in person.

With expertise in computer sales, service and support, networking, Web design, Web hosting, Website advertising and database development, Jungle Computer offers your business a full-service technology solution.

C130HWith the shift of many computer companies from the home and small business computer user to the large business customer, the home and small business computer user is increasingly being left behind. While being open to large business purchases, Jungle Computer promises to never lose sight of why we started our company.
We offer quality service, support & computers at competitive prices. Jungle Computer offers quality computers, monitors, peripherals, power protection devices, Tablet PCs, All-in-One PCs, networking products, input devices, data storage products, hardware and software, backup solutions and a comprehensive warranty with every computer.


Jungle Computer LLC.
Luzerne Bank67 – 69 Public Square
6th Floor
Wilkes-Barre, Pennsylvania
18701-2500

Talk to a Jungle Computer Professional …
570.970.6555 | PHONE
info@junglecomputer.com

480.624.2500 | PHONE Domain & Hosting Sales & Support

Pennsylvania Contractor License:
# PA114006

Located In The:
Luzerne Bank Building 6th Floor

Veteran Owned Business

Is your small business or company owned by a veteran (VOB), active duty military, reservist, service disabled veteran (SDVOSB) or military or veteran spouse of the United States Army (USARMY), Air Force (USAF), Marine Corps (USMC), Navy (USN), Coast Guard (USCG) or National Guard?

Join over 26,500 other veteran owned small businesses (VOSB) already listed and get your company’s profile potentially seen by millions of fellow veterans, government agencies, prime contractors, sub contractors, corporate purchasing departments and every day consumers who strongly and proudly support veterans businesses and are right now looking for your products and services Join VOB… it’s FREE!

Click this button to get your company's free listing
Already a member? login here
Have a question? (877) VOB-List

Click this button to get your nonprofit's free listing

What is a Virtual Cloud Network

The Cradlepoint NetCloud Engine (NCE) is a new cloud-based, Network-as-a-Service (NaaS) that lets customers easily create a secure private network that overlays the Internet for connecting people, places and things. They can now do this without the cost and complexity of a traditional VPNs, such as Topology Design, Private Circuit Ordering and Provisioning, IP address management, DNS setup, private APNs, sizing hardware VPN concentrators, configuring PKI, and so on. From a partner perspective, this means you can configure and deploy customers faster without tying up your most experienced network engineers. Just like with cloud computing, we’ve used the cloud to automate and offload the complexity of building, deploying, managing and securing global networks (think: Amazon AWS for networking).

Who benefits from a service like NetCloud Engine?

Distributed enterprises and mobile SMBs and enterprises with lean IT budgets and staffing, and those who are grappling with securely connecting a growing number of remote people, places, and things to their data center, public cloud servers and SaaS applications.

Ideal buyer profiles include:

  • IT generalists
  • Network engineers
  • DevOps teams
  • Managed Service Providers
  • Cloud administrators
  • IoT system administrators

For pricing and more information give us a call