Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

Peer-To-Peer

March 2, 2015 by The T By D Team Leave a Comment

Peer-To-Peer

In a peer-to-peer network, all computers share equivalent responsibility for processing data.

A peer-to-peer network differs from a client-server network where certain devices (server) have responsibility for providing data and other devices (clients) consume the data.

Filed Under: Definitions

Client-Server

March 2, 2015 by The T By D Team Leave a Comment

Client-Server

Refers to a popular model for computer networking that utilizes client and server devices, each designed for specific purposes.

‘Client’ devices typically are PCs with network software applications installed that request and receive information over the network.  Mobile devices can also function as ‘clients’.

A ‘server’ device typically stores files and databases including more complex applications.  Server devices often feature higher-powered central processors, more memory, and larger disk drives than client devices.

Network ‘clients’ make requests to a server by sending messages, and servers respond to their ‘clients’ by acting on each request and returning results.  One server generally supports multiple clients.  Multiple servers can be networked together in a pool.

Client-Server networks are popular in business environments, and can be used on the Internet (WAN) or on LANs.

Filed Under: Definitions

LAN

March 2, 2015 by The T By D Team 1 Comment

LAN:  Local Area Network

Supplies networking capability to a group of computers in close proximity to one another, such as within an office building, school, or home.  A LAN is useful for sharing resources like files, printers, games, or other applications.

A LAN often connects to other LANs, and to the internet or WAN.

Filed Under: Definitions

WAN

March 2, 2015 by The T By D Team 1 Comment

WAN:  Wide Area Network

Spans a large geographical area, such as a state/province, or country.  WANS often connect multiple smaller networks (LANs) or metro area networks (MANs).

The world’s largest WAN is the Internet.

Filed Under: Definitions

Sleep vs. ShutDown

February 23, 2015 by The T By D Team Leave a Comment

Shutdown vs SleepSleep vs. ShutDown?

  In this age of thinking “green” and power-saving, there is a constant debate about whether it’s better for your computer (and the environment, not to mention your bank account) to shutdown your computer, or just let it go into “sleep” mode.
I’m going to put that debate to bed, so to speak.

The argument for shutdown:  You’ll save energy, money, and the environment.

The argument for sleep:  You’ll save energy, wear-and-tear on your computer, and time.

 
Computer Time

 

 

 

 

The ‘Time’ Argument.

 

I run a relatively high-end computer (Computer-Geek, and all that).

Time to Shutdown:  0:16
Time to Boot Up:  1:06

Shutting down is relatively quick, but booting up is painfully slow.  Keep in mind, this is what I refer to as a “true” boot-up time-the time from when I press the power button to when I’m at a usable desktop (where you can actually click on things and get a response).

Time to Go Into Sleep Mode:  0:18
Time to Fully Wake:  0:02

The time it takes to go into sleep mode is comparable to shutting down my computer.  However, the time it takes to wake my computer to be fully functional is almost instantaneous.  Not to mention the convenience of waking my computer merely by tapping the keyboard, or moving the mouse.

Money saving

 

 

 

 

The ‘Power/Energy/Money-Saving’ Argument:

As long as your system BIOS supports the S3 ACPI (Advanced Configuration and Power Interface) mode, and most computers do, then leaving your computer in sleep mode is not running up your power bill.  The S1 mode leaves the CPU and RAM powered up, the S3 mode powers the CPU and RAM down.  You can check and change your BIOS sleep state, if you want your computer to draw less power.

My high-end computer uses approximately 120-130 watts just sitting at the desktop (not including the 2 monitors I run), and uses 1 watt when shut down (most computers still draw a very small amount of power, even when off, so they can turn on when you push the power button).  In sleep mode, my computer draws 5 watts.  That’s a difference of 4 watts of power, between shutdown and sleep.  Not a huge difference.

Suppose your computer system is turned off 16 hours/day.  The 4 watts difference works out to 1.92 killowatt-hours (kWh) per month.  According to National Resources Canada in April 2014, the average residential electricity price in Canada (including taxes) was 13.272 cents/kWh.  So keeping your computer in sleep mode would cost you 25.5 cents per month more than it would to shut your computer down.  The average Canadian home uses 955.8kWh monthly, so 16 hours of sleep mode per day would be a 0.21% increase in monthly power use.  Of course, some computers use a little more power in sleep mode, but it’s almost always under 10W.

You can find more information on how to change the function of your computer’s power button here.  You probably don’t want hibernate mode, as this dumps the contents of your PC’s RAM to the hard disk and then powers off your PC, so you can resume right where you left off (with programs open, etc.).  With the large amount of RAM in today’s systems, this process can be pretty slow.

Wear-and-Tear

 

 

 

 

The ‘Wear-and-Tear’ Argument:

Computers that are in sleep mode use minimal power to keep only essential components operating in low-power mode.  The major remaining power consuming parts are the RAM, CPU and motherboard; all run in dramatically reduced power consumption states while in sleep mode.  They both have just enough power to keep the OS stored in the RAM.  The sleep state hardly uses the CPU and RAM, which causes them to produce next to no heat or part attrition.  The motherboard is also powered just enough to check for any use of the keyboard, mouse, touch pad, or power button to wake the system from sleep mode.

In sleep mode, the computer turns off components like the graphics card, network adapter, hard drives, and optical drives.  The parts are turned ‘off’ to a state similar to as if the computer was shut down.  The sleep state also prevents the computer from being attacked by hackers and network-related malware, the same way a shut down computer does.

Turning on a computer from a ‘shut down’ state causes a substantially larger amount of wear-and-tear on the hardware, compared to re-booting a computer from a ‘sleep’ state.  Waking a computer from ‘sleep’ uses less energy, in addition to being easier on the computer components.  Waking a computer from hibernation wears the computer similar to turning on a computer from ‘shut down’.

 Time
 Computer Usage:

Of course, computer usage has to weigh into the argument as well.  If you use your computer several times per day, you can reduce wear-and-tear by using sleep mode instead of shutdown.  However, if you use your computer only an hour or so every few days, it makes more sense to shut down your computer.

Update

Software Updates:

If your computer is set to automatically install software updates (as it should, as software updates keep your system safe & secure), most software updates occur overnight.  If your computer is left in ‘sleep’ mode, your computer will receive the updates, and will automatically re-start and go back into sleep mode.  However, if your computer is shutdown, when you turn on your computer, your computer will automatically install the updates at that time.  You will then have to re-start your computer again.  If the start of your day is time-restricted, this is something to keep in mind.

 

Got Cyber-Gremlins?

Call 1-204-800-3166

For Cyber-Extermination!

 

 

Filed Under: FAQ, Featured

Definition: Denial Of Service Attack

February 17, 2015 by The T By D Team Leave a Comment

 

Denial Of Service Attack:

 

“DoS Attack”

 

 

 

An assault on a network that floods it with so many requests that regular traffic is either slowed or completely interrupted.  Unlike a virus or worm, which can cause severe damage to databases, a denial of service attack interrupts network service for a long period of time.

 

Distributed Attack:

 

“DDoS Attack”

A distributed Denial of Service attack can employ hundreds or even thousands of computers that have previously been infected.  The computers act as “zombies” and work together to send out bogus messages, thereby creating huge volumes of phony traffic.

Filed Under: Definitions

Botnet

February 17, 2015 by The T By D Team Leave a Comment

Botnet:

 

Also called “Zombie Army”.

 

 

 

A network of a large number of private computers infected with malicious software.  They are then controlled as a group, without the owners’ knowledge.  They are usually used to generate spam, relay viruses, or flood a network or Web server with excessive requests to cause it to fail (see “Denial of Service Attack“).

The individual computers are compromised via a Trojan that often works by opening an Internet Relay Chat (IRC) channel that waits for commands from the person/organization in control of the botnet.

There is a thriving botnet business selling lists of compromised computers to hackers and spammers.

Filed Under: Definitions

ALERT: Financial Institutions Hit By CyberHeist

February 17, 2015 by The T By D Team Leave a Comment

BankALERT:  

Financial Institutions

Hit By CyberHeist

 

 

A multinational gang of CyberCriminals has stolen as much as $1 billions from as many as 100 financial institutions across the world, including Canada and the US.

This was a highly sophisticated operation that managed to stay inside bank networks for a very long time…

UNDETECTED!

Antivirus developer Kaspersky’s publication on Feb. 16, 2015, revealed details on what is likely the biggest cyberheist ever.

The CyberCriminals used carefully crafted emails
to trick pre-selected employees into opening malicious software files,
a common technique known as spear-phishing.

The opened software files infected their workstations.  Once the CyberCriminal had access, they roamed the internal network freely, until they tracked down administrators’ computers for video surveillance.  They studied how the bank clerks worked, and were then able to mimic their activity and tell ATMs to dispense cash to a gang member at a pre-determined time, or transfer larger amounts to accounts located all over the world.  In some cases, they inflated account balances before pocketing the extra funds through a fraudulent transaction.  Because legitimate funds were still there, the account holder would not suspect a problem.

Carbanak2

 Kaspersky reports evidence of theft in the amount of $300 million.  The NY Times reports thefts could add up to 3 times that amount, likely exceeding $1 billion.

Chris Doggett, from Kaspersky North America, told the NY Times, “This is likely the most sophisticated attack the world has seen to date in terms of the tactics and methods that cybercriminals have used to remain covert.”

The CyberGang, dubbed the “Carbanak CyberGang” by Kaspersky because of the malware they used, appears to be the first international CyberMafia: a group of CyberCriminals from Russia, Ukraine and other parts of Europe and China.

Kaspersky could not release the names of the banks because of nondisclosure agreements, but reports they were in Russia, Japan, Europe, The Netherlands, the US, and Canada.  NY Times states that The White House and FBI have been briefed on Kaspersky’s findings.  Interpol and Europol are coordinating the investigation.

Sanjay Virmani, director of Interpol Digital Crime Center said in a statement prepared by Kaspersky,

“These attacks again underline the fact that criminals will exploit any vulnerability in any system.  It also highlights the fact that no sector can consider itself immune to attack and must constantly address their security procedures.”

 

Kevin Mitnick, KnowBe4’s Chief Hacking Officer tweeted,

“Even after 20 years, social engineering is still the easiest way into a target’s network and systems, and it’s still the hardest attack to prevent.”

 

Security Issues?

Call 1-204-800-3166

Get Cyber-Exterminated!

 

 

Filed Under: ALERTS, Featured

Definition: Spear-Phishing

February 17, 2015 by The T By D Team 4 Comments

Spear-Phishing:

 

A targeted email scam with the sole purpose of obtaining unauthorized access to sensitive data.

 

 

 

Unlike phishing scams, which case broad, scatter-shot attacks, spear phishing hones in on a specific group or organization.  The intent is to steal intellectual property, financial data, trade or military secrets and other confidential data.

 

Victims are 4.5 times more likely to fall for spear-phishing email scams than normal phishing scams.  

 

This Is How It Works:

An email arrives, apparently from a trustworthy source, but instead it leads the unknowing recipient to a bogus website full of malware.  The malware infects that person’s computer.  If that person is connected to a network, or server, the CyberCriminals that sent the email now have access to the server and/or network, and all it’s information and data it/they contain.

These emails often use clever tactics to get victims’ attention.  For example, the FBI has warned of spear phishing scams where the emails appeared to be from the National Center for Missing and Exploited Children.

Many times, government-sponsored hackers and hacktivists are behind these attacks.  CyberCriminals do the same with the intention to resell confidential data to governments and private companies.  These CyberCriminals employ individually designed approaches and social engineering techniques to effectively personalize messages and websites.  As a result, even high-ranking targets within organizations, can find themselves opening emails they thought were safe.

 

One of the main entry points for Advanced Persistent Threats.

How To Stop It:

Traditional security often does not stop these attacks.  They are so cleverly customized, and are becoming more and more difficult to detect.

To fight spear-phishing scams, employees need to be aware of the threats.
Employees need to be aware of the possibility of bogus emails landing in their inbox, and what to look for.  

One employee mistake can have serious consequenses for businesses, financial institutions, governments, and even non-profit organizations.  With stolen data, CyberCriminals can reveal commercially sensitive information, manipulate stock prices, or commit various acts of espionage.

Spear-phishing attacks can deploy malware to hijack computers, organizing them into enormous networks called botnets that can be used for denial of service attacks.
Technology that focuses on email security is an absolute necessity.

 

 

Filed Under: Definitions

Free Security Checkup

February 12, 2015 by The T By D Team Leave a Comment

Google Security

FREE Security Checkup

February 10 was Safer Internet Day

 

Although you should practice safe internet policies every day, this day is to bring focus to how important online safety is.

Please take 2 minutes out of your day to complete a simple Security Checkup.

 

This checkup makes sure you are making the most of the 24/7 protection you receive from TbyD (if you’re on one of our Monthly Service Plans).

Google is giving you this FREE checkup.
If you complete this checkup by February 17, 2015, they will give you a
permanent 2 GB bump in your Google Drive storage plan.

 

It takes just a couple minutes and, unlike other checkups, it won’t leave you feeling guilty about not flossing.

Here’s what it does:

  • Ensures your account recovery information is current.

    If they detect suspicious activity in your account, they use your recovery info to get in touch and make sure no one but you gains access.

  • Lets you review recent sign-in activity.

    Reviewing this lets you validate the sign-ins are coming from you and not someone else who shouldn’t be using your credentials.

  • Confirms the apps and devices that access some account information.

    This step lets you monitor this list and remove apps and devices that don’t need access to your account any more.

Google checkupAfter you’ve gone through the checkup successfully, you’ll see 3 green checkboxes (see left) that confirm you’re eligible for the free storage and, more importantly, that you’ve taken steps to enhance your online safety.

 

Google will be granting the storage automatically to everyone by around February 28, 2015, and they will send you an email when your adjustment is complete.

 

Ideally, you’ll revisit this checkup every so often, or anytime your account changes, like when you get a new phone or replace an old laptop.  
While this is just one way to help you stay safe online, you can find even more tools and tips in the Google Safety Center.

 

**Please note:  Google Apps for Work and Google Apps for Education users are not eligible for the bonus storage, but should still consider taking the Security Checkup.

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: ALERTS, Featured

  • « Previous Page
  • 1
  • …
  • 13
  • 14
  • 15
  • 16
  • 17
  • …
  • 52
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in