Microsoft Word Vulnerability Being Used To Victimize Email Users
Microsoft is taking some heat, thanks to a nasty exploit in Microsoft Word that is being used to install malware
Read MoreMicrosoft is taking some heat, thanks to a nasty exploit in Microsoft Word that is being used to install malware
Read MoreUbuntu One and Dropbox allow you to synchronize your data across computers. They both claim to keep your data “secure”.
Read MoreLast week, I received a support call from a company that was using FreePBX® version 10 with Asterisk 1.8 on
Read MoreJelly Bean first shipped on Galaxy Nexus 7 tablets, but this hasn’t been reviewed since the kind readers haven’t bought
Read MoreIf you haven’t tried Google Voice, you may be confused as to what Google Talk does vs Google Voice. It
Read MoreThe US Department Of Homeland Security (DOH) and Trend Micro recently announced that Apple will no longer be updating Quicktime
Read MoreJust recently, a customer brought a computer to me saying that they had a virus and wanted it removed. After
Read MoreSocial networks like Facebook, Twitter, LinkedIn and MySpace have added an integrated level of communication that we have not seen
Read MoreNotes Upon installing a few Aastra 6731i phones and a 6755i onto a system that was previously proliferated with Polycom phones of
Read MorePreface After having to configure VMWare ESX and a Cisco switch to allow for bonding multiple NICs together into one
Read More