Notice: Undefined index: option in /var/www/html/jc.infradapt.com/plugins/system/fixfrontedit/fixfrontedit.php on line 20 Recent blog posts - Page 116

Infradapt Blog

This is some blog description about this site

How to Protect Yourself from a Haunted Computer

How to Protect Yourself from a Haunted Computer
Strict Standards: Declaration of JParameter::loadSetupFile() should be compatible with JRegistry::loadSetupFile() in /var/www/html/jc.infradapt.com/libraries/joomla/html/parameter.php on line 512

b2ap3_thumbnail_halloween_pc_haunting_400.jpgNaturally, if you saw your lamp levitate, you would believe it to be the work of a ghoul and you would cry out in terror. What then would you believe if you saw your PC’s cursor begin to move on its own? In a spooky scenario like this, your computer isn’t haunted. It’s hacked. In the real world, the latter is the scarier of the two.

Continue reading
0 Comment

Tip of the Week: 8 Tips to be an Expert Googler

Tip of the Week: 8 Tips to be an Expert Googler

b2ap3_thumbnail_search_tips_to_win_400.jpgHave you ever tried to search for something on Google, only to be disappointed that you couldn't find what you were looking for? You might think you're being extremely specific, but in reality, you're not doing anything different from the average joe. Googling is an art lost to the ages, a secret technique of legend. But, not really. Here are some tips to help you get more out of the world's most popular search engine.

Continue reading
0 Comment

Zero Trust: Is this a Wise Data Security Policy?

Zero Trust: Is this a Wise Data Security Policy?

b2ap3_thumbnail_no_trust_data_protection_400.jpgSometimes it seems like the Internet is plotting against you, and nothing is safe, ever. Even if you don't have any thugs waiting to steal your data, there are hackers - thieves - who will steal it anyway, waiting to take it when you least expect it. One of the most secure ways to protect your company's digital assets is to enact a "zero trust" policy for your network.

Continue reading
0 Comment

Tip of the Week: How to Use Technology in a Sanitary Fashion

Tip of the Week: How to Use Technology in a Sanitary Fashion

b2ap3_thumbnail_sanitary_practices_400.jpgThese days, with the Ebola virus on everyone's mind, sanitation is a major issue. Enacting proper sanitation procedures is a must for any public place, especially in the office. Unbeknownst to most office workers, one of the biggest transmitters of germs is frequently-handled technology. Therefore, it's imperative that you properly use your technology in a sanitary fashion. Here's how.

Continue reading
0 Comment

Warning: Cryptowall 2.0 Ransomware is as Bad as They Come

Warning: Cryptowall 2.0 Ransomware is as Bad as They Come

b2ap3_thumbnail_ransomware_cryptowall_400.jpgBe advised, there's a new digital threat on the scene that you and your employees need to be aware of. Known as Cryptowall 2.0, it's a wicked virus that has the potential to encrypt and steal your files, making it the scariest thing to hit your front door this Halloween season.

Continue reading
0 Comment

Joomla! Debug Console

Session

Profile Information

Memory Usage

Database Queries