for Technology and Gadget Geeks 

Twitter Gplus Pinterest

for Technology and Gadget Geeks 

Home Articles posted by Vince
formats

Ransomware Gone Wild~

What is ransomware? Ransomware is a subclass of malware that is characterized by holding device control—and therefore locally stored data—for a ransom, which is typically paid using virtual currencies such as Bitcoin. WannaCry, perhaps the most well-known single ransomware attack, uses a flaw in Microsoft’s SMB protocol, leaving any unpatched, internet-connected computer vulnerable to attack.

 
formats

VR ~ AR and Hardy Har Har

  Virtual reality and Augmented reality both are amazing but 👀 perception is where they differ. VR -Virtual reality It transports you out of the current space and puts your presence elsewhere. Here are a few examples: (click the graphic to see more types). Google Cardboard Samsung Gear VR powered by Oculus – (Compatibility- Samsung Galaxy S8, S8+, S7, S7 edge,Note5,

 
formats

2016 – “That’s all folks”

It was a thrilling year for technology with all of it’s ups and downs we had a good run and some great progress in the tech sector.  Crowdfunding gone wild! Here were a few Kickstarters for 2016. Ruggie™ – The World’s Best Alarm Clock Ra: World’s First Strap Light! DOTT: The Smart Dog Tag Enlaps – World

 
formats

Apple and Microsoft’s latest for 2016

The tech giants Apple and Microsoft are at it again with some cool hardware and software integrations. Apple just released 2 versions of the 2016 MacBook Pro with a small second touch screen – called the TouchBar (amazingly similar to the one that came out on the LG V10 smartphone two years ago) shown below- it’s

 
formats

Spring Cleaning …….hashtag #springcleaning

Every now and then you have to clean out a drawer or cabinet to make room for the future. Here are some items I came across this week. IBM Fixed Disk Organizer is a simple menu program for DOS. Using this shell, you will no longer have to repeatedly muddle through DOS commands to get

 
formats

Hacking the Hacker

Every day users log into corporate computers when in the office during business hours and even remotely from home, but when someone logs on at 2am and starts running database queries is it legit or a hacker? Maybe it’s your pimple faced database administrator performing after hours maintenance, but maybe it isn’t. Old school perimeter defenses are no