Author Archives: mmessier

Phishing gets more dangerous for 2016

In January, Wombat Security Technologies released its 2016 State of the Phish report, detailing the current phishing landscape. The research report found that, while these phishing attacks are growing in sheer number, they are also growing in their complexity based … Continue reading

Posted in Open Discussions | Leave a comment

Running legacy web apps on Windows 10

Microsoft Edge, Windows 10’s new default web browser, doesn’t support ActiveX, DirectX filters, VML vector graphics, or VBScript. But upgrading to Windows 10 doesn’t mean your organization’s legacy web apps won’t work. To ensure that Windows 10 was compatible with … Continue reading

Posted in New Technical | Leave a comment

Free tools for managing partitions

Most modern operating systems contain built-in tools for creating, deleting, or resizing partitions. But many users find that third-party tools make these types of tasks easier, since such tools might not have the same limitations as a native partition management … Continue reading

Posted in New Technical | Leave a comment

How to block Windows 10 upgrade

Microsoft has published detailed instructions on how to stop your computer from trying to upgrade itself to Windows 10. The walkthrough will allow IT admins both to opt out of the automatic upgrade to Windows 10 and disable the Get … Continue reading

Posted in New Technical | Leave a comment

Monitors that go beyond Task Manager

Sometimes when a Windows system becomes unresponsive, the Task Manager is often the go-to tool for figuring out the problem. But as helpful as the Task Manager can be for tracking down the offending process, a number of other tools … Continue reading

Posted in New Technical | Leave a comment

Underground Hacker Economy is Booming

Dell SecureWorks published in November 2013 the results of a remarkable project taken on by its Counter Threat Unit (CTU) Director of Malware Research Joe Stewart and independent Network Security Analyst David Shear: The Underground Hacking Economy is Alive and … Continue reading

Posted in New Technical | Leave a comment

Data recovery tools that could save the day

There are a lot of ways to lose critical data — like hardware failure, an OS crash, a user error, or a malicious attack. If it happens to you, one of these tools may help you get that data back. … Continue reading

Posted in New Technical | 1 Comment

Expect massive spikes in global security threats for 2015

Increases of global information security threats remain as much a certainty as death and taxes, at least according to the latest Information Security Survey from PWC. That report, which was published in October, highlights several troublesome trends and provides valuable … Continue reading

Posted in Open Discussions | Leave a comment

Five apps for House Cleaning your systems

All systems, be they desktops, laptops, smartphones, or tablets need a little cleaning now and then. Sometimes the cleaning is just a simple riding various caches or deleting unwanted files. Other times, the cleaning is deeper and more involved. No … Continue reading

Posted in New Technical | Leave a comment

Five Free web-based apps for Real-time graphs

Creating graphs is easy — grab your favorite spreadsheet program, enter some data, and use the chart wizard. What’s more difficult is creating those graphs to be published on the web based on dynamic data. Plenty of options are available … Continue reading

Posted in New Technical | Leave a comment