Computer Service / Network Integration / Performance Tuning

Chuck Norris Says Change Your Router Password… or He’ll Kick Your Butt

Recently, a new botnet (group of devices working together to attack or distribute infections to other systems) was discovered infecting everyday routers as well as enterprise routers worldwide.  This cleverly crafted infestation attacks even Linus-based devices.  Egads!  How is this possible?  Isn’t Linux immune to infection? Not if you don’t change the default username and Continue Reading

Facebook Infections Continue

Several times a day we get people bringing in badly infected computers with the current variety of the Fake Antivirus family of Trojan Horse bug in circulation.  These infections are all the same, look similar in spite of having different names (because they’re all created with the same toolbox) – and have the same goal: Continue Reading

Are You A Victim of (or a Participant in) Software Piracy?

We have seen a growing number of computers coming into our shop that have been serviced by other shops or unaffiliated independent technicians where the computer contains pirated software / Operating Systems.  This has been done without the owner’s knowledge or consent — but that does not make them innocent of the crime. We had Continue Reading

Search Engine Infections on the Rise

The bulk of the Fake Antivirus infections making up the viral epidemic spreading like wildfire since June of 2008, had been coming from Facebook and Myspace web pages until recently.  Lately, we have seen a shift in the source of infection to web search results.  Both Google and Yahoo searches have been bringing up infected Continue Reading

Protecting your Mobile Phone

Mobile phone hacking (like tapping a landline) is becoming so easy it is (or at least should be) incredibly frightening.  Stay tuned to our blog for a lot more information on this topic in the very near future as we assemble all the critical information.  Meanwhile, to protect yourself from falling prey to someone who Continue Reading


We are occasionally approached to assist with the gathering of evidence via keyloggers (usually incorrectly referred to as Spyware) by individuals hoping to gather information about a spouse’s activity. We always decline these offers, as it is illegal to do so. Refer to the following excerpts from the Texas Penal Code: TPC § 16.02. Unlawful Continue Reading

Facebook Security Warning

We’ve been telling people this for over a year, even published a security bulletin from AVG to this effect, but apparently never published an actual warning regarding the real risks associated with using Facebook (and MySpace). Both of these Social Networking sites have been under attack since May 2008 by criminals intent on extorting money Continue Reading