Wednesday, April 30, 2014

This Day in Tech History: April 30th

The World Wide Web is Born!World_wide_web

April 30, 1993, www (The World Wide Web) enters the public domain.

CERN, the international particle physics lab developed The World Wide Web.

On this day, WWW technology source code was freely available for anyone to use and without a licensing fee.

They announced the “www” into the public domain.

The first Web browser could run only on one type of computer.  By the end of 1993, Web users around the world set up more than 500 servers to help host it.
The first search engines started to appear in the mid 1990′s.  It didn’t take long for Google to come on the scene and establish a permanent position in the market.
Also this day in Tech History:
  • Microsoft shipped 10 million copies of Windows 3.0.
  • 2006 version 4.10 of the Linux Ubuntu “Warty Warthog” was released.
Discover the World Wide Web in the beginning.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.


Read more: Day in Tech History – Daily Tech History Podcast & Blog 365 Days a Year
Under Creative Commons License: Attribution Share Alike
Follow us: @geekazine on Twitter | geekazine on Facebook

And that’s the way it was: April 30, 1993 – Columbia Journalism Review

Monday, April 28, 2014

Internet Explorer is dangerous for you to use

IE Warning

Hackers have already uncovered the first bug from the Windows XP running out of support, putting users at risk with a zero-day attack.

Now Microsoft has announced that Internet Explorer versions IE 6, IE 7, IE 8, IE 9, IE 10, IE 11, were at risk.

Windows XP is capable of running Internet Explorer 6, 7, and 8.

The vulnerability is being characterized as a “remote code execution vulnerability”.

If you are running IE on your computer quit the browser. Use Firefox as an alternative. Anyone using IE is vulnerable to malicious software being installed onto your computer through the browser to extract data straight from your computer.

A successful attacker who infects a PC running as administrator would have the option to install malware on the system, create accounts under the users name, change or delete data, and alter storage settings on the PC.

The attack is presented by successfully convincing the users to click a link in an email or instant message.
The attacker can execute arbitrary code and take complete control of the system.

Usually when a user is running Windows, their PC is running under an administrator account.

When running IE, you can bulk up your security by going to Internet Options > Security and setting > set to High.

The alert on Saturday from Microsoft is the first to be a serious of issues for users still running Windows XP.  If you haven’t already, experts urge you to upgrade your software to a newer version.

Unfortunately, Microsoft can not patch Windows XP and has not yet issued a patch for IE.

It is suggested for avid IE users to download and install Enhanced Mitigation Experience Toolkit (EMET), a free tool that can help strengthen security on Windows.

EMET must be version 4.1 or higher to prevent an attack using this flaw.

Google Chrome or Mozilla’s Firefox is also suggested to use.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

Critical zero-day endangers all versions of Internet Explorer — and XP isn’t getting a fix

Friday, April 25, 2014

Cisco, Microsoft, VMware, and others unite!


The OpenSSL Heartbleed Bug security issue is open-source’s biggest security breach ever!

Cisco, Microsoft, VMware and other tech giants are forming a new project to fund and support critical elements of the global technology: The Core Infrastructure Initiative (CII).

The purpose of CII is to empower technology companies to help out mission-critical open-source projects that need funding.

The project will receive funds for developers so they can continue work regarding open-source management.
OpenSSL will be the first project under consideration.  In 2013, OpenSSL, which is at the heart of Web security only had $9,000 in funding.

In the past years, OpenSSL received an average of $2,000 per year in donations.  That is definitely not enough to provide adequate research for security.

The multimillion dollar project will be administered by The Linux Foundation and a full-force group made of project backers along with open-source developers and industry stakeholders.

This project will help fund fellowships for key developers to work full-time on open source projects, security audits, computing and test infrastructure, travel, face-to-face meeting coordination along with other needed support.

Open-source development has always produced high quality and secure software.  Although, the Heartbleed Bug resulted in evidence that open source doesn’t guarantee that it won’t have flaws.

This project is to make sure that open-source development doesn’t have to operate on a shoe-string like system.
Colin Kincaid, Cisco’s VP of Product Management and Architecture, said, “Supporting dedicated open source collaborators and contributors is vital to the success and growth of innovation.”
Securing open source software is a critical issue.  It took a major security catastrophe, but now technology’s major company’s have realized that open-source software is a necessary part of global technology.

This is a base that must be supported and help funded.  The result will be a better quality and safer software for everyone.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

Cisco, Microsoft, VMware, and other tech giants unite behind critical open-source projects – ZDNet

Thursday, April 24, 2014

A Day in Tech History: April 24, 1984

On this day, April 24, 1984, thirty years ago Apple introduced the Apple IIc.


The portable computer, weighing at 7 1/2 lbs and featured a 1.023MHz CPU with 128 KB RAM.

It had the same capacity as the standard Apple IIe model.  A 63-key keyboard and 51/4 inch floppy drive.

It was the fourth machine in the Apple  line computers.

The machine cost users $1,295.  That’s a commodity only the fortunate could afford back then.

The Apple IIc had a built-in floppy and peripheral expansion ports.  A closed system with no expansion slots to plug in cards.

They called the Apple IIc, “an appliance computer”, which meant was ready to go when you pulled it out of the box.

Other Evens on this Day in Technology History:
  • IBM introduces first PC (but wouldn’t be released until Aug 12th)
  • Amiga 3000 was announced
  • Cnet/Yahoo deal solidified
  • Google Drive was released

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet, “Like” us on Facebook or add us to your circle on Google+.

Day in Tech History

Wednesday, April 23, 2014

CARBONITE: Why your small business should upgrade


Many small businesses use an Internet connection and that works just fine…in a perfect world.

Businesses are nothing without their data.  The risk of a vulnerability like “Heartbleed” makes it so easy for hackers to access information on your computer even though it is encrypted with the HTTPS protocol.

Carbonite’s survey shows that, from saving time and money to utilizing new technologies to streamlining operations, employing cloud solutions greatly benefits small businesses.

The cloud provides:

  • Stronger security – A dedicated Ethernet connection offers more security from connecting your business directly to your cloud resources.  Data transfers with SSL encryption and is stored with AES-256 encryption server-side.

  • Reliability – An Ethernet connection offers reliable service with better performance than the public Internet.  Your backup is configured automatically and your files are saved.

  • Reduced risk –   Ethernet gives you improved security that reduces the risk of potential liability.  The Carbonite Appliance removes duplicate copies opening up storage space and reduces your bandwidth.

  • Backup – Backing up to the cloud protects all your important files, protecting you from computer crashes or even theft.  You can customize  your backup, monitor, manage and delete storage as you see fit.

  • Virus protection – Computer viruses allow others to access your data and possibly take control of your computer.   Physical, technical, and administrative safeguards are placed to ensure the confidentiality and security of your data.

  • Recovery – In any disastrous situation you have access to recover your files and even have it shipped to your door.  You can recover your data to a new or existing hardware by using the adaptive restore feature.

If you are still not sure why you should switch to Carbonite, this Infographic might help you decide.


If you are ready for the cloud or if you need more information on how the cloud can help your small business, we can help.  619-325-0990

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

Infographic provided by:
Commissioned by PCW Content Words

Monday, April 21, 2014

19 year old uses Heartbleed Bug to attack Canadian taxpayers


The Canada Revenue Agency reported that  900 taxpayers data was stolen by a 19 year old, using the Heartbleed Bug.

Stephen Arthuro Solis-Reyes, of London, Ontario, used the Heartbleed Bug to steal information from the Canada Revenue Agency’s website.  Solis-Reyes was arrested on Tuesday, facing one count of unauthorized use of a computer and one count of “mischief in relation to data.”

The CRA (Canadian Revenue Agency), is one of the first victims to report a Heartbleed attack.

The vulnerability had been used to steal the Social Insurance Numbers of nearly 900 people.

When the attack was discovered, the agency halted online filing of tax returns.

Social Insurance Numbers are required to work or get government benefits in Canada.

Heartbleed lets attacks capture data from server memory 64KB at a time.  This puts passwords, encryption keys and other data at risk.

The Heartbleed Bug lived in the Web encryption tool OpenSSL (Secure Sockets Layer) for about two years before it was exposed last week.

The RCMP arrested Solis-Reyes after a few days of investigation.  The residence of Solis-Reyes was searched and his computer equipment was seized.

The investigation continues and the agency said in a press release, Solis-Reyes is scheduled to appear in court in Ottawa on July 17.


Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.


Teen arrested in Heartbleed attack against Canadian tax site – Info World Security Central…

Friday, April 18, 2014

CARBONITE: Access your files anywhere, anytime


Carbonite, Inc.,  is a leading provider of cloud solutions.  It keeps businesses and home offices running smoothly with backup and recovery solutions.

Carbonite’s implementation of administrative, physical, and technical safeguards help ensure confidentiality, integrity, and availability.

So what exactly is Carbonite you ask?

Cloud computing is a data center that keeps your files safe while allowing them to be accessible from anywhere in real time.

Instead of backing up your photos and files on external hard drives, cloud backup sends your data to a secure, offsite storage facility.

Accessing your files

  • Anytime Anywhere Access allows you to download any file to any Internet-connected compute
  • Download files from your backup using Anywhere Access without removing them from your Carbonite backup
  • View your backed up data and restoring files/folders through the web interface
  • With private encryption key, Anytime Anywhere Access is disabled from the computer

Anytime Anywhere Access is intended to be used to perform small restores.  Restore all data by installing Carbonite on your computer through the Restore Manager.


Why Carbonite?

Computer files, invoices, records, and contacts are important to a business.  Loosing them could be detrimental to a businesses performance.

We often are mislead to believe that since your file is saved to your computer, it is safe.  Those files can still be lost or damaged at any time.

With Carbonite, you no longer have to worry about protecting your files, Carbonite does that for you.
You will get:  comprehensive suites, affordable services, and secure data protection, with recovery and anytime accessibility.

Carbonite’s support is at the top of list of competitors with database backup technology.  These Server Plans are sure to meet all your backup needs.


For more information on Carbonite and how it can help your small business call 619-325-0990.  Hyphenet knows it is mandatory for our IT group to not only make sure you have the right technology to suit your computer needs, but possess the knowledge required to support it.

 Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.



Healthcare Organizations Turn to Carbonite’s Secure Cloud Backup Solutions for HIPAA Compliance…

Carbonite, Inc. to Report 2014 First Quarter Financial Results on April 29, 2014…

Tuesday, April 15, 2014

IBM extends disaster recovery for SoftLayer users

IBM Corp. announced on Monday that SoftLayer clients will have a set of cloud-capabilities and services that would secure company assets and maintain continuous business operations.

IBM has helped more than 20,000 clients worldwide to transform their business.


Now they are taking those skills and support to the fast growing SoftLayer customer-base, providing all services needed to ‘guarantee’ ongoing operations.

They will also prevent outages, offer quick recovery from disaster, and provide analytics and threat protection of IBM security services.

Market opportunity for business continuity/disaster recovery is anticipated to grow to $32 billion by 2015.  As a leader for more than 50 years, IBM has met their commitments to clients during hurricane disasters and other catastrophes.

SoftLayer customers will have access to IBM’s Cloud Virtualized Server Recovery (VSR) managed service.  This offers low-cost automation that helps enterprises recover critical applications, servers, and cloud-based data.

IBM’s Resiliency Consulting Services will be extended to their SoftLayer clients.  The services integrate IT environments with a private cloud-based data in the event of a disaster.  This helps with resiliency assessment, planning and design, and implementation and testing.

The VSR, SoftLayer business will be able to duplicate entire system files, databases and applications.


Included are; cloud managed backup, cloud data virtualization, cloud application resiliency and cloud virtualized server recovery.

According to IBM’s 2013 Chief Information Security Officer (CISO) study, 70 percent of CISOs are concerned with cloud and mobile security.

With refined targeted attacks on the rise, less than 2 percent of breaches are detected in the first 24 hours and less than 46 percent within 30 days.

These services offer threat management for firewall and intrusion detection, and also prevention management and monitoring services for SoftLayer customers.

Customers can benefit from IBM’s security operations and intelligence operations with intelligence analysts who help identify threats.

Tracking incidents and data collection pinpoint potential vulnerabilities that end safeguard business operations.

Cloud service capabilities that integrate with on premise security equipment, which in the end enable customers to quickly obtain an integrated view of their overall Enterprise IT security.

At the end of the year, IBM will offer increased security services for SoftLayer customers including heightened distributed denial of service (DDoS) protection, Web and email protection and managed endpoint protection.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.


IBM extends disaster recovery, security services to SoftLayer users – CTR Computer Technology Review

Friday, April 11, 2014

What is Heartbleed and what you can do about it.


The Heartbleed Bug is a vulnerability in the OpenSSL cryptographic software library.

This allows stealing from protected information by the SSL/TLS encryption used to secure the Internet.
SSL/TLS provides communication security and privacy for email, instant messaging (IM), web, and virtual private networks (VPNs).

The Heartbleed bug gives access to anyone that intends to read the memory over the Internet of systems protected by the vulnerable versions of the OpenSSL software.

Secret keys are compromised that are used to verify encrypted traffic, including names, passwords, and private information of the users content.


What to do about the leak

Affected sites include: Google, Gmail, YouTube, Facebook, Tumblr, Yahoo and Dropbox.  If you use any of these sites, it if strongly recommended for you to change your passwords immediately.

If you are running a vulnerable version of OpenSSL, you are at risk.  Fixed OpenSSL has been released and is deploy-able.

If you use password protection sites that hold all your passwords in a single place like LastPass, please update your passwords there as well.

Attackers are able to eavesdrop on communications and easily steal data.  User-ids, passwords, credit-card numbers, and everything you place online is open for hackers to access.

Google told MailOnline: “The security of our users’ information is a top priority.  We fixed this bug early and Google users do not need to change their passwords.’

While some experts are advising users to change all their passwords across every site they have an account for.


CNet has an updated list, Heartbleed bug: Check which sites have been patched, for the 100 most popular Web sites.

When creating passwords, always use the two-factor authentication.  The extra step is tremendously safe and worth it.

You can also follow these steps to clear your browsers’ cache, cookies, and history:
  • In the browser bar, enter: chrome://settings/clearBrowserData
  • Select the items you want to clear. For example, Clear browsing history, Clear download history, Empty the cache, Delete cookies and other site and plug-in data.
  • From the Tools or History menu, select Clear Recent History.
  • From the Time range to clear: On the drop-down menu, select the desired range; to clear your entire cache, select Everything.
  • Click the down arrow next to “Details” to choose which elements of the history to clear. Click Clear Now.
Internet Explorer 9 and higher:
  • Go to Tools (via the Gear Icon) > Safety > Delete browsing history….
  • Once there, choose to delete Preserve Favorites website data, temporary Internet files, and cookies.
There is no quick fix for Heartbleed, take time and change your passwords.  That is the best preventative measure you can take.

You can check a website here to see if they’ve patched the hole.

If you are still unsure on what to do, give us a call today! Don’t go through the weekend not knowing if your are secure or not, call 619-325-0990.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

How to protect yourself in Heartbleed’s aftershocks – ZDNet…
How to recover from Heartbleed – ZDNet…
The Heartbleed Bug – Heartbleed
Heartbleed was an accident: Developer confesses to causing coding error and admits its effect is ‘clearly severe’ – Mail Online…

Thursday, April 10, 2014

Close the divide between your IT department and end user.

Technology is always changing, which leaves uncertainty in the workplace in the forever advancing industry.

It is important to keep the office as connected as possible.  Keep employees informed to whats going on with the business and they will see how they are the lifeline to the businesses success.


End users and IT departments often see systems in different ways, which causes tension.  End users want a simple online app where users can chat or use voice-mail.

IT sees back-end integration work, backup, security, device compatibility, and many other “invisible” functions that must be thought of when building an app.

Timelines and expectations will differ, depending on who you are and which side on the end user/IT divide you sit on.

Here are a few steps to take to gap the bridge between end users and your IT department:bridge-employees-itdepartment

1. Know the business

If you understand the business from a business perspective, you will have first-hand knowledge of how the business works.  Departments tend to focus on their role and forget how they are really working as a whole.

2. Form alliances with key end users

By forming relationships, successful application development and deployment are nurtured.  With open communication, it is easier to ask questions and give honest feedback in development.

3. Talk less and listen more

Listen and be responsive, application developers aspire to be great, but often have tunnel vision when on to something good.  By listening to input from co-workers, they can get a better understanding of their progress.

4. Arrogance is ignorance

End users love technology but may not understand it very well.  IT professionals need to leave out jargon when in meetings, sticking to the business and purpose of the app.  When acronyms are used by IT that end users don’t understand, a barrier of communication takes over.  Less collaboration for the app are likely the result.

5. Understand the process

The IT department sometimes start building an app without understanding the business workflow.  Application developers should spend time with the end user, observing business operations and goals.

6. Understand the business

It may be surprising that IT developers have never taken a business course.  It is important for them to know how the business runs and how technology affects performance of the company.

7. Read the corporate financials

If employees at a business know how the business is doing, it will give employees appreciation for what the company is and how they are involved.  Employees that know the businesses financials and the status of the company, apply themselves with more dedication.

8. Be service oriented

Analysts and application developers who succeed are the ones who understand the value of the business and the people they work for.  When people know they are relied on, they feel more important and put more effort into their performance.

9. Check back

Check with end users to see if they are having issues or problems with application deployment.  Ensure that end-user training on the new app is part of your application deployment.

10. Look for ways to fix whats wrong

When finding out there is an issue, work immediately on fixing the problem.  Pilot testing and other test techniques are ways to eliminate end-user pain.

With a company working as a team instead of a single unit will ensure successful development.  Have company meetings and involve the staff with whats going on, on a regular basis.

Comradery within a company between departments is something businesses often fail to be mindful of.  Talk to your employees, make sure they understand the ins-and-outs of the business and how they can work together, as a team.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

10 things to help you bridge the IT/end user divide – Tech Republic

Wednesday, April 9, 2014

Microsoft drops Windows XP, protect yourself now!

Microsoft has ended support for Windows XP, if you are still running XP on your system, know that you are exposed and outdated.
The 12 year old operating system will no longer provide security updates that patch holes in the software.
Hackers attempt to find the bugs in XP and exploit them freely.

You have been warned!

Running Windows XP isn’t solely dangerous to your own computer but it threatens all devices that still running and attached to it.

It’s estimated that 95% of bank ATM’s run on XP.  GE (GE,Fortune 500) Intelligent Platforms discovered 75% of its utility customers are still using it.

Cybersecurity provider Cylance said one of its major hospital clients run XP and has more than 100,000 devices.  This includes computers that hold patient records.

Upgrade Now

You always want to make sure the software running on your computer has support and is receiving updates.
Running Windows 7 and Windows 8 are six times safer for your computer than Windows XP.


If you have Windows XP installed on your computer, it won’t stop working.  XP will potentially leave the door open to your computer being infected and your personal information stolen, but it will still work.

Don’t be naive and think it won’t happen to you.

If you have an issue with your computer and XP is running on it, best of luck finding someone to help fix your issue.  Companies will not touch your system until your software is upgraded.

By remotely accessing your computer that is running on XP, you are hazardous to anyone or anything that touches it.

The core OS will be vulnerable without Microsoft’s backing, hackers and malware writers are having a field day exploiting your compromised PC.

Look at the video below from C|Net and take action today!  Call us at 619-325-0990 or visit

Click here to view a video from C|Net about the ending of Windows XP.

Most large and midsized companies throughout the world are aware that Windows XP is ending support but still have not upgraded.

Hyphenet can help you upgrade your software, chances are if you are still running the old software, you may need to upgrade your PC as well.

Newer PC’s already come with Windows 7.  Knock out two birds with one stone and secure your personal accounts now!

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

Microsoft drops Windows XP support – CNN Money
Microsoft to Windows XP users: The jig is up – C|Net

Friday, April 4, 2014

What is Cloud Computing and why does your small business need it?

Cloud computing is a way to increase capabilities on the fly without investing in a new infrastructure, training new personnel, or licensing new software.

Small businesses benefit from Cloud computing by not having to deploy physical infrastructure like file and e-mail servers, storage systems or shrink-wrapped software.

Cloud computing is a broad umbrella that includes Software-as-a-Service where a specific application or service is offered to a customer as a subscription.  Dropbox,, and QuickBooks are all examples of SaaS.

SaaS provides a way of delivering a host of software and technical services that would usually be cost-prohibitive and difficult to manage as on-premise, local solutions.

Cloud computing has come a long way and is now mainstream technology for businesses.

The cloud does for IT as UPS and Federal Express did for the shipping industry.

Cloud computing capabilities deliver a plethora of network technology.

Small businesses are most likely to not have an IT staff or technical in-house expert.  Some companies don’t even know how to ask about their company’s tech infrastructure.

Joining the cloud can help reduce these stress of all the IT stuff.



In The Cloud

The different types of models of cloud are: Public, private, community and hybrid.
  • Public cloud is available to the general public over the Internet.  It’s a “game changer” for small businesses and gives them access to enterprise-level applications.
  • Private cloud is within a corporate firewall.  It is reserved for larger companies that have their own IT staff and data centers.
  • Community cloud is shared between different organizations.  It’s a multi-tenant infrastructure with a pay-as-you-go billing structure.
  • Hybrid cloud is a combination of the three.  This cloud addresses configuration management, change control, security and budgeting.
SaaS (Software as a Service) is predominantly used for office productivity like email, work processing, number crunching, and online file sharing.

IaaS (Infrastructure as a Service) functions like storage and computing.  It is used to store intellectual property like documents, drawings, applications and code proprietary to a business.

PaaS (Platform as a Service) is used to develop and run a website in the cloud or build applications.
There is a huge opportunity for growth of a small business when using cloud services.


Cloud computing encompasses subscription-based or pay-per-use service, that in real time or over the Internet, extends IT’s existing capabilities.

Cloud computing is still at an early stage, with a crew of providers large and small.  It delivers not only cloud-based services from storage to spam filtering but presents a utility-style infrastructure for your business.

Contact Hyphenet today to learn more about how to take your small business to the cloud.  619-325-0990

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

What Is The Cloud? (And Why Small Businesses Need To Care) – HuffingtonPost
What cloud computing really means – Infoworld,1
20 Top Cloud Services for Small Businesses – PC Magazine,2817,2361500,00.asp