Google+ August 2019 ~ High Tech House Calls
Expert Computer Consulting for Homes and Small Businesses

Let there be hope...

Life has changed there is no doubt and we wanted to reach out to see how you are doing.

As we go through this interesting time, we are trying to look at this as an opportunity to focus on our family and on friends like you. Let us use this extra time to catch up and talk more. Let us cook food that is not fast, but interesting and satisfying. Let us learn to enjoy a time to try new things. Let us find ways to enjoy time at home!

Computer Security

If my client base is any experience, anyone can be a victim of a Ransomware, Malware or Virus attack.

What can you do about it?

I conduct audits of your entire computer infrastructure and apply best practice solutions to plug the security holes on your computers, Smartphones and networks.

Now offering consultations to give you the best protection possible:


404.229.0839
carlthorne@hthcatlanta.com

Jack of All Trades, Master of Many

Jack of All Trades, and Master of Many

We provide technical support for:


Homes and small businesses

Windows and the Mac OS platform

iPhones and Android Smartphones

Wireless and wired networks

New device setup

Old device upgrade or repair

One-on-one training

Remote assistance


How To Stop Malware

Monday, August 12, 2019

A Quick and Dirty Guide to RAM: What You Need to Know by Gavin Phillips

RAM is the short-term memory of your computer. It’s where your computer keeps track of the programs and data you’re using right now. You probably already know that more RAM is better, but maybe you’re looking to install more RAM now. Shopping for RAM can be confusing, though. What’s the difference between DDR3 and DDR4? DIMM and SO-DIMM? Is there a difference between DRR3-1600 and PC3-12800? Is RAM latency and timing important? Read on for explanations on the different kinds of RAM, how to read RAM specifications, and exactly how RAM works. What Is RAM? RAM stands for Random Access Memory. It acts as a middle ground between the small, super-fast cache in your CPU and the large, super-slow...

The biggest security breaches of 2019, so far By Janet Perez, Komando.com

If you thought the number of data breaches was bad last year, 2019 is looking to be so much worse -- think Capital One. So far this year, billions of consumers' accounts have been breached either through hackers or plain carelessness. But it's important to remember that when it comes to data breaches the number of accounts hacked doesn't always matter. One breach could affect millions but the data is fairly generic, while a smaller breach could contain highly sensitive information. This year, major data breaches have hit medical companies, retailers, social media, and banking and financial firms. We've compiled the following list of major and dangerous breaches, plus we have...

Major Intel security flaw puts PCs at risk - exposing passwords, conversations and more By James Gelinas, Komando.com

Security flaws are one of the most frequently recurring threats in our modern-day digital infrastructure. Unlike malware, security flaws and exploits are products of human error -- and provide a vector of attack for cybercriminals intelligent enough to hone in on them. Because of this, software engineers are constantly on the lookout to address any holes they find with security updates. But when a flaw comes from the hardware side of things rather than software, the threat becomes exponentially more dangerous. When a vulnerability is detected in any piece of hardware, it usually means that all others from the same product line are affected as well. And that's exactly the issue...

Why hackers target small businesses (and what to do to stay safe) By Vince Pontorno, Komando.com

One of the most commonly shared myths among small businesses and their owners is that hackers have no interest in attacking them. That they are simply, "too small to be worth hacking." These assumptions couldn't be more wrong. The reality is, a high percentage of cyberattacks target small businesses. Cybercriminals look for easily accessible, valuable data like credit card details and customer contact info, so the size of the business doesn’t matter. It’s the lack of cybersecurity that makes small businesses so attractive to hackers. Thanks to our sponsor, Dell, we're going to take a closer look at the cyber threats/attacks that small businesses face and how they can best shield...

Pages (14)123456789 Next