About ITServices Admin

This author has not yet filled in any details.
So far ITServices Admin has created 43 blog entries.

Ransomware: Protection and Recovery

Ransomware, the breed a malicious software that takes your computer hostage by encrypting files and demanding a ransom payment to unlock them, continues to be the scourge of computer networks everywhere. In the past month, ransomware attacks were carried out on a massive scale, including attacks on the Colorado Department of Transportation and the City […]

Meltdown and Spectre

Last week, the technology world was shaken by the announcement of two flaws that reach deeply into modern computer architecture and affect just about every operating system and device in use now.

The two flaws, named Meltdown and Spectre, are both caused by the way the hardware processor interacts with the operating system on every device. […]

Local Admin Blues

One of the most prevalent security risks we encounter is setting users to be local administrators on their workstations. This is usually set up because some important software application requires it, or users need the ability to make certain changes to their workstations – like changing wifi networks or adding printers.

While setting a user as […]

New Ransomware Strain

This week in Security News, a new ransomware called Bad Rabbit has been infecting networks in Russia, Asia, and Europe since yesterday. Some infections in the US have also been reported. So far it’s not spreading nearly as quickly as WannaCry and Petya, fortunately.

Here are the important bits:

It seems to be infecting computers by […]

Serious Wifi Flaw Discovered

A new and serious flaw with wireless networking was announced this morning. We are waiting for companies to provide patches to fix the security risk, and will update the wifi system as soon as they are available. Once the network has been patched, we will send out an email to let everyone know.

What is it? […]

5 Best Security Practices

Know you weaknesses

The first step to good security on your computer is to know where your weaknesses are and hot to correct them or fix any of the damage they might have caused. There are many avenues that can cause weaknesses including unused services on your computer that can still connect to the internet […]

Creating Good Passwords

Protecting everything you lock with a good password is when you use length and complexity (mix of letters, numbers, symbols, and capitals). A six character password has been shown to be able to be cracked in under 13 minutes, but even a ten character password would  currently take 900 years to crack with our latest […]

The Changing Face of Security Threats

In today’s day and age, we find ourselves the subject of digital attack. As the time has changed technology from room sized computers doing math to the world in your hand held device, so has time changed the people and the technique they use to exploit these advancements. We used to have greasy hackers in […]

Make a bootable USB flash drive to wipe an old hard drive

Make a bootable USB flash drive to wipe an old hard drive
To use a USB to wipe an old hard drive on a Windows PC:

Download the DBAN *.iso image from http://www.dban.org/download.
Insert a USB flash drive with 32MB+ available space.
Download the Universal USB-Installer, which converts the *.iso image to USB flash http://www.pendrivelinux.com/downloads/Universal-USB-Installer/Universal-USB-Installer-
Run […]

How to take a screenshot on your Mac

How to take a screenshot on your Mac
To take a screenshot of your whole screen:

Press Command (⌘)-Shift-3.

Find the screenshot as a .png file on your desktop.

You can take screenshots of your whole screen or just part of it. Screenshots are saved automatically as .png files on your desktop.

To take a screenshot of part of your […]