Archive for February, 2012

Disk Corruption Problems in Mac OS X and Possible Remedies

Disk Corruption Problems in Mac OS X and Possible Remedies

A number of times, you run into problems, wherein the Mac system behaves abruptly and even fails to boot. This normally happens in the event of an abnormal system shutdown, power surge, or forced restart. You may come across any of the below given scenarios while trying to start your Mac OS X system: The […]

Full Story

Google, Facebook Accounts Hacked Notification Scam

Google, Facebook Accounts Hacked Notification Scam

There’s an email purporting to be from a security source, claiming that your email address associated with the following services (Google, Google Wallet, Facebook, Android Phone and Apple iPhone) might have been hacked by “Anonymous”. This is a scam that tries to get recipients to sign up for a bogus credit report to ensure your […]

Full Story

Are The Augmented Reality Glasses Half Empty or Half Full?

Are The Augmented Reality Glasses Half Empty or Half Full?

It remains to be seen whether the augmented reality industry can continue to climb into the collective psyche of the tech world with the aggression it has in the last few years. Some analysts predict exponential growth while others say a leveling off is on the horizon. With the rise of augmented reality apps, browsers, […]

Full Story

Using a CCTV Camera to Ustream

Using a CCTV Camera to Ustream

If you have not heard of a website called Ustream, it is basically a site that allows a user to broadcast live video on the internet.  You can achieve this simply from a CCTV camera that is connected to a DVR.  In this blog post, I’ll be demonstrating how to use an existing camera system […]

Full Story

iPad 3 Coming First Week of March!

iPad 3 Coming First Week of March!

Yesterday, news about a new iPad 3 leaked out from a couple of Chinese web sites.  What I have gathered is that improvements are being made for screen resolutions and camera. There was also a buzz about selling your iPad 2 if you want to get the best price before the release of the iPad […]

Full Story

Lazarus Database to the Rescue

Lazarus Database to the Rescue

“[Expletive deleted - this is a family-friendly show], what happened to my post?” Lazarus to the rescue! The popular Firefox add-on (there is a Chrome version too) keeps a database of your posts so that even if for some reason the site you were posting on “disappears” while you were making your post (like a […]

Full Story

How to Remove Internet Security 2012

How to Remove Internet Security 2012

Internet Security 2012 is a rogue anti-virus and internet firewall program. The rogue program automatically installs itself without the user’s knowledge or consent. Once installed, the user will be alerted with false threats on the computer. These fake security programs are scams that steal money by fooling users into purchasing the software in order to […]

Full Story

Why Yahoo Continues to Fall

Why Yahoo Continues to Fall

Yahoo! at one time the king of search and email, but those days are long gone. The recent executive changes at the top have made no difference. Yahoo continues to struggle and for more than just popularity among users, but functionality. Lately, the problems have escalated to the point that Yahoo has lost control of […]

Full Story

Resurrecting a Virus Variant

Resurrecting a Virus Variant

Many viruses are re-engineered into other versions or variants from the original infection. Many of us feel protected by our security programs, but in all reality, they only protect what’s known. The zero day exploits are viruses that morph into a behemoth of panic and confusion. There’s no sure thing and the only defense is […]

Full Story

Affordable Mobile Phone Scam

Affordable Mobile Phone Scam

There’s an email, claiming to offer affordable mobile phones that directs recipients to a phishing web site that collects personal identifiable information to be used for unlawful activity and identity theft. The link to the malicious web site domain; (wjadserver.com) is well known for spamming and phishing personal information. If you come across an email […]

Full Story