Tag Archives: systems

Understanding Computer Security Dangers in the Digital Wild West

Today, more than ever, criminals are targeting computer systems in an attempt to wreak havoc. Complacency and ignorance, regarding security issues, are computer hacker’s best friends. Computer Repairs Brisbane understands these risks and can help you implement a risk mitigation strategy. Some of the methods used to collect information about a system, network, and its users are: footprinting, scanning, and enumeration.

Footprinting is the methodical gathering of information about a company or individual’s intranet, extranet, internet, and remote access usage. Hackers exploit publicly available information like the name, address, and contact information for the party who registered the domain by using whois services. They harvest employee, vendor, and location details from the company’s website. With an employees first and last names, hackers are often able to guess their usernames. More investigation of the employee on social networks will reveal a date of birth, children, spouses, and pet’s names, home addresses, and phone numbers. Unfortunately, these are the very things that many people use as passwords.

Scanning is the electronic equivalent of casing a home or business for easy access. A burglar will check for unsecured windows and doors. Hackers search for unsecured networks by using ping sweeps, port scanning, and active operating system detection tools. If a hacker can access an unsecured port, they can exploit known vulnerabilities in your operating system or other application software.

Enumeration techniques seek out information about the services running on the network. Cyber criminals use banner grabbing to watch the output from remote applications. Applications like telnet send usernames and passwords across the network in plain text. Given the fact that many people use the same usernames and passwords for access to many different systems, this compromise can be devastating.

These are just a few of the methods used by hackers to document, assess, and attack your systems. Let Computer Repairs Brisbane be your first line of defense. Our technicians have the knowledge and skills to help you protect your network by implementing border protections, intrusion response and detection systems, and will provide you with the information that you need to make informed security policies.

Home Theaters Expand With The Use Of Wireless Technology

Wireless technology has made its’ way into modern home theater systems. From televisions, to video game systems, to surround sound speakers, wireless innovations have expanded the options for consumers to enjoy their music, TV and games through wireless connections. Depending on the type of devices you have, you can extend the reach of your entertainment system far beyond the limits of wired connections.

Listening Options Abound

With the integration of wireless routers into traditional home theater setups, many more devices can now stream and play back through a persons entertainment system. Televisions can connect and display content from the web. Many game systems have WiFi connections that allow players to wirelessly connect to the internet, play games with friends across the world and have it all booming through their wireless speaker system. You can also enjoy digital surround sound, HD video content and Blu ray video through this setup.

It Starts With One Component

At the center of it all is the modern surround sound amplifier / receiver. Imagine sitting on your couch with your smart phone, tablet device or your laptop. You begin playing your favorite song right from any of these devices, through your media center setup with the touch of a button. DLNA (Digital Living Network Alliance) compliant devices allow you to play your music, podcasts or other sounds from anywhere in your home, directly through your home theater. Individual manufacturers have also jumped into the fray. They have begun developing proprietary based standards and systems that allow consumers to connect their mobile devices wirelessly to home media centers for quick and seamless play back.

Wireless Speakers…Really?

That leaves the home theater speakers as one of the final components to take advantage of wireless technology. You can get sound to your rear speakers in your surround sound system without the need to run wires along your floor or under the baseboards. By using a simple wireless transmitter / receiver system, you can have a neat and tidy setup, and still enjoy the richness of surround sound audio. The transmitter is hardwired to your surround sound amplifier. It uses radio frequency (RF) communication to transmit the sound without wires to the receiver device, and the receiver distributes the sound to the left and right rear surround speakers.

Although the rear speakers are connected to the receiver device with short wires, they can be easily tucked away and no one will know how you’ve gotten surround sound without wires showing everywhere.

Summary

It’s clear that wireless technology is here to stay for home theaters. More and more vendors are creating software, devices and systems that will transform the way we enjoy our entertainment. From wireless components to wireless speakers, you can expect to have growing home audio and video options in the years to come.

Understanding Computer Security Dangers in the Digital Wild West

Today, more than ever, criminals are targeting computer systems in an attempt to wreak havoc. Complacency and ignorance, regarding security issues, are computer hacker’s best friends. Computer Repairs Brisbane understands these risks and can help you implement a risk mitigation strategy. Some of the methods used to collect information about a system, network, and its users are: footprinting, scanning, and enumeration.

Footprinting is the methodical gathering of information about a company or individual’s intranet, extranet, internet, and remote access usage. Hackers exploit publicly available information like the name, address, and contact information for the party who registered the domain by using whois services. They harvest employee, vendor, and location details from the company’s website. With an employees first and last names, hackers are often able to guess their usernames. More investigation of the employee on social networks will reveal a date of birth, children, spouses, and pet’s names, home addresses, and phone numbers. Unfortunately, these are the very things that many people use as passwords.

Scanning is the electronic equivalent of casing a home or business for easy access. A burglar will check for unsecured windows and doors. Hackers search for unsecured networks by using ping sweeps, port scanning, and active operating system detection tools. If a hacker can access an unsecured port, they can exploit known vulnerabilities in your operating system or other application software.

Enumeration techniques seek out information about the services running on the network. Cyber criminals use banner grabbing to watch the output from remote applications. Applications like telnet send usernames and passwords across the network in plain text. Given the fact that many people use the same usernames and passwords for access to many different systems, this compromise can be devastating.

These are just a few of the methods used by hackers to document, assess, and attack your systems. Let Computer Repairs Brisbane be your first line of defense. Our technicians have the knowledge and skills to help you protect your network by implementing border protections, intrusion response and detection systems, and will provide you with the information that you need to make informed security policies.