Apple products have become very popular and many people have more than iPhone, or iPad, or iPod. Now when you have more than one of these devices you want them all setup to your icloud device. First you must sign into your iCloud account using your Apple ID, then turn on the iCloud features you want to use. You can setup multiple device easily by going to this site http://www.apple.com/icloud/setup/ and then you may need to download the icloud app depending on if your using a windows machine or not. Once you have configured iCloud it will be begin pushing information to each device.
If you’re a laptop user and have a setup with multiple monitors, there is a docking station that allows you connect two monitors on the back of the dock, your Ethernet port, and even sound, then you just plug the usb cable into your laptop, no more plugging in the monitor, Ethernet, mouse, keyboard ect… just plug all of that into your dock and then plug the one usb cable from the dock to your laptop and your set. The dock comes with a display software that will need to be installed once so you extra monitors work, then you just have to make sure they are in the correct order.
The first Stream Machine made by Alienware called Alpha will be available sometime in November. The interesting thing is that this will have a Windows 8.1 platform for the OS. The Alpha looks very similar to other game consoles and will come with a bundled xbox 360 wireless gamepad. The Alienware people have created their own interface so you don’t see the windows 8 metro interface, though you have the option to boot to that desktop if you want. This device will sell for $550, has a dual core i3, 4gb of ram and a 500gb hard drive. This is a very expensive game console used to play PC ports of game consoles.
Microsoft released nine security updates on Tuesday, 2 critical and seven regular updates to correct security flaws. On the second Tuesday of every month they release updates they call “Update Tuesday”, instead of waiting months and releasing a bundle of security updates they found the frequent updates more helpful to their customers. MS14-051 and MS14-043 are labeled as critical updates and should be updated immediately. Both updates protect the user from RCE (remote code execution). For more information on the rest of the updates please click on this link.
Follow these six steps to ensure you are protecting your business’ websites. The First step is create an active sponsorship by having teams within the IT department collaborate to ensure the best security. The second step is enforcing and defining the security application process. The third step is developer training, to ensure secure coding is being put into place. The fourth step is to be one step ahead of potential attacks by understanding who would want to corrupt your site and steal your information. The fifth step is to make sure you are doing consistent security tests to ensure your site is tough enough to thwart a hacker. Lastly step six blocks attacks by using WAFs (Web Application Firewalls) that block incoming attacks such as cross-site scripting. If you enforce these six steps you will successfully avoid web application breaches.
According to an article on Networkworld.com, OpenSSL received nine updates to fix flawed software. These updates are after news broke in April that a “heartbleed” had been detected. The “heartbleed” was a very critical concern because hackers could get access to passwords as well as private SSL/TLS keys. These security updates are said to prevent SSL from crashing, leaking information and loss of large amounts of memory. This discovery has been a huge wake up call to be more alert of security flaws and start open-source projects. For more information on this article click on this link.
Research done by Jacob Holcomb, a security analyst at Baltimore-based Independent Security Evaluators, on NAS (Network Attached Storage) devices. He found that fifty percent of these devices could be compromised without authentication. He was able to take over every devise, which tells me that the security features on these NAS devices are not very strong. If you are concerned about security breaches then you are better off using a home router. For More information on this article click on this link.
On August 7th Microsoft announced that IE (Internet Explorer) will no longer be allowing out of date ActiveX plugins to update on your computer, as of next week once the updates have been made on Windows 7 & 8. According to NetWorkWorld.com the browser will show a notification when an old out of date ActiveX control tries to update your computer. This new modification to IE 7 & 8 is to catch up on security flaw to prevent your computer from malicious or compromised software. To learn more click on this link.
AirParrot – AirPlay mirror your Mac or PC’s Screen to your Apple TV wirelessly | BVA INC. emPowering Your IT
For those of you with an AppleTV, one of the key features of the device is to stream a MacBook screen to the TV, wirelessly. Natively the newer MacBooks do this with built in airplay, however some of the older MacBooks lack this feature and of course Windows PC does not have the feature at all. However with AirParrot installed both the old MacBooks and Windows machine can use AirPlay. You can also stream audio using this software as well. AirParrot makes presentations easy and simple. To get this to work you need an AppleTV (2nd or 3rd generation), Mac or PC, and using wifi or Ethernet for the connection.
When talking about Business Class wireless routers most businesses are looking for security, remote access and scalability. Many business routers don’t come with built in wireless capabilities, however you can simply add wireless access points. Business class routers generally feature: VPN, support SSL portal and SSL tunnel VPNs, virtual networks, DMZ port, content filtering, and wireless distribution. For a small business consider the Cisco RV220W Wireless Network Security Firewall. This devices has a gigabit connection, including 4-port switch, built in high speed dual band wireless N access point, SSL VPN for remote access, and a browser based device manager.