Blog

bva_blackninja-tealbelt

BVA INC – IT Consulting Blog

Since 1993, BVA has delivered the highest quality in serving the IT consulting needs of small- and medium-sized businesses in Arizona and the greater Phoenix area, supporting them in maximizing the value of their information technology investments. We understand the impact that technology and computer networking services has on your business, and we are committed to your success.

Cost of Free Downloads: Sinister Bug Found in uTorrent Apps

A critical vulnerability has been detected in two versions of uTorrent, which is one of the Internet’s most widely used BitTorrent apps. Gaps in the system were discovered by Google Project Zero. According to experts, the vulnerability allows hackers to gain access to downloaded files and download history.

The biggest threat is by malicious sites that could

Best Laptops of 2018

The Best Laptops of 2018

The Lay of the Laptop Land

The market has undergone major changes in the past few years, and there’s likely to be more confusion in the notebook aisle now than at any other time. Today’s models encompass everything from featherweight, business-savvy ultraportables that barely tip the scales at less than 2

The Linux ranger: What is it and how do you use it?

The Linux ranger: What is it and how do you use it?

The Linux ranger is a file manager that works in a terminal window and provides a smooth way to view and edit files.
For those of us who cut our technical teeth on the Unix/Linux command line, the relatively new ranger makes

The Best VPN Services of 2018

“A virtual private network is the best way to stay anonymous online and to secure your web traffic. We’ve tested more than 50 VPNs, and these are our top performers” stated PC Mag’s, Max Eddy. 

 
What Is a VPN?
In the simplest terms, a VPN is used to create a secure, encrypted connection—which

Intel CEO Brian Krzanich

Intel Processors, Dubbed Meltdown!

Well 2018 is off to a big start, unfortunately, not the start Intel was hoping for. Intel disclosed that the design of its processors are flawed. However, the company said that this issue will not affect everyday customers.

“The issue is found in how Intel processors work with page tables for

Keylogger Discovered on HP Laptops

Keylogger discovered on HP Laptops

 

“Keylogger’s are used in IT organizations to troubleshoot technical problems with computers and business networks. They can also be used to monitor the network usage of people without their direct knowledge; they are sometimes used as part of home parental controls. Finally, malicious individuals may use keyloggers on public computers to steal