Our Blog.

Interesting, hopefully, facts for computer and technology curious people

Conflicting anti-virus.

post-image

Don't do this.
A customer complained because her laptop was very slow. Beside the fact that it is old and under-powered, I found installed:.
McAfee Security Scan Plus.
McAfee Web Advisor.
Avast.
Hotspot Shield.
Pc Protect.
Pc Accelerate.
Pc Keeper.
Driver Updater.
Most of these software are completely useless, when not dangerous, and if you believe that using 3 or 4 antivirus software is better than one, you are completely wrong. These software fight to each other and the result is a terribly slow computer. Trust a computer professional. In the long run it will cost you less than fixing the mess you self-created or the need for a new computer...

Sex scam ranswomware.
Do not fall for this.

post-image

DO NOT PANIC if you received an email like this. YES, it contains your name and your real password that you used. How is that possible ?
In the past an absolutely legit web site containing this exact email address and password was hacked. In my case I suspect Adobe or Barnes & Noble, nothing related to porn site.
These information are now available on the black market and someone is trying to blackmail me, and maybe is doing the same with you.
Do not fall for this. This is a scam.
What is important is that you:
1 Immediately change your password everywhere, if you are still using that one.
2 Do not use the same user and password for multiple sites.
Also do not store your password list in a folder on your computer called password list, do not use your spouse name, or favorite sport team or 123456 as a password.
2A Solve can help you, and advice, unless you really...

SIM hijacking, the new frightening frontier of cyber crime.

post-image

SIM hijacking, or SIM swapping, is essentially the process of hackers activating your phone number onto a SIM card of their possession. The process helps them take over your phone number, so next time someone tries to access one of your online account, the cybercriminals are the ones receiving the verification passcode instead of you. This is usually effective when someone wants to reset your password or already knows your password and wants to go through the 2 step verification process. And this can have a devastating domino effect. Watch this video by and about Matthew Miller, ZDNet collaborator. Call 2A Solve at (845) 264-9920 to know more about this and how to protect yourself.
Zdnet

Computer latency for humans.

post-image

If I tell you that each core of a server, based on the Intel Xeon processor E5 v4 family, might perform 2.4 billion clock ticks and might execute many times that number of instructions in the second or so that it takes to read and register this post, would you be able to grasp the sense of this speed ? I am not.

So let's try to scale this unimaginable speed to something that we, the humans, can perceive and understand.

In the computer chain, cpu is the fastest element, followed by cache, then memory and so on. But how how really fast, or slow, is every item of the chain ?

Let's assume that one cpu cycle is equal to 1 second of our lives. Then look at the attached table.

System EventActual Latency ----------------> Scaled Latency
One CPU cycle 0.4 ns --------------------------> 1 s
Level 1 cache access 0.9 ns ------------------>2 s
Level 2 cache access 2.8 ns ------------------> 7 s
Level 3 cache access 28 ns -------------------> 1 min
Main memory access (DDR DIMM) ~100 ns ------> 4 min
Intel Optane memory access <10 ?s ----------------> 7 hrs
NVMe SSD I/O ~25 ?s --------------------------> 17 hrs
SSD I/O 50-150 ?s -------------------------------> 1.5-4 days
Rotational disk I/O 1-10 ms -----------------> 1-9 months
Web page call: San Francisco to New York City 65 ms --> 5 years
Web page call: San Francisco to Hong Kong 141 ms ----> 11 years

Credits: David Jeppesen from Prowess Consulting, who cites the work of performance architect and author Brendan Gregg, "Systems Performance: Enterprise and the Cloud".