Our Blog.

Interesting, hopefully, facts for computer and technology curious people

Password, password, password

post-image

I hope that you already heard about this, but just in case...
Do not use 123456, 2580, password, qwerty, abc123, your birth date and other easy to guess strings of characters as a password for your computer or smartphone.
Do not reuse the same password on multiple web sites, hacked once you will be hacked everywhere.
Do not store your passwords in a file called password.doc or.xls or txt on your computer desktop (nor anywhere else).
Use different passwords for different services and be creative. Use a mix of letters, numbers and special characters, lower and capital cases.
At least you might want to create a sort of master password and add something special to differentiate between the different services. i.e. use masterpassword and add the colors of the service: bluemasterpasswordwhite for Facebook, blackmasterpasswordred for Netflix and so on.
Avoid saving passwords in the browser.
It requires a minimum effort to reveal all of them in case you lose your computer or it is stolen.
Last and most probably best option, use a password manager.
But not just any password manager.
Many are available today. Choose one carefully.
We will talk about this next time....

Conflicting anti-virus.

post-image

Don't do this.
A customer complained because her laptop was very slow. Beside the fact that it is old and under-powered, I found installed:.
McAfee Security Scan Plus.
McAfee Web Advisor.
Avast.
Hotspot Shield.
Pc Protect.
Pc Accelerate.
Pc Keeper.
Driver Updater.
Most of these software are completely useless, when not dangerous, and if you believe that using 3 or 4 antivirus software is better than one, you are completely wrong. These software fight to each other and the result is a terribly slow computer. Trust a computer professional. In the long run it will cost you less than fixing the mess you self-created or the need for a new computer...

Sex scam ranswomware.
Do not fall for this.

post-image

DO NOT PANIC if you received an email like this. YES, it contains your name and your real password that you used. How is that possible ?
In the past an absolutely legit web site containing this exact email address and password was hacked. In my case I suspect Adobe or Barnes & Noble, nothing related to porn site.
These information are now available on the black market and someone is trying to blackmail me, and maybe is doing the same with you.
Do not fall for this. This is a scam.
What is important is that you:
1 Immediately change your password everywhere, if you are still using that one.
2 Do not use the same user and password for multiple sites.
Also do not store your password list in a folder on your computer called password list, do not use your spouse name, or favorite sport team or 123456 as a password.
2A Solve can help you, and advice, unless you really...

SIM hijacking, the new frightening frontier of cyber crime.

post-image

SIM hijacking, or SIM swapping, is essentially the process of hackers activating your phone number onto a SIM card of their possession. The process helps them take over your phone number, so next time someone tries to access one of your online account, the cybercriminals are the ones receiving the verification passcode instead of you. This is usually effective when someone wants to reset your password or already knows your password and wants to go through the 2 step verification process. And this can have a devastating domino effect. Watch this video by and about Matthew Miller, ZDNet collaborator. Call 2A Solve at (845) 264-9920 to know more about this and how to protect yourself.
Zdnet

Computer latency for humans.

post-image

If I tell you that each core of a server, based on the Intel Xeon processor E5 v4 family, might perform 2.4 billion clock ticks and might execute many times that number of instructions in the second or so that it takes to read and register this post, would you be able to grasp the sense of this speed ? I am not.

So let's try to scale this unimaginable speed to something that we, the humans, can perceive and understand.

In the computer chain, cpu is the fastest element, followed by cache, then memory and so on. But how how really fast, or slow, is every item of the chain ?

Let's assume that one cpu cycle is equal to 1 second of our lives. Then look at the attached table.

System EventActual Latency ----------------> Scaled Latency
One CPU cycle 0.4 ns --------------------------> 1 s
Level 1 cache access 0.9 ns ------------------>2 s
Level 2 cache access 2.8 ns ------------------> 7 s
Level 3 cache access 28 ns -------------------> 1 min
Main memory access (DDR DIMM) ~100 ns ------> 4 min
Intel Optane memory access <10 ?s ----------------> 7 hrs
NVMe SSD I/O ~25 ?s --------------------------> 17 hrs
SSD I/O 50-150 ?s -------------------------------> 1.5-4 days
Rotational disk I/O 1-10 ms -----------------> 1-9 months
Web page call: San Francisco to New York City 65 ms --> 5 years
Web page call: San Francisco to Hong Kong 141 ms ----> 11 years

Credits: David Jeppesen from Prowess Consulting, who cites the work of performance architect and author Brendan Gregg, "Systems Performance: Enterprise and the Cloud".

Member of :