If you are mining Bitcoins, you may want to reconsider. A new study from RWTH Aachen University shows that the ledger used to verify transactions includes illegal content, such as child abuse imagery. The ledger is stored locally on the miner’s computer, and because that content is on your computer, you are liable for it…. […]
Category: General
Why You Need to Clean Up your Computer
The Norton Community recently posted a good blog on why you should clean up your computers. Here’s a brief summary on what you need to do and why it matters: Why you need to: Outdated and unused software can be a vulnerability to cyber criminals Have a clear backup system will help you recover from […]
What is RAM, Processor Speed, and Hard Drive Memory?
Picture that your computer is a house. The RAM is your floor space. Basically this is how many toys you can play with at a time. How fast you play with the toys is determined by your processor speed (measured in gigahertz). And your Hard Drive memory is how large your closet space is, basically […]
Happy Thanksgiving!
Today we want to give a shout out to all our wonderful customers! We are so thankful that you have chosen to do business with us! Sincerely, The Velox Team
32 Bit vs 64 Bit Windows?
What do these designations mean? The two terms refer to how a computer processor handles information. A 64-bit Windows can handle larger amounts of RAM (Random Access Memory) more effectively than a 32-bit, and the difference is substantial. A 64-bit can handle nearly 4 billion times the amount of a 32-bit. Why do some programs […]
Are You Monitoring for Intrusions?
“In short, there is no way that any organization can keep it, and its customers and their data, safe all the time. Many organizations now assume they will be breached and set up monitoring systems to spot when that happens, while also training staff to react quickly to fix problems.” This is how a recent […]
Security Alert: “Locky” Crytpolocker Virus
NBC and several other news organizations reported Wednesday in an article about an encryption virus that has hit several U.S. Hospitals and crippled them so much so that they are seeking to pay the perpetrators to unlock their data. This is a staggering reality that saddens and angers me as an IT security professional. What […]
VIRUS, MALWARE, TROJAN, WORM… SO WHAT’S THE DIFFERENCE?
There are several types of threats out there that you probably hear about on a regular basis from the new media, social media, or internet forums. There are two basic categories to this, viruses and malware. Of course, by its definition viruses are malicious software and therefore could be considered malware, but in technical nomenclature […]
A FALSE SENSE OF SECURITY: BUSINESS CONTINUITY VS DISASTER RECOVERY
ANYONE CAN PROMISE DISASTER RECOVERY, BUT WHAT’S YOUR BUSINESS CONTINUITY PLAN? At Velox Systems, we know our customers trust us to power and protect their most valuable assets and data. This doesn’t just mean we promise a backup of critical data, it means that we fight to provide business continuity when disaster hits. For instance, […]
PASSWORDS EXPLAINED – WHY SHOULD MY PASSWORDS BE COMPLEX?
How would I ever remember a password like “e$K7e*lx”? How important is your password, really? The greatest data security systems in the world can only keep you as secure as the strength of your password used to gain access to your sensitive data. This is why the big data storage organizations require you to choose […]