When Microsoft first revealed Windows 8, complaints started rolling in almost immediately. The lack of the traditional Start Menu and the fact that Windows would no longer be booting directly to the Windows desktop were just a couple examples of the many complaints that continue to trickle in regarding the new OS. Continue reading »
For those of us working in the IT industry, we get used to removing viruses and malware from plenty of machines on a regular basis. Malware is a huge problem that seems to only be getting worse. Part of the problem is a lack of education for the end users. It’s easy for the less tech savvy to get tricked into downloading a piece of software that disguises itself as legitimate piece of software (Java, Flash, Adobe etc.) While browsing the internet, users can also get tricked or scared into downloading and installing “Fake AV” programs that look legit, most times copying the GUI (graphical user interface) of popular Anti-Virus programs (AVG, Norton, Microsoft Security Essentials, ESET etc.) by thinking that their computers are infected. Continue reading »
I remember when I received my first “internet capable” computer; it was a long time ago on my birthday in July. If you know anything about July in the southeast, you know it’s typically hot, humid and sticky. This weather is far too miserable to spend any real time outside. And until receiving my first computer, there was no reason to hide inside during the summer, other than to catch a brief reprieve from the heat and bask in AC. But that all changed the day the Internets came to my house. In fact, not only did the Internet fairy come to my house, it came to my own ROOM! I felt like Steve Jobs, who was once quoted as saying, “I’m very excited about having the Internet in my den.” And I agree: One of coolest things ever! Continue reading »
New River Computing would like to thank everybody who was able to join us and help make our ribbon cutting ceremony a success.
Hansen Ball, Jeff Wynn, and Karen Loferski get ready to cut the ribbon!
Our guests included NRC clients, representatives of the Montgomery County Chamber of Commerce, fellow Corporate Research Center tenants, local IT professionals, friends and family. We appreciate the support of all those who attended and are thankful for such a great turnout.
What a difference a weekend can make! Over the weekend, New River Computing moved from our Hubbard Street location to the Virgina Tech Corporate Research Center to help alleviate some welcomed growing pains. On Friday evening, despite hours of work setting things up, our new offices looked as if Godzilla had wreaked havoc in our workspace. However, thanks to the tireless (okay, we actually were REALLY tired when all was said and done) efforts by the NRC staff, we’re proud to start showing off our new primary work area.
This is how our work room looked on Monday after a weekend of setup and cleanup.
The right-hand side of our main work room as it appeared on Monday.
New River Computing was recently featured in The Burgs section of The Roanoke Times. NRC’s Jeff Wynn and Hansen Ball were interviewed by Roanoke Times reporter Travis Williams to get some background about New River Computing’s past, present, and future.
The Q&A covers the beginnings of NRC, the company’s commitment to serving the community, and the keys to the business’ success. Wynn and Ball also discuss what they enjoy most about NRC and operating a business in the New River Valley of Virginia.
It’s a commonly held opinion among IT professionals that the reason Windows is so prone to virus and malware attacks is due to its popularity. Windows powers approximately 87% of the world’s computers. While this is true, Windows’ vulnerabilities can be attributed to more than just the operating system’s popularity. Windows attacks have a lot to do with the basic architecture of the operating system itself. With each new version, the Windows operating system [typically] tends to become more secure than previous versions but, that’s not to say that the newest versions are 100% bullet proof. Continue reading »
For those of you not familiar with exactly what Ransomware is/does, here’s the current Wikipedia definition:
“Ransomware comprises a class of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator of the malware in order for the restriction to be removed. Some forms of Ransomware encrypt files on the system’s hard drive, while some may simply lock the system and display messages intended to coax the user into paying.” Continue reading »
Rogue security software, also known as fake antivirus software or “scareware”, has been one of the most popular methods used by online criminals in recent years to fool computer users into installing malware and/or divulge confidential information. Rogue AV software typically mimics the general look and feel of legitimate security software programs. Once installed on a person’s machine, it will claim to detect a large number of nonexistent threats while advising users to pay for the “full version” of the software to remove the threats.
***ATTENTION: If you are a current New River Computing client covered under our RMM Service Plan, you need not worry about this vulnerability. We have automatically deployed the fix to your computers.***
Recently, there has been an Internet Explorer (zero-day) remote code execution vulnerability found being exploited in the wild which affects IE 8, as well as IE 6 & 7. Current exploitation is limited but it’s almost certain that a reliable exploit will soon find its way into at least one (if not all) of the many popular exploit kits being used by online criminals. Continue reading »