Home » 2013 » December

Don’t Be A Victim Of The Target Credit Card Hack

Tips and information to keep yourself safe if you were or could be a victim of the Target security breach. Protect your credit and debt card information by changing your pin and online banking password. Make sure you have a strong security question for your...
Read More

Target Hackers Stole Encrypted Bank PIN Numbers

The hackers who attacked Target Corp and compromised up to 40 million credit cards and debit cards also managed to steal encrypted personal identification numbers (PINs), according to a senior payments executive familiar with the situation. One major U.S. bank fears that the thieves would...
Read More

Using Search Traffic And Google Webmaster Tools

The Search Traffic section of Google Webmaster Tools is a very powerful tool for any one running or administering a website. The search traffic sections has three parts search queries, links to your site and internal links. A search query is a query that a...
Read More

CryptoLocker Ransomware Earns $30 Million In 100 Days

According to new research, the Cryptolocker malware has infected 250,000 PCs in just 100 days, earning more than $30m. The Cryptolocker ransomware works by encrypting a user’s hard drive and the only way to un-encrypt and regain access to the files is to pay a...
Read More

Dell Announces Partnerships with Red Hat, Microsoft and Google

Dell is partnering with Red Hat to jointly engineer the open-source OpenStack Cloud Platform for enterprise deployments and will offer it to customers on its hardware, a move that differentiates Dell from such rivals as Hewlett-Packard and IBM in the increasingly competitive cloud computing space....
Read More

Startup Key Combinations For Intel-based Macs

Does my Mac have an Intel or PowerPC processor? Not sure if your Mac is using Intel or PowerPC processors? 1. In the Finder, choose About This Mac from the Apple menu. 2. Look at the Processor line to see which kind of processor is...
Read More

Latest

encryption main The Ultimate Guide To Encryption
phone water Key Tips On What To Do If You Drop Your Device In Water
phone business How to Streamline Your Business Operations with POS Systems
audible Audible on Android vs Audible on iOS
stamp Stamp App for Moving Playlists between Music Services

Tech Geek Today

Tech Geek Today

MonTueWedThuFriSatSun
    123
45678910
11121314151617
18192021222324
25262728293031
       
  12345
6789101112
20212223242526
27282930   
       
      1
9101112131415
16171819202122
23242526272829
3031     
    123
45678910
11121314151617
252627282930 
       
 123456
78910111213
14151617181920
21222324252627
28293031   
       
      1
2345678
9101112131415
16171819202122
23242526272829
3031     

Subscribe To The Technology Geek

Archives