Retin
Welcome to BorgX Enterprises, LLC
.: BorgX Enterprises, LLC :.
 Home | Forums | Recommend Us | Contact Us | Submit News | Search
   Welcome Guest! Click here to create an account. October 19, 2019  
 .:Modules
  • Home
  • AutoTheme
  • Feedback
  • Members List
  • Recommend Us
  • Statistics
  • Web Links
  • Your Account


  •  .:Login
    Nickname

    Password

    Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.


    Welcome to BorgX Enterprises, LLC!


    Congratulations! You have reached BorgX Enterprises, LLC.

    Currently, I am a one-man Army. I have a full-time job Monday-Friday 7am - 5pm, but outside of that time I am hired out to fix your Computer problems. I live in the St. Louis, Missouri area (West County actually). I'm much less expensive than the "Geek Squad" and about 10 times better! I can do almost anything from the most basic installations at a person's home to complex installations and troubleshooting at almost any size company. I've been in the computer business for over 20 years and in that time I have fixed more problems and installed more software than I care to think about.

    Having a computer problem and want it solved quickly and at a fair price? Give me a call or email me!

     .:Securing You Wireless Network
     .:Posted by BorgX on Saturday, October 20 @ 11:01:04 UTC (27321 reads)
    How Do I? A home wireless network is an easy and convenient way to share an Internet connection and other resources among the computers in your home. While a couple of people that I know leave their wireless networks available to anyone and everyone, most of us want to keep our home wireless networks private.

    The core of your wireless network is the router. By carrying out some easy-to-do configuration on your router, you can ensure that only the people who you want to have access to your network will be able to.

    Note: The procedures in this story for configuring a router are for a Linksys WRT54GS router. You'll probably have to modify the specific instructions if you're using a router from another vendor, but the concepts are the same.

    Passwords on Your Router
    You configure most routers using a Web browser. When connect to the router, you need to log in. Every router has a default password, like admin. As this article points out, most people don't bother to change that password. Doing that is simple, though and should ALWAYS be done.

    Log into your router. Then, click Administration > Management. Enter a password in the Router Password and Re-enter to confirm fields. You should rotate this password regularly. I generally do it every two weeks to a month. If you need to create a strong and secure password, then check out the Strong Password Generator Web site.

    Locking Down MAC Addresses
    All ethernet adapters, which enable users to access a network, each have a unique 12-digit identifier called a MAC address.
    Read More... | 7111 bytes more | comments? | Score: 0



     .:
     .:Posted by BorgX on Monday, April 10 @ 00:19:54 UTC (3540 reads)
    How Do I? Spam is one of those things that nobody wants, but probably has plenty of. If there happens to be anyone out there unfamiliar with spam, we are not talking about the luncheon meat, but the unsolicited, junk e-mail that clogs our inboxes. And in case you are curious, according to some sources, the junk mail version of spam earned its name from a Monty Python skit regarding the luncheon meat of the same name. Care to sing along? From offers for prescription drugs, to mortgage refinancing, to sexually explicit content, spam can leave us having to sift through mounds of trash to find the few messages we actually care to read. Although eliminating all junk e-mail may be impossible, there are several steps than can be taken to all but eliminate spam from your inbox.

    1. Protect Your E-mail Address
    One of the best strategies for avoiding spam is to protect your personal e-mail address. Your best defense is for the spammers to not even know you exist, but this is a difficult task to accomplish. Many spam mailing lists are created by harvesting e-mail addresses from websites where your information may be displayed. Newsgroups, bulletin boards, and chat rooms are just a few examples of places where spammers may run scripts to collect anything that resembles an e-mail address. Many sites, such as bulletin boards, have safeguards to protect their members, but it does nothing if these members post their personal information in one of their posts, their signature, or somewhere else that puts the information in plain sight. In addition, signing up with unknown sources for online contests, mailing lists, and similar occasions where you need to provide an address as part of the registration process may also expose your address to spammers. Using your best judgment is your best defense. If you want to keep your mailbox clean, keep your address private, only giving it out to trusted parties.

    2. Create a Spam E-Mail Account
    Protecting your e-mail address is easier said than done, and if you find that it is impossible to keep your personal e-mail address completely private, a separate account may be the solution.
    Read More... | 7496 bytes more | comments? | Score: 0



     .:Internet Piracy
     .:Posted by BorgX on Saturday, October 20 @ 10:41:00 UTC (3586 reads)
    How Do I? Surely you’ve encountered the “Dear Valued Customer”, “Verify Your Account” or “If you don’t respond within 48 hours, your account will be closed” emails flying across the screen, threatening corrective action unless you take the time to respond. Worse yet, what about those pesky pop-up windows that sporadically appear when you visit your bank’s website, urging you to verify account details...

    Welcome to the world of Internet piracy and malware, where phishing for dollars nets more prize money for fraudsters than Bob Barker could ever give away in a single Showcase Showdown. Acting as legitimate business entities, phishers flood your inboxes with emails demanding personal information (i.e., your username, password, social security or driver’s license numbers, banking or credit card numbers) in order to mollify some threat of dire financial consequence. They are responsible for the pop-up messages at legitimate websites, or they can spoof these same legitimate websites, employing official logos (hijacked directly from official websites) and other company paraphernalia as integral parts of their scams. They deploy Trojan keystroke loggers and viruses to your PC in order snatch what you type away from your fingertips. They may call by phone, using the same threats and tactics to collect tidbits about your life using “social engineering”. In fact, hackers may even take advantage of backdoor security lapses in broadband routers to change DNS settings that re-route traffic to their own websites, executing malicious JavaScript code to mimic legitimate websites and hijack your router. Hackers then have access to any username or password combinations you enter as you surf the web.

    Armed with your private information, phishers can wreak havoc on your financial well-being – applying for credit cards and loans, enjoying shopping sprees at Internet merchants, and draining bank accounts at the speed of light faster than you can say “identity theft.” Just because something looks and sounds legitimate doesn’t mean that it is, and you’re not alone; even the most Internet-savvy users face the dangers of identity theft if they’re not careful.

    According to a joint report issued by the US Department of Homeland Security and the Anti-Phishing Working Group, online thievery is a billion dollar industry and growing in sophistication as technology advances.
    Read More... | 7258 bytes more | comments? | Score: 0



     .:5 ways to backup your data...
     .:Posted by BorgX on Monday, April 10 @ 00:11:51 UTC (1554 reads)
    How Do I? The data on your hard drive is the most critical item inside your computer, and the only item which can not be replaced. It may be an unwanted hassle and expense to replace a defective memory module, monitor, or processor, but there is no replacing data once lost. In addition to the possibility of a simple hard drive failure, the threat of internet borne worms and viruses has become an increasing risk to data loss or corruption. Although you may not be able to provide absolute protection to your hard drive, there are various ways that you can ensure that the data on your hard drive is protected. Five methods of backing up your data are summarized below.

    1. USB Flash Drives
    Although I am not recommending that flash drives be used for the actual data storage, they are a convenient means of transferring data from one computer to another. Important files can be quickly loaded onto a device such as the MINIDISK-512-DGRY-CS USB 2.0 Flash Drive, and transported to another computer for safe keeping. Installation and operation is extremely simple, and other than perhaps having to install a software driver, the use of a USB flash drive is a matter of having an available USB port on your computer. Just about every computer produced over the last several years has USB ports included, with more modern systems supporting the USB 2.0 standard. USB 2.0 allows for data transfer rates of up to 480 MB/s, which is a tremendous improvement over the original USB speed limit of 12 MB/s, and allows a user to fill their drives with data in a relatively short period of time.

    2. CD and DVD Writers/Re-Writers
    The falling prices of CD and DVD writers/re-writers have made them a staple of just about every modern computer.
    Read More... | 6525 bytes more | comments? | Score: 0




     

    All logos and trademarks in this site are property of their respective owner. The comments are property of their posters, all the rest © 2005-2017 by BorgX Enterprises, LLC