Short answer is YES you should backup your computer!
The long answer, it is a bit tricky to decide just how, when, and where to back up.
With options from cloud to NAS, Network Attached Storage, price ranges vary. Here, we will go over some options and price ranges that cover common backup needs you may face.
Standard Hard Drive
Your standard hard drive is the most common of backup options, either external or internal. A local backup is hands down the most common form of backup that will work for most users. Some issues with this method are failure of the hard drive as well as what capacity drive do you needed.
Things that need consideration!
There are some considerations that we will cover.
Internal or External
SSD or HDD
What capacity do you need, well…it depends. For most people a 1 Terabyte external hard drive is more than enough. Your particular needs may very and we would recommend going over your option with a trained professional if you feel you need specialized help.
How much is this going to cost, on average storage is about $0.03 Per GB. So a 1 Terabyte hard drive is right around $30 plus the cost of an external enclosure if needed.
Failure rates for modern hard drives are now at 2% per year. Meaning the first year of ownership your hard drive has roughly a 2% chance of failure, the second year 4%, third year 6%, and so on.
For this reason you always want to have important data backed up to at least 3 separate places. One local backup, cloud backup, and off-site backup is ideal for mission critical or vital data.
For most users an external backup solution will work wonderfully. However we highly recommend using SSD, Solid State Drive, these have no moving parts and failure rates that are tenths of 1%. That’s less than 1% failure rate!
Standard Solid State Drive
The next solution we will cover is cloud storage, this is hands down the easiest and safest way to store your data. With monthly plans available for Google, Microsoft, and many others including Ela Computer Repair you really can’t go wrong with cloud storage.
What is a NAS?
ASUSTOR AS3204T NAS
The last solution we will cover are NAS systems also known as Network Attached Storage. These systems are becoming increasingly affordable to the average user. A good NAS is one that offers RAID and at least 4 drive bays as well as up to 32 Terabytes of storage. Here is a link to a solution we highly recommend http://amzn.to/2kLpBMf.
We have spent the better part of a week building our brand new website and it has went well!
Just some of the things we wanted on our old site we were able to do and so much more. It is fantastic to have the tools needed to work quickly.
Private Client Portal
Private Torrent Tracker
Streamlined Design and Feel
Faster Load Times
Easier SSL integration
Password Protected Client Only Pages
And it Just Looks Better!
The new Client Portal gives our clients access to special downloads for their purchase. It also allows us to add special notes for our clients to read. It is a very handy tool indeed!
Our very own Torrent service allows us to serve our clients large files over the torrent network giving them a great deal of flexibility for downloads. We have set our torrents to private meaning only our tracker will server your torrent creating great privacy for our clients, that is always a good thing!
Our download manager with PayPal integration means it is easier than ever to allow our clients to purchase their files and download them from one source over SSL encryption and with the safety reliability of PayPal payments .
There is so much more behind the scenes coding we were able to do with the new website. The look and feel is far more clean and modern. Along with the added ability to create awesome forms that are far more user-friendly. The security was far easier to manage and every single file and page is fully SSL secured!
We have gotten great feedback and we really hope it continues. If you have suggestions please let us know we would love to hear your thoughts on our brand new website!
If you want to leave us some feedback on our new website please use the below form.
Windows 7 is Dead! This Halloween Microsoft officially killed Windows 7 and Windows 8. System manufactures and refurbishes must now install Windows 10 to all computers. Only if they do not have a stock pile of Windows 7 licenses.
This comes as a real blow to refurbishment’s. As a Microsoft Registered Refurbisher we can tell you that Windows 7 is valuable for older systems. We will be installing Linux on systems that will not run Windows 10 properly, to our standards.
With Windows 7 being the most popular operating system on earth, powering more than 40% of all personal computers a lot of consumers are unhappy with the news. Windows 7 support is to continue until January 2020, giving users just over three years to migrate to another operating system.
Linux is an option
For low power systems that can not run Windows 10, Linux is a fine choice. With Ubuntu being the number one choice for installation. With system requirements that are extremely forgiving.
Ubuntu Desktop Edition
700 MHz processor (about Intel Celeron or better)
512 MiB RAM (system memory)
5 GB of hard-drive space (or USB stick, memory card or external drive but see LiveCD for an alternative approach)
VGA capable of 1024×768 screen resolution
Either a CD/DVD drive or a USB port for the installer media
Windows 10 Home
Processor: 1 GHz or faster processor or SoC (system on a chip). 64-bit versions of Windows 10 require a processor that supports CMPXCHG16b, PrefetchW, and LAHF/SAHF capabilities.
RAM: 1 GB for 32-bit or 2 GB for 64-bit
Hard disk space: 16 GB for 32-bit or 20 GB for 64-bit
Graphics: DirectX 9 or later with WDDM 1.0 driver. Some games and apps might need DirectX 10 or higher for optimal performance.
Display: 1024 x 600. The number of applications that can be snapped depends upon the minimum resolution for each application.
Compared to Windows 10 system requirements Linux is a very minimalist operating system while still offering great functionality and interoperability.
The DDoS Attack Friday morning started early around 7am and then again at noon eastern standard time. The attacks have taken down a number of major sites. Twitter and Reddit are among the big players hit hard by the attack. However a number of smaller sites are affected, the full extent is not known at this time.
“Starting at 11:10 UTC [7:10 EDT] on October 21st-Friday 2016 we began monitoring and mitigating a DDoS attack against our Dyn Managed DNS [domain name system] infrastructure,” Dyn reported. Dyn said the attack was resolved less than two hours later, by 9:20 EDT. However another attack took place just before noon EST.
The attack on DYN comes just hours after DYN researcher Doug Madory presented a talk on DDoS attacks in Dallas, Texas at a meeting of the North American Network Operators Group (NANOG). DYN is working hard to resolve the issue. However, DYN has a status page that is navigable at this time https://www.dynstatus.com/
The botnet is suspected to be using IoT computers to distribute the botnet.
“The internet of things (IoT) is the internetworking of physical devices, vehicles (also referred to as “connected devices” and “smart devices”), buildings and other items—embedded with electronics, software, sensors, actuators, and network connectivity that enable these objects to collect and exchange data. In 2013 the Global Standards Initiative on Internet of Things (IoT-GSI) defined the IoT as “the infrastructure of the information society.” The IoT allows objects to be sensed and/or controlled remotely across existing network infrastructure, creating opportunities for more direct integration of the physical world into computer-based systems, and resulting in improved efficiency, accuracy and economic benefit. When IoT is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyber-physical systems, which also encompasses technologies such as smart grids, smart homes, intelligent transportation and smart cities. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure. Experts estimate that the IoT will consist of almost 50 billion objects by 2020.” – https://en.wikipedia.org/wiki/Internet_of_things
A botnet is simply a collection of these types of devices or computers working together to perform a task. In this case a DDoS attack on DYN.
Hackers, sure you see them in the movies and it is very exciting. However, truth is often stranger and far more real than fiction! A hacker in a public setting, connected to a public WiFi, can do a lot of damage to your identity and your computer system. Stealing anything and everything on your computer or using the information gathered to infiltrate your bank account, credit cards, saving accounts, or medical records. Everything, with very few exception is hackable.
Hackers will create fake WiFi access points and your phone will automatically connect. That is all it takes and the hacker can do almost anything once connected to the fake network. Even see your search history!
Very scary stuff indeed. How do you prevent this from happening to you? Simply do not use public WiFi and if you do, use a good mobile security suite with VPN.
Imagine This Scenario
Walking into your favorite coffee shop you connect to the WiFi. Sitting down you relax sipping your coffee, as it cools down, scanning YouTube or Netflix. Maybe you are chatting on Facebook or Twitter, when you get a text from your bank showing your recent purchases. You login to look at the transaction and check your balance.
Something we all do, however 10 feet away sits a hacker and everything you type the hacker is recording. The hacker has your Facebook password, bank account information, and any search history. Further, a hacker can find out any identifying information they wish to all within a few minutes.
Now multiply that by the number of people you see in the coffee shop! The hacker has everyone’s information all at once in just a few minutes.
No Network Isolation
It is very likely that most public WiFi hot spots do not employee a security measure known as AP Isolation. What isolation does is it creates a barrier between your computer and anything else on the same network. You do not have access to anyone’s computer and they have no access to yours. This is regardless of share setting on the computers, your computer or mobile device’s connection is safer from every other device on that network if the WiFi has isolation enabled.
One of the best ways to protect yourself on any network is by using a reliable VPN service. TunnelBear is the best VPN ever in our opinion. TunnelBear VPN shields your personal information from prying third-parties and hackers on public WiFi, ISPs and other local networks. Your connection is secured with bear-grade (that’s strong) AES 256-bit encryption. they do NOT log your network activity. Take a look at TunnelBear
It seems that the VPN built into Opera suffers from the same issues all VPN’s suffer from. No great leaps in technological advancements here, in our opinion. Overhead, latency, and ping; not to mention some websites just will not work at all while on a VPN. Netflix has blocked the use of Opera VPN in Europe, or so it’s been reported. We have no confirmation on this as of yet. Though if Netflix is blocking your service, that is not good!
User Base, Opera.
With 350 Million total users Opera products are a large portion of the internet user base, that’s a big number. VPN does have its benefits and to have a VPN built into a browser, well we like it and will be testing and using it over the coming months.
VPN Offers Some Undeniable Benefits.
In countries where a website maybe blocked, having a free and easily accessible VPN would allow users to reach sites they could not before. Such as in China where some social media is blocked. This would allow users to use social media and get entertainment that was unavailable without a VPN. This leads us to the fact that a VPN offers a level of anonymity that a normal web browser just does not have without VPN, built-in or otherwise. Also, even while visiting a site with no SSL encryption a VPN would give an extra layer of security to help prevent the leakage of information.
The Downside of Opera Built in VPN.
VPN consumes a great deal of bandwidth, using SSL does not, while providing a lot of the same security and encryption. Often good VPN’s need a monthly subscription and it is likely the built-in VPN from Opera does not offer the same level of service an SSL VPN does for a monthly cost. If you want a VPN for security we would not recommend Opera’s built-in VPN.
The Upside of Opera Built in VPN.
It is free and easy to use! As stated above it does offer what you would expect from a VPN. We have no complains it does function as intended and did we mention it’s free? It’s Free!!! We have always liked Opera’s clean design and the VPN is well-integrated and easy to use. Once setup it’s a matter of simply turning it on or off as the user see’s fit. More web browsers should follow suit and let Opera lead the way, fantastic job so far!