dcsimg

How to Set Up Windows Defender Custom and Scheduled Scans

Windows Defender comes with Windows 10 is a great way to keep your computer protected from malware. … [Read more...]

UNIX Has Always Been More Secure Than Windows

By default, UNIX-based systems are inherently more secure than the Windows operating system. In this article, we describe precisely why that is. … [Read more...]

How to Change Registry Permissions with PowerShell

The Windows registry can be a goldmine for attackers and clueless employees. There’s no place better suited for introducing security vulnerabilities or completely screwing up a Windows system than the registry. … [Read more...]

Malwarebytes Labs releases 2020 State of Malware Report

Malwarebytes Labs today released the results of our annual study on the state of malware—the 2020 State of Malware Report—and as usual, it’s a doozy. From an increase in enterprise-focused threats to the diversification of sophisticated hacking and stealth techniques, the 2019 threat landscape was shaped by a cybercrime industry that aimed to show it’s all grown up and coming after … [Read more...]

Causes and Solutions for Latency

Sometimes the slowdown of a Windows server occurs because the device or its operating system is outdated. Other times, the slowdown is due to physical constraints on the retrieval, processing, or transmitting of data. There are other causes as we will cover. In any case, the delay between when a command is made and a response is received is referred to as "latency." Latency is a measure of time. … [Read more...]

Condusiv’s V-locity Technology Was Recently Certified as Citrix Ready

  We are proud to announce that Condusiv’s V-locity® I/O reduction software has been certified as Citrix Ready®. The Citrix Ready program helps customers identify third-party solutions that enhance virtualization, networking and cloud computing solutions from Citrix Systems, Inc. V-locity, our innovative and dynamic alternative to costly hardware overhauls, has completed a … [Read more...]

Case Study: Non-Profit Eliminates Frustrating Help Desk calls, Boosts Performance and Extends Useful Hardware Lifecycle

When PathPoint was faced with user complaints and productivity issues related to slow performance, the non-profit organization turned to Condusiv’s I/O reduction software to not only optimize their physical and virtual infrastructure but to extend their hardware lifecycles, as well.  As technology became more relevant to PathPoint’s growing organization and mission of providing … [Read more...]

Bluetooth vulnerability can be exploited in Key Negotiation of Bluetooth (KNOB) attacks

Those who are familiar with Bluetooth BR/EDR technology (aka Bluetooth Classic, from 1.0 to 5.1) can attest that it is not perfect. Like any other piece of hardware or software technology already on market, its usefulness comes with flaws. Early last week, academics at Singapore University of Technology, the CISPA Helmholtz Center for Information Security, and University of Oxford released … [Read more...]

Introduction To The New Windows Terminal

Recently at the Microsoft Build conference, it was announced that there is a new Windows terminal that can be used as an alternative to cmd of PowerShell, called Windows Terminal. … [Read more...]

Do I Really Need V-locity on All VMs?

V-locity® customers may wonder, “How many VMs do I need to install V-locity on for optimal results? What kind of benefits will I see with V-locity on one or two VMs versus all the VMs on a host?”  As a refresher… It is true that V-locity will likely provide significant benefit on that one VM.  It may even be extraordinary.  But loading V-locity on just … [Read more...]