Beau - Israel's PC Doctor
  • Home
  • Testimonials
  • Beau - Israel PC Doctor
  • More About Beau
  • Contact Israel's PC Doctor
  • Tips & Tricks
  • Blog: Keeping Your Computer Safe, Speedy, & Stable
  • Solve Your PC Problems
  • Media

Facebook's New Graph Search - Useful Tool or Stalker Gold . . ??

3/25/2013

1 Comment

 
Picture

"...The Graph Search bar on Facebook has replaced my old search bar and now occupies a prominent place on the top tab of my Facebook homepage; the notifications, messages, friend requests tab are now on the right. The new design is giving Graph Search a lot more prominence and I’m not surprised, given Zuckerberg has called this the third pillar of the site at the launch . ."   http://www.firstpost.com/tech/review-facebooks-graph-search-is-stalker-gold-605552.html

1 Comment

Thinking of Upgrading to Windows 8 . . . ?  Do Your Homework First!

3/24/2013

1 Comment

 
Picture
If you've been hearing all the buzz about Microsoft's new operating system, Windows 8 and are considering installing or upgrading to it, it is essential that you first verify that all your hardware and software are compatible with it.  Otherwise you could run into major problems during the installation - you could even lose all your un-backed up personal or business data.  There are a number of things you'll need to know, and I'll cover all of them here.

1 Comment

Apple's iOS and Android are new favorite malware victims

3/12/2013

1 Comment

 
Picture
Apple's iOS and Android are new favorite malware victims
http://news.cnet.com/8301-1009_3-57506159-83/apples-ios-and-android-are-new-favorite-malware-victims/


1 Comment

Malevolent Mobile Madness / Electronic Espionage Epidemic

3/12/2013

2 Comments

 
...Malware, short for malicious (or malevolent) software, is software used or created by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. ‘Malware’ is a general term used to refer to a variety of forms of hostile or intrusive software..
Picture

Are your phones and other mobile devices - and the large amounts of personal, private, identifying data and information they increasingly contain - the new high-value targets of choice for today's hackers and cyber-villains?  

Statistics definitely seem to point clearly in that direction.
http://franklinmcmahon.com/2013/03/07/android-mobile-virus-and-malware-up-to-79-in-2012-96-in-last-quarter/

2 Comments

    Author

    Hi there, I'm Beau - Israel's PC Doctor, and I created this new blog in order to try and help keep readers updated and in the know about things to do (or not do) and think about to enhance either their computers' performance, stability, security, productivity, or all of the above.

    Picture
    Follow my Tech Support Facebook Page: http://tinyurl.com/PCdocFBfanPageWelcome

    Archives

    October 2014
    April 2014
    March 2014
    March 2013
    February 2013
    January 2013
    July 2012
    December 2008

    Categories

    All
    DataBackup
    Security
    Social Networking
    System Maintenance & Cleaning
    Virus Malware Protection
    Windows

    RSS Feed

Powered by Create your own unique website with customizable templates.