facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

0 Comments
Continue reading

Making the Switch from Apple to Android? Be Prepared!

Making the Switch from Apple to Android? Be Prepared!

With so many options that don’t cost $800, the Android mobile OS gains more customers every day. If you were a dedicated iPhone user that is looking to switch to Android, you have to be cognizant of the things you will need to ensure that you are able to transfer the information you need, and be able to seamlessly pick up your new device without missing a beat. Here are some issues you should consider:

0 Comments
Continue reading

Tablet Battle: Galaxy Tab S3 vs iPad Pro

Tablet Battle: Galaxy Tab S3 vs iPad Pro

Two of the primary developers of tablets--Apple and Samsung--have created two of the most popular devices out there: the iPad Pro and the Galaxy Tab S3. If you’re in need of a tablet, we can help you go over your options so that you choose the one that best suits your needs.

0 Comments
Continue reading

Alert: Apple OS X Now at Risk of Ransomware

b2ap3_thumbnail_ransomware_now_affecting_apple_400.jpgRansomware is a major problem in both the personal and private sectors of computing, but up until very recently, Apple users had little to fear from potential ransomware hacks. Security researchers at Palo Alto Networks have discovered what’s known to be the first completed ransomware on an Apple device. The threat, called KeRanger, is officially “in the wild,” and is a danger to any Mac user.

0 Comments
Continue reading

Apple Stands Up to the FBI: Legal Battle Ensues

b2ap3_thumbnail_fbi_and_apple_400.jpgThere’s no questioning Apple’s dedication to the advancement of technology, especially over the past few decades. With the iPhone being the first of many commercially available smartphones, Apple has always been at the forefront of exciting consumer technology developments. Now, however, their most important decision yet may come in the form of a face-off with the FBI.

0 Comments
Continue reading

Windows Phone vs. iOS vs. Android: The Mobile Computing War Rages On!

b2ap3_thumbnail_apple_microsoft_lag_behind_in_mobile_400.jpgOf all the computer company rivalries going on, one of the largest and most well known is Apple vs. Microsoft. The storied competition between these two software giants has driven innovation forward for more than thirty years. Today, the frontlines of this battle take place between the two company's mobile divisions, and now there's a third major competitor in the mix.

0 Comments
Continue reading

Apple Enthusiasts, Look Out: iOS May Sport Hidden Backdoors for Apple and Law Enforcement

b2ap3_thumbnail_ios_has_vulnerabilities_400.jpgApple's iOS operating system is notorious for being fairly secure from external attacks, but what about internal threats? There have been reports of backdoors being found in the operating system, which allow Apple and subsidiaries of the law (i.e. the NSA) to access devices that run it.

0 Comments
Continue reading

Can the Surface Pro 3 Dethrone the Mighty iPad?

b2ap3_thumbnail_can_surface_beat_ipad_400.jpgThe Surface Pro 3 is the latest major release from Microsoft. It's an impressive piece of tech with a 12-inch screen and a Core i3 processor for the base model. Microsoft hopes that the Surface Pro 3 will dethrone Apple's iPad from its title as "King of the Tablets." However, the two devices may be too different for the Surface Pro 3 to even compete.

0 Comments
Continue reading

Alert: Siri’s Leaking Secrets - iPhone Lock Screen Vulnerability

b2ap3_thumbnail_ios_vuln_400.jpgApple's iOS 7.1.1. operating system has been affected by a series of bugs throughout this month. The first bug was emails being sent unencrypted, but now a new threat lurks in the shadows - a lock screen flaw that allows hackers to access your contacts list without unlocking the phone.

0 Comments
Continue reading

Results are in from the 2013 Battle “Android vs iOS”

b2ap3_thumbnail_mobile_operating_systems_400.jpgAndroid vs. iOS, it's a battle of the brands that evokes passionate responses from both sides of the technology isle. In 2013, the battle intensified as Apple launched iOS7, and Android gained significant ground as the standard OS installed on a barrage of devices. As the dust settles from a competitive year we're left asking, "Who won?"

0 Comments
Continue reading

Download Apple OS X for Free!

b2ap3_thumbnail_osxmav400.jpgIn the midst of Apple releasing one hot product after another, it's easy to lose sight of what Apple's doing on the software side of things, like the October release of OS X Mavericks. Apple's new OS is loaded with great features, and the best part is that Apple has made their new OS available as a free download!

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Cloud Internet Software Business Management Hackers Data Hardware Microsoft Backup Workplace Tips Network Security Managed Service Provider Productivity Hosted Solutions Business Email Malware IT Services Saving Money Efficiency Computer IT Support User Tips Productivity Google Innovation Small Business Smartphones Mobile Devices Quick Tips VoIP Microsoft Office Business Continuity Gadgets Data Backup Collaboration communications Social Media Disaster Recovery IT Support Android Network Data Recovery Upgrade Mobile Office Server Virtualization Communication Mobile Device Management Smartphone Miscellaneous Phishing Cybersecurity Ransomware Windows 10 Windows Tech Term Holiday Operating System Apps Unified Threat Management Facebook Outsourced IT Vendor Management Passwords Managed IT Services Remote Monitoring Automation BYOD Remote Computing Managed IT services Mobile Computing BDR Users Analytics Mobile Device WiFi Internet of Things History Artificial Intelligence Marketing Apple Data Management The Internet of Things Browser Firewall Save Money Alert App Big data Help Desk Cloud Computing Encryption Spam Office 365 Two-factor Authentication IT Consultant Gmail Bandwidth Business Technology Office Cybercrime Content Filtering Information Technology Windows 10 Maintenance Going Green Printer Training Bring Your Own Device Health Antivirus Search VPN Managed Service Managed IT Government Outlook Employer-Employee Relationship Windows 8 Lithium-ion Battery Best Practice Cost Management Information Virus Tech Support Hiring/Firing Hard Drives Budget Wireless Technology Saving Time Computers It Management Travel Blockchain Education Recovery Update Retail Networking Hacking IBM Money Document Management Healthcare Access Control Customer Service Phone System Applications Hard Drive Current Events Law Enforcement Twitter Intranet Compliance Mobility Website Patch Management Avoiding Downtime Data Loss Data storage Risk Management iPhone Value Password Legal Save Time Humor Hacker Downtime Regulations Augmented Reality PowerPoint SaaS Running Cable Proactive IT File Sharing Administration Windows 7 Wireless Data Security Securty Google Maps DDoS Storage Solid State Drive Social Engineering Flexibility Scam Black Market Cryptocurrency Word Fax Server Monitoring Data Breach Laptop Business Intelligence Private Cloud Cortana Business Growth Digital Digital Payment Project Management Excel Telephony Websites Router Management Customer Relationship Management Machine Learning Comparison Tablet Paperless Office Vulnerabilities Telephone Systems Company Culture Sports User Computing Computer Repair Vendor Disaster End of Support Social Networking Hosted Solution Robot Social IT service Network Congestion Documents Data Protection Heating/Cooling User Error Distribution Entertainment Co-managed IT Teamwork Politics Virtual Reality Downloads Emails Bluetooth Streaming Media Conferencing Automobile Inbound Marketing Chromebook Voice over Internet Protocol Redundancy Computing Infrastructure Hack Lifestyle Net Neutrality Pain Points Memory How To eWaste Google Docs Evernote Experience Chrome Download Monitors Virtual Assistant Cleaning Wi-Fi Office Tips Microchip Taxes Telephone Processors Start Menu Tech Terms Computer Accessories Managed IT Service Mobile Technology YouTube Distributed Denial of Service USB Trending Presentation Gaming Console Cooperation Software as a Service Unified Communications Settings Public Cloud Licensing Uninterrupted Power Supply Mouse Webcam Processor Specifications Safety Text Messaging Vulnerability Virtual Desktop Statistics Bitcoin Programming Identity Theft Gamification Notifications CCTV Digital Signature Security Cameras Threats Point of Contact Screen Reader Customer Resource management User Tip Proactive Maintenance Navigation Thin CLient Virtual Machine cache Television switches Writing Smart Tech Reliable Computing 3D Solutions Ebay Music Piracy Upload Business Metrics Computer Malfunction Upgrades HTML Professional Services Webinar Fiber-Optic Database In Internet of Things Smart Phones Data Analysis Employees WannaCry Mobile Security GDPR Time Management Freedom of Information LiFi Analytic Telephone System PDF SQL Server Corporate Profile Recycling Best Available Keyboard Tech Leadership Hypervisor Assessment SharePoint Product Reviews Multi-Factor Security Cost Scalability Adminstration Integration Pirating Information Software License Trends Motion Sickness Google Calendar Deep Learning Devices Messenger Tracking Domains Tip of the week Work/Life Balance Read Fraud Tactics Fileless Malware Hybrid Cloud UTM Content Rental Service Meetings Public Speaking Modem Touchscreen News Visible Light Communication Proxy Server Azure VoIP Shortcut Term Best Practives Managed Services Provider Consultation IT consulting Legislation Error Cabling Electronic Medical Records Transportation Knowledge Device Management IT Plan Enterprise Resource Planning Web Server Technology Tips Business Managemenet Accountants A.I. Books Workers Troubleshooting Recording Content Management email scam Addiction Administrator Entrepreneur Directions Display Multi-factor Authentication Supercomputer HIPAA Upselling SSID Fake News Advertising Flash Environment Dark Web Free Resource Microserver Audit CIO Competition Processing Managed Services Data Warehousing Windows XP Wireless Headphones Worker Electronic Payment Health IT Employee/Employer Relationship Video Surveillance Staffing Google Wallet online Currency Migration Connected Devices Get More Done Saving ZTime Wasting Time Access Displays Equifax Fleet Tracking Reading Samsung Business Owner Logistics Emergency Hard Drive Disposal Society Network Management LinkedIn Device security MSP Employer Employee Relationship IP Address Printer Server Microsoft Excel G Suite Bookmark Turn Key Computer Care Micrsooft Hacks Physical Security Application Harddrive Google Play Trojan Telephone Service Google Drive Windows Server 2008 Nanotechnology Social Network Human Resources Employer/Employee Relationships Debate Drones Desktop Finance Managing Costs Spyware Mobile Payment Skype Startup Asset Tracking Relocation Tablets GPS Microsoft 365 Organize Archive Business Cards Service Level Agreement Banking Botnet Username Medical IT Permissions Language Unified Threat Management Backup and Disaster Recovery Sync External Harddrive Browsers Electricity Printing Managing Stress Printers CrashOverride Regulation 3D Printing Capital Personal Information Productuvuty Financial

toner1