facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Protect Your Network By Blacklisting Malicious IP Addresses

b2ap3_thumbnail_know_your_ip_400.jpgLike your fingerprint, your computer’s IP address holds the key to your identity. Okay, it may not be as unique as your fingerprint, and you may actually use multiple IP addresses every day, but still, your IP address says a lot about you. What do you need to know about your IP address?

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Cloud Software Data Business Management Hackers Hardware Workplace Tips Microsoft Network Security Backup Productivity Hosted Solutions Business Managed Service Provider Productivity Email Malware IT Services Saving Money Efficiency Google Small Business Computer User Tips Innovation Collaboration VoIP IT Support IT Support Data Backup Quick Tips Smartphones Network Mobile Devices communications Business Continuity Microsoft Office Disaster Recovery Gadgets Data Recovery Social Media Android Cybersecurity Upgrade Mobile Office Server Communication Smartphone Virtualization Phishing Mobile Device Management Miscellaneous Ransomware Holiday Vendor Management Operating System Apps Tech Term Managed IT Services Outsourced IT Windows Users Windows 10 Mobile Device Passwords Remote Monitoring Facebook Unified Threat Management Internet of Things BDR Automation Mobile Computing BYOD Remote Computing Apple Managed IT services Data Management Analytics WiFi Windows 10 Marketing Cloud Computing The Internet of Things Training Artificial Intelligence History Firewall Browser Save Money Business Technology Big data App Spam Encryption Help Desk Alert Managed Service Bandwidth Information Technology Health Office 365 Office IT Consultant Budget Two-factor Authentication Gmail Government Access Control Content Filtering Cybercrime Maintenance Printer Going Green Windows 7 Hard Drives Managed IT VPN Bring Your Own Device Antivirus Windows 8 Outlook Recovery Employer-Employee Relationship Best Practice Lithium-ion Battery Retail Hiring/Firing Virus Tech Support Cost Management Saving Time Computers Information Wireless Technology Search Healthcare Computing iPhone Money Document Management Humor Data Security It Management IBM Blockchain Hacking Augmented Reality Data Loss Travel Remote Work Education Phone System Covid-19 Networking Project Management Update Customer Service Wireless Voice over Internet Protocol Mobility Avoiding Downtime SaaS Applications Storage Website Save Time Downtime Law Enforcement Conferencing Wi-Fi Solid State Drive Value Computer Repair Running Cable Compliance Password Proactive IT Vendor Data storage Customer Relationship Management Patch Management Hacker Flexibility PowerPoint Twitter Intranet Data Breach Legal Current Events Administration File Sharing Regulations Risk Management Hard Drive Net Neutrality Paperless Office Google Maps Business Intelligence Sports DDoS Digital Payment Social Engineering Disaster Software as a Service Fax Server Hosted Solution Router End of Support Robot Word Comparison Tablet Securty Meetings Excel Company Culture Private Cloud Cooperation Cortana Social Networking Telephony Monitoring Black Market Machine Learning Telephone Systems Cryptocurrency Scam Laptop Management Business Growth User Vulnerabilities Digital Virtual Desktop Social Websites Start Menu Tech Terms Documents YouTube Virtual Reality Unified Communications Settings Inbound Marketing Mobile Technology Teamwork Heating/Cooling Politics Entertainment Chrome Automobile Managed Services Provider Emails Lifestyle Uninterrupted Power Supply Smart Devices Chromebook Distribution Computing Infrastructure Hack How To Pain Points Vulnerability Computer Accessories Employee/Employer Relationship How To IT service Video Conferencing Managed Services Bitcoin Data Protection eWaste Trending Managed IT Service Download Cost Mouse Bluetooth Downloads Statistics Processor Microchip Taxes Programming Processors Distributed Denial of Service Network Congestion Gaming Console Memory Multi-factor Authentication USB Google Docs Redundancy Text Messaging Experience Webcam Telephone Presentation Solutions Public Cloud Licensing Cleaning Evernote Streaming Media Professional Services Monitors Identity Theft Co-managed IT Office Tips Virtual Assistant Specifications Safety User Error Notifications Integration Service Level Agreement IT Fileless Malware Hybrid Cloud Business Metrics Computer Malfunction Society Smart Phones Startup Asset Tracking Data Warehousing Digital Signature Remote Workers Holidays Reliable Computing Displays Business Cards Proxy Server Azure In Internet of Things Access Username Virtual Private Network Modem Strategy Micrsooft Unified Threat Management Backup and Disaster Recovery Emergency Hard Drive Disposal Device Management Adminstration Gamification Pirating Information Computer Care Business Managemenet Development Term Drones Screen Reader Leadership Customer Resource management Microsoft Excel Content Management FinTech Electronic Medical Records Transportation Piracy Upload PDF Directions Display Motion Sickness Smart Tech Google Drive Windows Server 2008 Data Storage Recording Optimization Scalability Best Practives Dark Web Free Resource Permissions Language HTML Spyware Mobile Payment Best Available Keyboard Procurement SSID Messenger Tracking Fiber-Optic Database online Currency Mobile Security Electricity Printing Processing Rental Service Telephone System Domains Organization Health IT Software License Trends LinkedIn Communitications Wasting Time Web Server Music Multi-Factor Security Public Speaking Microserver PCI DSS Logistics Virtual Machines switches Cabling Writing Bookmark Administrator Devices cache Television Shortcut Supply Chain Management Cyber security Books Workers Upgrades Fraud Upselling Tactics Employer/Employee Relationships LiFi UTM WannaCry Content Video Surveillance Entrepreneur Skype Internet Service Provider Google Play Telephone Service Supercomputer Troubleshooting Archive Get More Done IT Plan Corporate Profile Enterprise Resource Planning Environment Printer Server IT Assessment Managing Costs Legislation Saving ZTime Time Management Error Freedom of Information HIPAA Turn Key Regulations Compliance Microsoft 365 Worker Trojan Browsers Work/Life Balance Accountants Assessment A.I. SharePoint Competition Point of Contact Remote Working Medical IT Trend Micro Reading Samsung Deep Learning email scam Addiction Electronic Payment User Tip Proactive Maintenance G Suite Visible Light Communication Debate Google Calendar Organize Security Cameras Threats Employer Employee Relationship Harddrive Tip of the week Business Owner Migration GPS VoIP Connected Devices Electronic Health Records Navigation Virtual Machine Hacks Physical Security Wireless Headphones Touchscreen News IP Address Financial Data IT consulting Recycling Human Resources Memes Data Analysis Employees Banking Botnet External Harddrive Equifax Consultation Fleet Tracking Application Analytic eCommerce Relocation Tablets Network Management Knowledge Printers SQL Server Sync Advertising Flash Device security MSP Technology Tips Product Reviews Managing IT Services GDPR Managing Risk CIO Windows XP Desktop 3D Finance Ebay Audit Webinar Surveillance Tech Hypervisor Staffing CCTV Google Wallet Nanotechnology Thin CLient Social Network Fake News Read Telework Productuvuty Managing Stress Personal Information Regulation Financial CrashOverride 3D Printing Capital