facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Protect Your Network By Blacklisting Malicious IP Addresses

b2ap3_thumbnail_know_your_ip_400.jpgLike your fingerprint, your computer’s IP address holds the key to your identity. Okay, it may not be as unique as your fingerprint, and you may actually use multiple IP addresses every day, but still, your IP address says a lot about you. What do you need to know about your IP address?

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Hackers Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Network Security Business Saving Money Email Malware Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer Mobile Devices User Tips Smartphones Quick Tips Innovation Gadgets Business Continuity VoIP Disaster Recovery Microsoft Office Network Android Social Media Collaboration Mobile Office Virtualization Productivity Data Backup Server Communication Smartphone Mobile Device Management Miscellaneous Data Recovery Tech Term Windows 10 Upgrade communications Ransomware Windows IT Support Unified Threat Management Facebook Holiday Remote Monitoring Operating System Passwords Managed IT services Phishing Mobile Computing Vendor Management BYOD Cybersecurity Remote Computing Apps Users WiFi Automation BDR Marketing Mobile Device Data Management Analytics The Internet of Things Apple History Outsourced IT Firewall Managed IT Services Save Money Alert Artificial Intelligence Internet of Things App Browser Encryption Big data IT Consultant Content Filtering Going Green Cloud Computing Maintenance Printer Office Office 365 Bring Your Own Device Health Antivirus Gmail Spam Bandwidth Outlook Cybercrime Managed IT Windows 8 Lithium-ion Battery Best Practice Information Technology Saving Time Windows 10 Cost Management Tech Support Virus Help Desk Wireless Technology Budget Training Search Two-factor Authentication Business Technology Hiring/Firing Hard Drives Employer-Employee Relationship Computers IBM VPN Travel Hacking Update Access Control Phone System Money Healthcare Document Management Blockchain Recovery Running Cable Compliance Proactive IT Mobility Data storage Applications Twitter Humor Intranet Managed Service Education Augmented Reality Networking Legal PowerPoint Regulations Risk Management Administration Customer Service Save Time SaaS Information File Sharing It Management Law Enforcement Hard Drive Website Government iPhone Computer Repair Data Loss Solid State Drive Scam Fax Server Social Engineering Word Social Networking Excel Flexibility Black Market Value Data Breach Password Cortana Cryptocurrency Laptop Customer Relationship Management Project Management Hacker Digital Business Growth Websites Machine Learning User Telephone Systems Paperless Office Business Intelligence Sports Management Computing Social Digital Payment Disaster Current Events Router Downtime End of Support Wireless Hosted Solution Robot Avoiding Downtime Data Security DDoS Comparison Tablet Securty Patch Management Company Culture Google Maps Virtual Reality Pain Points Mouse Politics Automobile Lifestyle Retail Bluetooth Emails Redundancy Programming Chromebook eWaste Statistics Network Congestion Computing Infrastructure Hack Google Docs How To Evernote Conferencing Download Cooperation Experience Private Cloud Vendor Streaming Media Monitors Gaming Console Processors Cleaning Office Tips Start Menu Tech Terms Telephony USB Webcam Presentation Monitoring Microchip Taxes Text Messaging Mobile Technology YouTube Distributed Denial of Service Net Neutrality Software as a Service Uninterrupted Power Supply Specifications Safety Chrome Unified Communications Settings Virtual Desktop Public Cloud Vulnerability Bitcoin Documents Identity Theft Data Protection User Error Entertainment Vulnerabilities Computer Accessories Inbound Marketing Co-managed IT Heating/Cooling Storage IT service Trending Keyboard Startup Asset Tracking Electronic Medical Records Upgrades In Internet of Things Corporate Profile Business Cards Service Level Agreement Term Time Management Freedom of Information Best Available Skype Domains Unified Threat Management Backup and Disaster Recovery Directions Archive LiFi Assessment SharePoint Username Recording Tip of the week Public Speaking Screen Reader Customer Resource management Dark Web Motion Sickness Google Calendar Gamification SSID Scalability Shortcut Smart Tech Distribution Health IT Point of Contact Deep Learning Upselling VoIP Best Practives Piracy Upload Processing Work/Life Balance Messenger Tracking Touchscreen News Knowledge Troubleshooting Fiber-Optic Database Managed IT Service Visible Light Communication Memory Rental Service Meetings Video Surveillance Consultation Entrepreneur HTML Saving ZTime Virtual Assistant Microserver HIPAA Telephone System Bookmark IT consulting Web Server Technology Tips Environment Mobile Security Cabling Competition Multi-Factor Security Cost Analytic Wi-Fi Administrator Audit Electronic Payment Software License Trends Google Play Recycling Books Workers Fake News Product Reviews CIO Harddrive Get More Done Business Owner Fraud Tactics Processor Advertising Flash Supercomputer Debate Data Warehousing Devices Worker Emergency Hard Drive Disposal Turn Key IP Address Browsers Read Windows XP GPS Access Printer Server UTM Content Medical IT Staffing Google Wallet Microsoft Excel Application Legislation Error User Tip Displays Computer Care Trojan Human Resources IT Plan Enterprise Resource Planning Security Cameras Society Reading Samsung External Harddrive Micrsooft G Suite email scam Addiction Navigation Device Management Employer Employee Relationship Google Drive Windows Server 2008 Organize Accountants A.I. Licensing Thin CLient Data Analysis Content Management Hacks Physical Security 3D Ebay Spyware Mobile Payment Multi-factor Authentication Professional Services Business Managemenet Drones Digital Signature Wireless Headphones Telephone Banking Botnet Electricity Printing Migration Connected Devices GDPR Relocation Tablets Smart Phones Equifax Fleet Tracking Sync Network Management Tech online Currency Permissions Language Windows 7 Teamwork Leadership Fileless Malware Notifications CCTV Adminstration Pirating Information cache Television Webinar Device security MSP Voice over Internet Protocol Nanotechnology Social Network Proxy Server switches Writing Business Metrics Computer Malfunction WannaCry Downloads PDF Desktop Finance Modem LinkedIn Music Reliable Computing CrashOverride 3D Printing Managing Stress Capital Regulation Productuvuty Printers