facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Dogecoin Hacked! Such Loss.

b2ap3_thumbnail_docecoin_wow_400.jpgDoge, the Internet meme of a grammatically-challenged Shiba Inu dog that prefers comic sans, is so popular that it has its own online currency called Dogecoin. The fact that Dogecoin exists may be news to you, but it's also news that Dogecoin is temporarily stopping its service after its database (the Doge Vault) was hacked.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Business Saving Money Network Security Email Malware Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer Mobile Devices Quick Tips Smartphones Innovation User Tips Gadgets Business Continuity VoIP Microsoft Office Disaster Recovery Android Network Social Media Mobile Office Data Backup Virtualization Collaboration Server Productivity Mobile Device Management Smartphone Communication Data Recovery Miscellaneous Windows 10 Upgrade communications Tech Term Ransomware Unified Threat Management IT Support Windows Operating System Holiday Facebook Remote Monitoring Passwords BYOD Apps Remote Computing Cybersecurity Mobile Computing Managed IT services Vendor Management Users Phishing BDR Automation WiFi Marketing Mobile Device The Internet of Things Analytics Firewall Apple Data Management Outsourced IT History Alert Artificial Intelligence App Internet of Things Managed IT Services Browser Save Money Big data Encryption IT Consultant Office Content Filtering Office 365 Maintenance Printer Going Green Spam Bandwidth Cloud Computing Gmail Health Bring Your Own Device Antivirus Windows 8 Outlook Cost Management Best Practice Information Technology Lithium-ion Battery Virus Budget Tech Support Hiring/Firing Two-factor Authentication Business Technology Managed IT Hard Drives Help Desk Wireless Technology Saving Time Cybercrime Search Windows 10 Training Update Hacking Access Control IBM Healthcare Money Document Management Blockchain Phone System Recovery Computers VPN Employer-Employee Relationship Travel Education Regulations Risk Management SaaS Information Humor Hard Drive Save Time Law Enforcement Mobility It Management Customer Service Augmented Reality Compliance Data storage PowerPoint Proactive IT Running Cable Applications Website Government Managed Service Administration Intranet Networking Twitter Legal Digital Telephone Systems Project Management Password Cortana Websites Value Avoiding Downtime Paperless Office Fax Server Hacker Sports iPhone Disaster File Sharing Computing Hosted Solution End of Support Business Intelligence Robot Digital Payment Excel Google Maps Securty Router Downtime User Social Engineering Customer Relationship Management Data Security Comparison Tablet Social Solid State Drive Wireless Patch Management Company Culture Black Market DDoS Flexibility Computer Repair Data Loss Social Networking Scam Cryptocurrency Laptop Current Events Business Growth Data Breach Word Machine Learning Distributed Denial of Service Office Tips eWaste Monitoring Inbound Marketing Streaming Media YouTube Lifestyle Start Menu Tech Terms Public Cloud Cooperation Mobile Technology Unified Communications Settings Pain Points Identity Theft Vendor Net Neutrality Management Processors Software as a Service Chrome USB Uninterrupted Power Supply Presentation Vulnerabilities Virtual Reality Bitcoin Politics IT service Computer Accessories Specifications Safety Emails Virtual Desktop Data Protection Automobile Chromebook Gaming Console Computing Infrastructure Hack Trending Documents Bluetooth Mouse Entertainment Heating/Cooling How To Storage Text Messaging Download Webcam Private Cloud Programming Google Docs Statistics Redundancy Experience Conferencing Co-managed IT Telephony Network Congestion User Error Retail Evernote Microchip Taxes Monitors Cleaning SSID Devices Public Speaking Technology Tips CIO Dark Web Fraud Tactics Smart Phones Virtual Assistant Reading Samsung Advertising Flash Audit G Suite Staffing Google Wallet Health IT Recycling Fake News Employer Employee Relationship Windows XP Processing Analytic UTM Shortcut Content Society Troubleshooting Legislation Error Adminstration Pirating Information Data Warehousing Hacks Physical Security Displays Managed IT Service Product Reviews IT Plan Entrepreneur Enterprise Resource Planning Leadership Licensing Read HIPAA Accountants A.I. Access Banking Botnet Micrsooft Bookmark email scam Environment Addiction Emergency Hard Drive Disposal Relocation Tablets Best Practives Computer Care Sync Drones Electronic Payment Microsoft Excel Google Play Multi-factor Authentication Competition Device Management Business Owner Wireless Headphones Telephone Google Drive Windows Server 2008 Notifications CCTV Processor Migration Connected Devices Medical IT Content Management Equifax IP Address Fleet Tracking Spyware Mobile Payment Business Metrics Computer Malfunction Browsers Business Managemenet Network Management Microserver Vulnerability Reliable Computing Permissions Language Upselling Electricity Printing In Internet of Things User Tip Human Resources Security Cameras Device security Application MSP Music online Currency Nanotechnology Social Network Video Surveillance Windows 7 switches Writing Navigation Desktop Finance Get More Done Professional Services Startup Asset Tracking Printer Server cache Television Motion Sickness Upgrades Data Analysis Business Cards Service Level Agreement Saving ZTime Turn Key Scalability Username Trojan WannaCry Downloads LinkedIn Unified Threat Management Backup and Disaster Recovery Messenger Tracking LiFi GDPR Digital Signature Screen Reader Customer Resource management Debate Organize Time Management Freedom of Information Rental Service Meetings Tech Teamwork Gamification Harddrive Corporate Profile Voice over Internet Protocol Archive Smart Tech Distribution GPS Assessment SharePoint Web Server Deep Learning Fileless Malware Skype Piracy Upload Cabling Work/Life Balance HTML Google Calendar Wi-Fi Administrator Proxy Server Fiber-Optic PDF Database External Harddrive Tip of the week Books Workers Visible Light Communication Memory Modem Electronic Medical Records Telephone System Touchscreen News Supercomputer IT consulting Term Point of Contact Best Available Mobile Security Keyboard VoIP Recording Multi-Factor Security Domains Cost 3D Ebay Webinar Consultation Directions Software License Trends Thin CLient Knowledge Worker Regulation Capital Productuvuty Printers CrashOverride 3D Printing Managing Stress