A personal request….

If we have ever helped you out in any way, saved you time, or maybe money, or possibly your data, or just put a smile on your face, could I ask you to help us?

We would appreciate it dearly if you could be so kind as to refer your friends or business contacts to us, and if you have time, leave us a review on Google or even just keep us in your thoughts and prayers!

Ideal connections for us are small and medium businesses, from just a handful of people, to dozens of computers and even companies with multiple locations. Businesses who we work best with are law and medical offices, churches & non-profit organizations, manufacturing, and just about anyone with computers, servers, networks, voice over IP phone systems. We are even a great match for home based offices who rely heavily on their computers.

Know of a particular need?  A business considering a new server, phone system or maybe replacing a single computer or even a dozen of them? We’re perfect for that!

I know your time is valuable, but if you could help us out with a referral, I would appreciate it more than you know. Referrals and reviews help keep us busy and out of trouble.

Speaking of reviews…  When someone searches Google for “Greenville Computer Service” it doesn’t matter so much, but if they go to Google Places or search from something like “Greenville Computer Repair Shop”, they are presented with the local search listing, which DOES show reviews. A person who needs help will likely call the business with the highest number of reviews and the highest score.   Please help us by leaving a positive review for us.

You can find our reviews here:

https://plus.google.com/112683747267029712129/about?hl=en

In order to leave a review, you will have to convert your regular old Gmail account over to a Google Plus account (if you have not already), which is free, simple to do, and gives you a number of new networking tools to use yourself.  Once you have done so, you can leave a review.  Please consider marking us a “3”, if you have been happy with us!

If you already have helped with a referral or a review, you have my deepest gratitude!  THANK YOU!

John

You need a second pair of eyes on your business computer, server & network

If you maintain your own company computer, server & network or do you have someone in-house that does, it might be a good idea to get a second pair of eyes to give your business infrastructure a once-0ver.

If you are like most people, when everything is running well, you get comfortable and begin to do the job you were hired to do, so if you are the accounts manager and pull double duty as company IT administrator, chances are, you get back to doing what you do best – taking care of the accounts.  That is, until something comes along and throws a wrench in the works and your networking is not working.

But what about all those updates? Do you back-burner those until there is a good time to reboot the server? After all, rebooting the server takes everyone down, and causes your phone to light up with questions like, “When will I be able to access the X drive again?”.

During the time between updates, your server and other systems are vulnerable. It honestly may not be a matter of IF your network is compromised, but rather, WHEN.

Many non-dedicated IT admins will apply the updates but not reboot the server, or will wait until there are so many updates it may take 2 or three reboots to get everything applied. This is a very bad practice. Especially for servers facing the internet (Mail, SQL, Web).

What about backups?  You ARE backing up, and it does work properly, right?

Don’t get caught with your pants down.  Bring in an IT support company who can help you determine where you stand. Are you overworked and just unable to do it all? Consider an IT company who will provide you with a statement to that affect which you can provide to your manager or superior to document that there is additional work to be done.  Sure, you’ve told them time and time again, but maybe, just maybe, they might listen to an outside source.

Let Homeland Secure IT be that source of information. We’ll come in and take a look at the state of your network, provide suggested course of action, and can even quote the labor or upgrade of components (if required). Simply don’t have time to maintain all this gear and want to source it to someone who will be on top of it?  Then we’re on IT! Give us a call at 864-990-4748 or use the contact link above.

We provide complete IT service, sales and consultation to the entire Upstate of South Carolina. We’re your Microsoft, Cisco, Symantec, Trend Micro, Lenovo, HP partner, specializing in small and medium businesses (SMBs) just like yours!

 

Want to connect outside of IT service and your work or business?

This is about a different kind of connectivity…  I really enjoy talking on the phone, emailing, texting, and communicating on social media with you every day about work and IT related issues, and I love it when we can help you or your business resolve a computer or server problem and get you back to work. But what I would like even more, is to connect with you on a more personal level! Some opportunities for us to interact might be:

September 29th, 6:00 PM – “Sippin’ In Simpsonville” – a beer tasting event, combined with Oktoberfest.  It starts at 6pm, downtown Simpsonville near the clock tower.  A number of local places are participating there, then at 7:30, my band, Hot As A Pepper, will play while people mingle and enjoy bratwurst and libations.   Of course, we won’t have a lot of time to talk between sets, but hey, I would love you to come, if you are into that sort of silliness.

Our band also opens rehearsals up for a few people to come visit. If you would like to do that, let me know! Space is limited, so we ask everyone who wants to come to make arrangements at least a day in advance. It can get kind of intense. We play music for a couple hours and whine, uhmm no, we critique the songs, yeah, that sounds better.

Do you smoke cigars? (Even if you don’t, but that wouldn’t make sense) I hang out with some pretty cool people on Thursday afternoons at a place over near Haywood Mall (Outman Cigar and Martini Bar). It’s not just a bunch of men, there’s a contingent of women who grace us with their presence too. It’s all about connections, talking to friends about whatever the subject of the day is. The crowd consists of people of all walks of life from business professionals to entrepreneurs, hard workers and non-workers. Anywhere from half a dozen to two dozen people show up. Talk to me about it, let’s meet there.

Into technology, want to hang out with people who are either into it themselves or looking for others who are it?  Tech After Five (TA5) is an event that takes place once a month in Greenville at Carolina Ale House, oddly enough, after five PM.  I try to make them to meet up with over a hundred interesting people.  It’s free for tech people. Free is good.

You could join my family at church on Sundays at Powdersville’s Marathon Church. We go to the 11AM service and almost always go out to lunch afterward.

Want to enjoy the sights, sounds and the smells of high school football?  There’s lots of the season left and our son plays center for Easley High School.  Come out and sit with us. We get catty and talk about people, and I snap pictures of everyone within focal distance.

Coffee? Lunch? Let’s do that too!   Especially if you are buying, but even if you are not, that’s okay! I’m up for just about anything.  Sushi? Mexican? Taco Truck? You name it!

Interest piqued?  Email…   Call me, maybe? Let’s get to know each other…

 

Seneca Data 2000UP Ultrabook offers big power in a little package!

Seneca Data 2000UP Ultrabook computer

Seneca Data 2000UP Ultrabook computer

Been looking for a powerful, yet compact notebook? Seneca Data has introduced the new 2000UP Ultrabook computer and it looks like a winner!

Why go with Seneca Data’s product over another brand? Let me give you one good reason – SUPPORT! In the last week we have had two computers with issues that required a massive amount of time communicating with the manufacturer. One was from HP and one from Lenovo. When I say “massive”, I mean just that. Over half an hour was spent with HP in order for them to determine that we (we’re some tech savvy IT dudes) knew how to plug it in, before they determined it needed replacing. Same story with Lenovo, but even worse, as they had the warranty information wrong, and we were bounced from person to person.

With Seneca Data, when we call them, we are treated with respect, and we don’t get bounced from person to person. The technician we speak with is able to determine that what we are telling them is indeed a problem, and they arrange for the replacement parts to be sent to us right then and there. No delays.

They also have awesome warranties! Most of our desktops and servers are now sold with a minimum of 3 year warranty, and many with FIVE YEARS for just a few dollars extra.

Here’s some information about the Seneca 2000UP Ultrabook computer:

Seneca Data 2000UP Ultrabook

Seneca Data 2000UP Ultrabook

Ultra responsive, Ultra sleek, Ultrabook.  Inspired by Intel.

Business-class performance comes in the Nexlink® 2000UP Series Ultrabook™ with the 3rd generation Intel® Core™ processor.

Discover the new business-class device that gives you the best of everything  you want for your company. The ultra responsive, ultra sleek Nexlink® 2000UP  Series Ultrabook™ is less than an inch thick, wakes up in a flash, and runs for hours.

Get the power your business demands, effortless multitasking, and incredible performance that adapts to your needs with this solution. With performance like this, the only thing more amazing than a new Nexlink 2000UP
Series Ultrabook™ is what you will do with it.

Processor:
3rd generation Intel® Core™ i5 Processor
3rd generation Intel® Core™ i3 Processor

Operating System: Genuine Windows® 7 Professional 64- or 32-bit option*

Chipset: Intel® HM77

Memory: Support for up to 8GB

Storage:
Up to 256GB Solid State Drive or
Up to 500GB SATA3 Hard Disk Drive

Graphics: Intel® HD 4000

Communications:
10/100/1000 LAN
802.11b/g/n Wi-Fi
Bluetooth® 3.0

Expandability:
2 x USB 3.0
1 x USB 2.0
1 x RJ45
1 x Audio Jacks
1 x HDMI
1 x DC in

Devices:
Integrated 1.3/HD Web Camera
4-in-1 Card Reader

LCD Display: 14.1″ LED Backlit; 1920 x 1080 Resolution

Battery: 6-Cell Li-Ion

Special Features:
Intel® Anti-Theft Technology Support
Kensington® Lock Supported

Dimensions: (w x h x d) 13.5 x .7 x 9.25 inches / 344 x 17.9 x 235 millimeters
Weight: 4lbs. / 1.8kg with battery

* 32-bit operating system will not use beyond 4GB of memory

If you need mobile computing without the weight or the wait associated with some compact computers, then this Ultrabook is for you….  Call 864-990-4748 and let us tell you more about why Seneca Data computers are perfect for your home or business. We offer sales of single units or multiples. We can deploy them at your Greenville, Anderson, Simpsonville, Spartanburg SC area business and we can also provide leasing!

 

Reveton Ransomware Removal – You have been violating copyright and related rights law FBI warning

Here’s a few calls we have received in the last couple weeks:

“My computer is locked and a screen is displaying a message from the FBI saying I have to pay a fine in order to use it again”

“A window says I am in violation of the law for downloading media or port and says it is from the FBI”

One user in the know says, “I am infected with the Reveton FBI virus, can you remove it?”

Without question, this has been one of the more popular exploits we have seen so far this year.  It is called the Reveton virus, and is part of a Citadel malware payload that distributes a number of malicious software.

This is so popular that the FBI has had a “new internet scam” page up since August and this is an excerpt from that page that goes back to May 2012. (This is not new by any means):

The IC3 suggests the following if you become a victim of the Reveton virus:

  • Do not pay any money or provide any personal information.
  • Contact a computer professional to remove Reveton and Citadel from your computer.
  • Be aware that even if you are able to unfreeze your computer on your own, the malware may still operate in the background. Certain types of malware have been known to capture personal information such as user names, passwords, and credit card numbers through embedded keystroke logging programs.
  • File a complaint and look for updates about the Reveton virus on the IC3 website.
Pay close attention to that third bullet point. Some tools and anti-virus appear to clean Reveton, however it is possible that the malicious software it is still running in the background. Some of the features of the Citadel malware package are keyloggers, remote monitoring (ability to turn on webcams) and more!
A fresh install of the operating system is always the most sure-fire way to fix a virus infection, but after a reinstall, you will have to reload all of your applications, then patch the OS, Adobe, Office, Java, in order to insure you do not get re-infected!
You can avoid becoming infected by keeping your Microsoft Windows operating system up to date, applying the latest patches and updates for Microsoft Office, Internet Explorer, Firefox, Chrome, iTunes, Adobe (Flash, Shockwave, Acrobat, Reader) and Java, and keeping a quality anti-virus product current.  Combine those simple things with regular backups and a little common sense when visiting websites and opening emails and you will reduce your chances many times over.
Anyone in the Upstate (Greenville, Easley, Clemson, Simpsonville, Spartanburg, Anderson) SC area who needs help removing this or any other virus, trojan, malware, ransomware of malicious software should call us at 864-990-4748, we have affordable rates and quick turn-around. We specialize in business computer, server and network system sales, security and service, but provide repair for individuals in our office.

 

Secure IT Alert: Patch your Microsoft Internet Explorer – Now….

This alert comes courtesy of the US-CERT National Cyber Awareness System and we highly recommend you apply the patches provided by Microsoft to protect your Internet Explorer browser immediately. Hackers are currently using the browser vulnerability to exploit systems.

In addition to patching your systems, we recommend a bit of common sense, such as not visiting links which are sent to you in email that look suspicious. If it looks strange, it probably is.

National Cyber Awareness System
US-CERT Alert TA12-265A
Microsoft Releases Patch for Internet Explorer Exploit

Original release date: September 21, 2012 Last revised: —

Systems Affected 

* Microsoft Internet Explorer 6
* Microsoft Internet Explorer 7
* Microsoft Internet Explorer 8
* Microsoft Internet Explorer 9

Overview

Microsoft has released Security Bulletin MS12-063 to address the  use-after-free vulnerability that has been actively exploited this  past week.

Description

Microsoft Internet Explorer versions 6, 7, 8, and 9 are susceptible  to a use-after-free vulnerability. This vulnerability is being  actively exploited in the wild. Microsoft has released Security Bulletin MS12-063 to patch this vulnerability and four others.

This vulnerability was previously mentioned in US-CERT Alert  TA12-262A. Additional information is available in US-CERT  Vulnerability Note VU#480095.

Impact

A remote, unauthenticated attacker could execute arbitrary code,  cause a denial of service, or gain unauthorized access to your files or system.

Solution

US-CERT recommends that Internet Explorer users run Windows Update  as soon as possible to apply the MS12-063 patch.

References

* Microsoft Security Bulletin MS12-063
<http://technet.microsoft.com/en-us/security/Bulletin/MS12-063>

* US-CERT Alert: Microsoft Security Advisory for Internet Explorer Exploit
<http://www.us-cert.gov/cas/techalerts/TA12-262A.html>

* Microsoft Windows Update
<http://go.microsoft.com/fwlink/?LinkID=40747>

* US-CERT Vulnerability Note VU#480095
<http://www.kb.cert.org/vuls/id/480095>

 

Revision History

September 21, 2012: Initial release

As always, if you require assistance applying these security patches or have questions about your Greenville / Upstate, SC business computer and network security, please call us at 864.990.4748 or use the contact link in the menu above.

SECURE IT ALERT: About that Apple iTunes 10.7 update – yeah, it fixes more than *160* different vulnerabilities!

Lately I’ve had a lot going on between our son, Brett Albertson (Easley High School football center #75) and his slew of activities, our daughter Megan in college, my band (Hot As A Pepper) and work. Because of these distractions I almost missed an important security update.

A few days back, Apple released the 10.7 update of iTunes. While you should update ALL your software regularly, many people wouldn’t really pay much attention to iTunes because it’s not an operating system or supporting application like a browser that you think of as being vulnerable to exploitation.  It’s just a music/video player, right? It just plays what it downloads from the iTunes store, right?

No, not at all.  It has the ability to play external media, hosted elsewhere besides the safety of the Apple servers, along with files stored on your computer that you didn’t purchase.

According to this security bulletin, it looks like over 160 vulnerabilities are addressed in this update and here is the key takeaway, “Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution”.

Since Apple is intentionally vague about what the vulnerabilities and gives  us only that one tidbit, I would recommend that you do not delay installing this update to your machines.   This includes Mac owners in addition to Microsoft Windows users.

If you have questions or need assistance, call us at 864.990.4748… If you’ve got computers or servers – we patch ’em!

 

SECURE IT ALERT: Internet Explorer Remote Code Execution Vulnerability

Here’s one you should be concerned with…

Title: Microsoft Security Advisory Notification
Issued: September 19, 2012
********************************************************************

Security Advisories Updated or Released Today ==============================================

* Microsoft Security Advisory (2757760)
– Title: Vulnerability in Internet Explorer Could Allow
Remote Code Execution
http://technet.microsoft.com/security/advisory/2757760
  – Revision Note: V1.2 (September 19, 2012): Added link to
Microsoft Fix it solution, “Prevent Memory Corruption via
ExecCommand in Internet Explorer,” that prevents exploitation of
this issue.

If you have questions regarding this vulnerability, please contact us and we will be happy to assist.

 

The Rocky Horror Show is at The Warehouse Theatre again – Don’t miss this #Greenville!

Last Saturday night was a fantastically fun night as John, Megan and her friend Jess, and I headed to the midnight showing of Rocky Horror Picture Show at the Warehouse Theatre in Greenville.  We were in attendance of the first production of Rocky Horror two years ago and awaited the chance to experience it again.  Megan and Jess were super excited and decided to dress for the night in antici—–pation!

Megan and Jess before Rocky Horror at the Warehouse Theatre

Megan and Jess before Rocky Horror at the Warehouse Theatre

We agreed that this year the audience participation was better and made for added unexpected entertainment.  The actors that returned for this production seemed even better as their skills were honed and witty.  Having Tim March in the audience was particularly hilarious as he heckled the actors with all of the anticipated lines from the days of the big screen production.  Tim taught Will Ragland (Frank ‘N’ Furter) how to crack a whip for one scene with Rocky (Graham Zielinski).  The whip failed to “crack” and Will Ragland was quick to point out that he “forgot to put batteries in it” for an impromptu jab at how difficult using a prop can be on demand.

“Working with Will Ragland must be incredible!” my daughter (Megan Hoyt, a music education major at Converse College) commented.  He adds such quick and unexpected twists in every production.  In one scene Will switches to a southern drawl when commenting on a RC Cola and Moon-Pie and also channels William Shatner as James T. Kirk in another.  I loved when he addressed the audience (Tim in particular) in his vocal performance of “I’m Going Home”!

Will Ragland with Megan and Jess at Rocky Horror

Will Ragland with Megan and Jess at Rocky Horror

Janet, played by Chelsea Atkins, was fantastic in her performance.  Her vocals were spot-on and her ability to stay in character was amazing.  I just don’t think I could stay so focused with the audience yelling “Slut”!  I do hope we will see more of Chelsea at the Warehouse Theatre as she has a great future ahead.  Several of the actors returned this year from 2010’s production of Rocky Horror.Chelsea and Brady Smith (Brad) had big shoes to fill and they did an excellent job with their roles vocals and acting.  Graham Zielinski was quite pleasing to watch in his role as Rocky  as he definitely had the build to display himself quite well!

Matthew Merritt’s portrayal of Riff Raff could not have been better.  He was quite captivating as the audience was drawn to his voice and interesting actions. You didn’t want to miss a moment!  We even loved his bump-up towards the end of the production when he addressed everyone, “I’m supposed to have a line here!” Always remaining in character. Jess Conneely (Theatre Major at Converse College) stated, “I like how incredible the actors were despite how late it was and how many times they’ve done it.  Also, how professional they were while still making it fun for the audience.”

I want to mention the bands performance was also a tremendous contribution to the production.  Megan, a music major, was quick to point out that the musicians were very much a part of the cast through their interaction with characters.  “The band members were extremely talented and worked their skills to a T,”  John noted as we were leaving the theater.  Some people come to see this play for the music.  Dancing in the audience to “Time Warp” and singing along to “Touch-A,Touch-A, Touch-A Touch Me” are experiences we’ll never forget!

Having grown up in the 80’s when Rocky Horror was still playing on the screen, it’s great to be able to share this with my children today.  A big “Thank You” is due to Brian Haimbach for once again directing his rendition of the show at the Warehouse Theatre.  And “Thank You” to Will Ragland for taking the time out of his busy schedule to display his talents in such a creative and captivating way.  This year he displays several wigs and “lets his hair down” even more for us to enjoy!  Greenville County’s Current Teacher of the Year is certainly well deserved.

You better get a ticket now because you don’t want to miss this performance of Rocky Horror.  They have a great online ticket purchase site at their website www.warehousetheatre.com  The 2010 performance was sold out and as it looks, this run certainly will too!   If you do miss it, you might find some other performances elsewhere… Here’s a list: http://www.rockyshows.net/

Pamela McAbee Hoyt – www.McAbeesCarpet.com

Dine out for No Kid Hungry this week, and participate in the TwEAT OUT! #NoKidHungry

Dine out for No Kid Hungry this week, and participate in the TwEAT OUT!  #NoKidHungry

Dine out for No Kid Hungry this week, and participate in the TwEAT OUT! #NoKidHungry

Bet you haven’t made plans for lunch or dinner this week. So, here’s your opportunity to get some good grub and help out a good cause at the same time.

The Dine Out For No Kid Hungry program is kicking off their week-long event that starts on September 16th and wraps up on September 22

Tomorrow, Monday September 17th from 9:00 AM until 9:00 PM Eastern, you can participate in the “TwEAT OUT” where you can join in the fun and help spread the word about Dine Out For No Kid Hungry on Twitter and Facebook!

How to Participate:

On Twitter:
Follow @Dine_Out and @NoKidHungry.
Retweet messages about the Dine Out For No Kid Hungry from these two accounts.
Use the hashtag #NoKidHungry in all your tweets
Share this tweet:

I’m dining out for #NoKidHungry this week. Join me by finding a participating restaurant in your area:http://dineout.nokidhungry.org/maps

On Facebook:
“Like” No Kid Hungry

Share news about Dine Out For No Kid Hungry with your Facebook friends:

I’m dining out this week for Share Our Strength’s Dine Out For No Kid Hungry. Join me by finding a participating restaurant near you! http://dineout.nokidhungry.org/maps

They have asked that bloggers post similar articles to this to help increase awareness too.