September 2014 - Hackensack, NJ | Net It On

    blog-img

    For users of Unix-based operating systems, there's a new threat on the loose. The vulnerability, promptly called the Bash bug, or "shellshock," is targeting systems equipped with Linux and Mac OS X. The bug allows remote users to execute arbitrary code within the operating system.

    Read More
    blog-img

    One California restaurant owner has recently taken on an interesting marketing strategy that goes against all conventional wisdom. Co-owner David Cerretini of the Italian restaurant Botto Bistro tells his strategy to USA Today, "I want to be the worst restaurant in the San Francisco area!" Strangely enough, his approach seems to be working.

    Read More
    blog-img

    As a business owner, your email contacts list is probably chock-full of clients and customers you've met over the years. This can make it difficult to find your target without sifting through countless names. Instead of getting flustered by an unorganized list, try sorting your contacts in various ways.

    Read More
    blog-img

    In a survey by Cyber-Ark, close to half of employees interviewed admitted that if they were fired tomorrow, they would take with them their former company's proprietary data. This is a shocking revelation considering how much you trust your current staff, maybe even to the point of referring to them as "family." What can you do to protect your business from a former employee with ill intentions?

    Read More
    blog-img

    The cloud is becoming a very important part of the modern-day business, and for good reason. It frees companies from the restricting physical nature of servers, desktops, and other hardware. In fact, according to Joe McKendrick of Forbes magazine, four-out-of-five small businesses will soon operate on the cloud.

    Read More
    blog-img

    The Target data breach seems but a distant memory now, yet the same malware strikes again, this time at Home Depot. The hacking attack targeted the millions of credit and debit cards used at these large retailers, but these attacks could have been mitigated with proper precaution.

    Read More
    blog-img

    Data centers are truly modern marvels. These warehouses full of servers are responsible for harboring most of the Internet, and these facilities are popping up all over the place. As great as data centers are, according to a new study by the National Resources Defense Council, the increasing demand for data doesn't bode well for the environment.

    Read More
    blog-img

    For people that have super-busy schedules, reading books seems like a luxury, but somehow, the most successful people always seem to have time to read the latest publications pertaining to their field. How do they do it? Many avid book readers have a little help.

    Read More
    blog-img

    What's the licensing status of your company's software look like? If you've not been intentional about this, then your business may be using several unlicensed applications. You may be thinking, "Everything works fine. No big deal." Sure, it's no big deal--until you're caught!

    Read More
    blog-img

    It's back to school time and the battle of getting your kids to play less video games so they can get their homework done begins anew. What if a fun video game can teach your kid a marketable skill like programming? This is the case with the popular video game by Mojang, Minecraft.

    Read More
    • 1