First of all a huge shout out to everyone who got involved and supported this venture! It's because of you that we are now open for business and can provide a premium computer repairs and sales service to the greater Brisbane area and I cant thank you and all of our customers enough! We will be doing a blog post at least once a week with the most interesting builds, latest PC topics and of course, up coming services and products from only the best manufactures. In this weeks blog, we'll be going through:
How you can protect your personal information, including passwords on your Smartphone and stop Hackers from stealing your online Identity
Our top 2 products from ASUS and AMD
Current specials - we'll posting up a new deal every week so keep your eyes out for a great deal!
Deal of the week!
Do you need a fantastic home computer for work or study but don't want to pay retail?
Introducing the Lenovo M700 SFF system.
Pre-built with Intel's powerful i5-6400 CPU,
Windows 7 Pro 64bit.
Powerful and professional, this computer is just what you need to work or study efficiently from home!
We'll even throw in the Lenovo T2254P 22" height adjustable monitor, similar screens are valued at $400! The T2254p is a 22” widescreen in 1680 x 1050 resolution. With with only a small base, this screen gives more than enough desk space needed and enough screen real estate to boost productivity. It has multiple connectivity options that makes it suitable choice for professional desktop PC or Laptop users. Order this amazing but limited offer through our website or our fb page and take this hot pc and screen offer home for just $900+shipping!
When picking your delivery method, you will have your choice of this package deal being delivered via courier to your home OR one of our friendly staff hand deliver it and set it up for you too.
ROG Strix GL502 packs the latest 6th gen Intel® processor and NVIDIA® GeForce® GTX™ graphics in a compact and lightweight design. Strix GL502 enables users to enjoy high-end gaming from anywhere.
Experience unmatched performance with ROG Strix GL502's 6th-generation Intel® Core™ i7 quad-core processor combined with a discrete NVIDIA®GeForce® GTX™ 1070 graphics with full Microsoft® DirectX® 12 support.
The latest hardware gives you efficient, powerful performance for heavy gaming or productive multitasking such as live streaming and video editing.
IMMERSIVE VIRTUAL REALITY
The VR Ready NVIDIA® GeForce® GTX™ 1070 GPU boosts speed and power efficiency for brilliant performance in Virtual Reality. Enjoy immersive virtual reality that is smooth, low-latency, and stutter-free.
BEAUTIFUL WIDE-VIEW PANEL
ROG Strix GL502 utilizes a 15-inch panel with super-fast wide-view panel to give you wide 178° viewing angles so there's no color shift even when you're viewing it from extreme positions. Full HD or 4K UHD? The choice is yours.
INCREDIBLY SMOOTH GAMEPLAY WITH NVIDIA® G-SYNC™
ROG Strix GL502's NVIDIA® G-SYNC™ display technology eliminates the lag and frame rate stutter you usually encounter with V-Sync. NVIDIA® G-SYNC™ synchronizes the display's refresh rate with the GPU. This reduces lag, minimizes frame rate stutter, and eliminates visual tearing — all without affecting system performance. What you do get is incredibly-smooth and stunning gameplay.
USB TYPE-C CONNECTIVITY AND MINI DISPLAYPORT
The reversible USB Type-C port gives you easier device connections and hyper-fast 10Gbps data transfer speeds via USB 3.1 Gen 2. Transferring a 2GB movie file just takes less than 2 seconds to complete! You can even hook up ROG Strix GL502 to a larger display via mini DisplayPort for an even more immersive gaming experience.
UP TO 32GB OF DDR4
ROG Strix GL502 is fitted with up to 32GB of DDR4 RAM, the latest standard in memory. Benefit from the improved speed, capacity, and lower power consumption of the newest generation to really boost your gaming experience.
SSD FOR SUPERFAST LOADING SPEEDS
NVMe PCIe SSD gives you superfast data access speeds so you spend less time waiting. ROG Strix GL502 boots up faster, loads apps quicker, and gives you shorter in-game loading times so you stay immersed and focused on the game.
Don't stop at a blazing fast SSD. Equip your ROG Strix GL502 with up to a SATA 2TB 2.5' HDD for an abundance of storage space.
ROG Strix GL502 has a specially-designed chiclet gaming keyboard with red-backlit scissor-switch keys that offer you 1.6mm of travel distance for tactile keystrokes. It also features highlighted WASD keys so you know where your hands need to be.
ROG GAMING CENTER
ROG Gaming Center improves your gaming experience. This integrated control center gives you access to all the functions you need – find system information, set up hotkeys for faster in-game commands, adjust audio settings, or record gameplay from a single dashboard.
In addition, ASUS GameFirst III technology optimizes network traffic for faster, lag-free online gaming. Its intuitive interface lets you choose between four preset package priority modes (Optimization, Game, Media Streaming, and File Sharing) via its intuitive interface.
AMD Ryzen 7 1800X
Unlocked 8 Core 16 Thread CPU,
3.6GHz Base Clock,
4.0GHz Precision Boost with 4.0GHz+ XFR Technology.
Includes 95W TDP, 16MB L3 cache using the AM4 Socket.
The AMD Ryzen 7 1800X is the top-of-the-line processor from AMD’s new Ryzen range of CPUs on the market today. A huge eight cores, it’s a monster chip that’s designed to power through the heaviest of workloads – and take on the likes of the Intel Core i7-6900K.
AMD releasing a CPU isn't new, but this time round the company has delivered on its promises by way of a leap in performance and power efficiency.
As a result, the AMD Ryzen 1800X and the rest of the AMD Ryzen lineup bring true competition to the CPU market for the first time in a decade.
Is your phone safe at the shops?
A hacker is turning on your phone’s microphone and camera right now, listening and watching as they track your every move. Scary thought isn't it?
Made me stop and think. Ive got passwords, client details, my bank accounts all on my phone but is it really safe? I dont think it is.
Check Point’s Nadav Peleg is a cyber security expert who breaks into protected systems and networks to expose vulnerabilities, so they can be fixed for a living. He was able to show just how at risk every day Australians are. Nadav visited the news.com.au offices some time ago to show just how susceptible smartphones are.
I've been in IT for the past 10 years and I've never experienced a hack on my phone however, I didn't think it would be that easy for a hacker to gain access to my smartphone or tablet.
“You can have lots of blocks and barriers on the phone, but most of the attacks we see today are happening through social engineering,” Nadav told news.com.au.
“So you don’t actually have to physically have the phone, all you need to do is trick people in order to accept either a malicious app, an email attachment or SMS in order to install a malicious profile that can take over your phone.”
While Nadav was with Matt Dunn, he showed an example of a Pokemon Go app on an Android device that had been infected with malware when it was downloaded.
Nadav was given full control of the infected Android via special software.
“The person may not even know their phone is infected with malware and, as the hacker doesn’t need direct access to the phone, they can use all of the features of the phone from a laptop anywhere in the world,”
This included but wasnt limited to having access to the phone’s calendar, GPS and messaging services among other things. Then Nadva was able to use his laptop to send a message from the hacked Android to another phone. This could be used to sign the owner of any phone up to an expensive SMS subscription services set up by the hacker to make them money.
So within a matter of minutes, Nadav was able to show Matt Dunn just a small portion of what a hacker could achieve using a control and command centre exploiting a compromised app.
Swapping from an Android to an iPhone, Nadav demonstrated how joining a public Wi-Fi can open users to hacking by using the Wi-Fi of a popular coffee shop as an example, Nadav demonstrated a man-in-the-middle attack.
This attack secretly relays and alters the communication between two parties who believe they are directly communicating with each other.
In this instance, Nadav said the user had been tricked into connecting to a third-party gateway with keylogging capabilities.
This means everything the person typed on their phone was republished in the program used by the hacker. Not only does this record conversations and browsing history, but it also captures usernames and passwords.
Nadav then headed to Facebook and the program showed what website was being accessed, as well as the username and an unmasked password that gave access.
“Now using the phone, I am inside the perimeter and that’s what criminal organisations use to gain access to more of the victim’s accounts and information,” he said.
Nadav said now people understand something as innocuous as a contact form on your website can pose a significant threat to your IT infrastructure, people should install mobile threat prevention applications like the one CheckPoint offer through its partnership with Optus.
Article credit goes to Matt Dunn and the www.news.com.au team and has been altered. Link to the original article is in the credits.
Nine Steps to help protect your Smartphone from hackers
Lock your phone when you're not using it. Set a password and change it regularly to prevent others from guessing it. Lock patterns are an alternative if you have trouble remembering your password. Your phone may also have a facial-recognition lock feature. If this is on, the device unlocks only when the camera detects your face. Voice recognition is another option; with this turned on, your phone needs to hear your voice say a specific word or phrase to unlock.
Activate your phone's tracking capability, if it has one. If your phone supports this feature, you can see its location on a map and track the device when it moves. If your phone is stolen or lost, use the tracker app to lock it remotely. This makes it harder for hackers to access your data.
Update your phone's firmware to the most current version. Many phones do this for you automatically, but if you've turned this option off, you'll need to download the update manually. You can download the latest update directly from your phone. Alternatively, connect your phone to the computer and launch the software that came with the device. The application will connect to the download Web page and install the firmware on your phone.
Install apps on your phone only if they come from a trusted source, such as the manufacturer's app store. Most official app stores verify the authenticity of their products, so they're much safer. Before downloading any app, read the description and reviews so you understand what you're getting.
Check an app's permissions before installing it. If an app requests access to your personal information, don't install it or deny the request. Also thoroughly read the app's reviews.
Avoid leaving your phone alone in a public place, such as on a restaurant table or on your office desk. If you must leave the phone, keep it locked to deter theft.
Delete text messages from unknown senders that ask for your information, and avoid clicking links in messages. Some hackers send messages that appear to be from your bank or another trusted source. If you click the link in the message, the hacker can steal your information or install malware on the phone. Don't download apps via text message; this is a common way for hackers to infect your device.
Access the Internet on your phone only from a secure Wi-Fi network. Wi-Fi networks that aren't secure allow nearby hackers to intercept your data when you get online. Don't do any shopping or banking on a public Wi-Fi network; hackers can swipe your bank account number or other financial information. Instant-messaging and other communications apps may contain security holes that allow hackers to snatch your personal data. If you have reception and Mobile Data, use it instead of public Wi-Fi.
Protect your phone with an anti-virus app. Check your phone's app store to see what's available for your device.
Credits and other
Sources for text and image content from:
http://www.trustedreviews.com/amd-ryzen-7-1800x-review https://www.universityofcalifornia.edu/sites/default/files/riverside_android2_hero.jpg http://fm.cnbc.com/applications/cnbc.com/resources/img/editorial/2015/10/23/103104646-GettyImages-504056279.1910x1000.jpg
Thank-you for reading!
Please like, comment and share this blog around and let us know if you liked this blog post and what you would like to see more of next week. We'll post up this weeks deal later this afternoon so stay tuned
Home Run Computing