You probably use strong and unique passwords to prevent hackers from taking over your online accounts but is that enough? Maybe yes but I can’t say that with enough confidence because my Google and Facebook accounts have been compromised in the past despite using very complex passwords that can’t be easily guessed.
Like most… Read More
What does this Automator Workflow do? Saves selected email messages as files
How do I make this Automator Action? Follow these steps (See Figure 1):
… Read More
This week I was dealing with an ESX vSphere v4.0.0 that wasn’t booting properly and had problem with mounting VSD.
it was showing the following message:
“VSD Mount Failed
You have entered the recovery shell. You can try booting in troubleshooting mode to attempt to fix the issue. If… Read More
Imagine just how much private information has passed through your mobile phone. Now imagine that information in the hands of your ex-boyfriend, your boss or even an identity thief. Software that can relay all your calls, texts and movements to a third party is available for download online, and what’s… Read More
We are aware that our clients may have been affected by the recent flooding and we have set out some general advice which we hope will assist in some way those who are recovering from these events.
Based in Brisbane’s CBD, Vincents Forensic Technology are well placed to assist clients… Read More
As computers, and specifically graphics cards, have gotten more powerful, our passwords have become increasingly vulnerable, and the days of eight characters being the standard password length are over. To be honest, they have been over for quite some time, but it’s only now that the rest of the world… Read More
Using copper cables to transfer data around a computer? Get your head out of the sand, Grandpa! Intel thinks that’s on the outs and is touting its recent accomplishments with Silicon Photonics and integrated lasers, using light pulses to move data at 50Gbps (last time we… Read More
Wireless presentation controllers have changed corporate life forever. Instead of businessmen and women staying tethered to their keyboards while delivering boring PowerPoint presentations, they can wander about the room, gesticulating authoritatively with an ego-boosting gadget in-hand… while delivering that same boring presentation. Now a security researcher by the name
ARE you sure that the keyboard or mouse you are using today is the one that was attached to your computer yesterday? It might have been swapped for a compromised device that could transmit data to a snooper.
The problem stems from a shortcoming in the way the Universal Serial… Read More
Photocopiers are a “digital time bomb” packed with highly sensitive personal and company data that could fall into the wrong hands, according to leading forensic accountants Vincents Chartered Accountants.
Vincents Director of Forensic Technology Daniel Hains said information processed on digital copying machines roughly manufactured post-2000 can be… Read More
32 Turbot St
Brisbane QLD 4000
PO Box 13004
George St QLD 4003
Level 19 MLC Centre
19 – 29 Martin Place
Sydney NSW 2000
GPO Box 4638
Sydney NSW 2001
31-33 London Circuit
Canberra ACT 2600
GPO Box 680
Canberra ACT 2601
50 Davenport St
South Port QLD 4215
PO BOX 5266
GCMC Bundall QLD 9726