Originally from ©2017CARVIR INFOSEC®

CLASS COMPUTING ( is thrilled to be able to offer this elite Security Service for your companies IT Infrastructure.

The CARVIR™ security team provides the first line of defense – without the noise of managing threat intelligence, research, analysis and false positives. CARVIR will:

  • Kill malicious processes
  • Quarantine malware and infected files
  • Disconnect infected endpoints from the network to prevent lateral spread
  • Alert IT Security personnel via email and SMS
  • Immunize all other protected endpoints on the network against new, never-before-seen threats
  • Report and escalate

Heaps of deep forensic data are transformed into an intuitive visualization in real time. The attack storyline depicts the threat execution flow in high resolution, from inception. Our team can view a specific process on the attack story line and drill down into the individual network, file, process, or data actions that occurred. This information allows our team to take decisive action towards securing your network.

If escalation is needed, we will provide an outline of the attack details. This will often include attack statistics, file information, path, machine name, IP, domain, along with information about where else on the network the attack has been seen, what we’ve done to isolate or eliminate the threat and what your team’s next step should be, if any.

In addition, we can provide cloud reputation, certificate information (if the file is signed or not), and advanced attack details (such as a list of known packers that may have been used). And lastly, we will provide a .csv or .json file of the attack providing forensic level reporting on the threat for your incident response team reporting – especially helpful in compliance driven environments.


Leverage powerful, behavior-based threat detection to protect data from the types of advanced malware, exploits, drive-bys and script-based attacks that evade outdated, signature based anti-virus technology and sandboxing solutions in Windows, Apple and Linux environments.

Our team actively detects and prevents attacks, even those using memory, PowerShell scripts, insider attacks and browser based drive-by exploits. Once detected, we automatically shut down the attack on the infected machine and prevent lateral movement across the network.


Prevention starts with silent monitoring of all user- and kernel-space activity on the endpoint. Our security agent rapidly builds a complete context of normal system activity, which serves as the backdrop for the industry’s most advanced behavior-based threat detection.

With full visibility into the endpoint, the engine pinpoints malicious activity—even by the most sophisticated, stealthy attacks.

We secure Windows, OS X, and Linux endpoint devices (servers, workstations and laptops) for full endpoint protection.

Rollback Ransomware

Eliminate threats the instant they are detected with fully integrated response capabilities. If something slips through, we can reverse any attack-driven file damage and restore* files back to their previous trusted states with the click of a button.

Well, technically our team says it’s two clicks. But who’s counting?

And it’s not just ransomware. We protect data from the types of advanced malware, exploits, drive-bys and script-based attacks that evade outdated, signature based anti-virus technology and sandboxing solutions.

* Requires use of Windows Shadow Copy

Contact CLASS COMPUTING for a QUOTE today!

(312) 262-3930

Make Microsoft Office 365 Work For You Affordably

For about $4.95 per month you can get professional grade email hosted by Microsoft Exchange servers with 50 GB storage. You can use your custom or company domain and aliases. And for a couple bucks more you can add SharePoint, 1 TB of OneDrive Cloud Storage, MS Office Web Apps and Skype For Business. For the Power User you can load MS Office on up to 5 of that users machines for under $15 on a monthly basis (call for specific restrictions) Call Class Computing at (312) 262-3930. There are many more plans that make sense too.


Chicago & Suburbs are included in the LTE ADVANCED roll-out.

LTE Advanced is not a new technology, with Verizon and other carriers working over the past couple of years to gradually roll it out through “carrier aggregation” upgrades that allow multiple bandwidth channels to be combined for faster speeds.

The LTE Advanced upgrades come to Verizon’s customers at no additional cost.  Verizon LTE Advanced will work on one of 39+ devices found at this URL:  already on the carrier’s network, including the iPhone, Moto Droid, and Galaxy S6 and S7.

“Verizon LTE Advanced means your data session moves more quickly over the best network,” said Nicki Palmer, Verizon’s chief wireless network engineer. “Imagine a road with multiple lanes in which, once you pick a lane, that’s the lane you drive in. That describes our award-winning 4G LTE network.

Continuing the metaphor, Verizon LTE Advanced allows cars to change lanes efficiently and flawlessly, balancing the flow of traffic and getting drivers to their destinations more efficiently. That means blindingly fast data transmissions when you need it most.”

Verizon’s LTE Advanced deployment currently uses a combination of two- and three-carrier aggregation, with two-channel carrier aggregation resulting in download speeds of up to 225 Mbps under ideal conditions, compared to “typical” speeds of 5-12 Mbps.

CLASS COMPUTING is very passionate about Hardware and Gadgets!  This includes Cellular Products and Remote Computing.  Remember, Hardware is part of the Network…we manage your entire companies IT, so shouldn’t we consult you on the hardware too?

CALL US AT (312) 262-3930.


  • Mbps = megabits per second.
  • 1 byte = 8 bits, which is 1 character (i.e. A).
  • 1 Kilobyte (KB) = 1024 bytes = 210  bytes
  • 1 Megabyte (MB) = 1,048,576 bytes = 1024 Kilobytes = 220
  • 1 Gigabyte (GB) = 1,073,741,824  bytes = 1024 MB = 1,048,576 KB = 230  bytes
  • 1 Terabyte (TB) = 1024 GB = 1,048,576 MB = 240 bytes
  • 12 Mbps divided by 8 bits per byte is ~ 1.5MB per second or 90 MB per minute download. In the real world, this means a movie downloaded in about 15.92 minutes.
  • (1.4 GB)(1024 MB/GB)/ (90 MB/min).  With this new Roll-out, under ideal conditions, you might download at speeds of (225 Mbps / (8 bits/byte)) =                     28 MB / Second or 1.64 GB per minute.  About 1 non-HD movie per minute!