Great New Browser, Big Expectations. Be BRAVE & Get BRAVE

“We have a mission to save the web by increasing browsing speed and safety for users, while growing ad revenue share for content creators.”

Everyone is taking notice to a new browser, and for good reason.  The CEO of BRAVE Browser from Brave Software is Brendan Eich.  If you do not know who Brendan Eich is  – Don’t admit to it LOL.  He is an American technologist and creator of the JavaScript programming language. He co-founded the Mozilla project, the Mozilla Foundation and the Mozilla Corporation, and served as the Mozilla Corporation’s chief technical officer and briefly its chief executive officer  (Credit Wikipedia).

I have been using it for a few weeks and am ready to replace everything else for my personal use.  I recommend you try it.

FULLY RUGGED – GETAC V110

THE BEST CONVERTIBLE GETAC® HAS EVER MADE!

The Getac V110 fully rugged convertible notebook is Faster,
More Secure, Thinner and As Versetile As Ever.  It features :

 

Getac V110

6th Gen Intel® Core i7  +  Intel HD Graphics 520

A large 11.6” widescreen display and a design that is as                                               thin and light as ever – at 4.36 lbs. light and 1.26” thin.

Absolute DDS.

This optional protective measure disables your V110 if it detects an unauthorized or compromised entry.

Trusted Platform Module 2.0

The V110 features TPM 2.0 – a powerful anti-tampering device that checks for any signs of intrusion during system boot-up.

NFC/RFID Reader.

Authenticate your credentials via Near Field or  Radio Frequency transmission.

Smart Card Reader.

The V110 supports Smart Cards for secure identity verification.

Fingerprint Scanner

Verify your ID with ease and accuracy by simply swiping your finger.

Windows 10 Multi-Factor Authentication.

The V110’s hardware fully supports Microsoft’s latest authentication tools, including Windows Hello, Microsoft Passport and Credential Guard.

 

V110 Brochure

GET A QUOTE (312) 262-3930 or SALES@classcomputing.com

CLASS APPROVED – GETAC S410

Setting the Standard in Semi-Rugged Computing

Raising the bar on the semi-rugged notebook class, the new S410 is
more rugged, slimmer and lighter than ever before. The all-new S410
boasts the latest computing innovations, including a significant CPU
performance boost, enhanced graphics , and multiple options for
greater flexibility. The S410 puts greater power and adaptability into
the hands of mobile professionals across a range of industries.

Less Downtime When It’s Crunch Time.

It doesn’t happen often, but if a S410 ever needs to be serviced, Getac offers unmatched coverage that will ensure you get your computer fixed and back on the job fast.

Industry’s Best 3-Year Warranty.

Nothing says quality like a manufacturer standing behind their product. We’ve designed the S410 semi-rugged notebook from the inside out to survive drops, shocks, spills, vibration and more. We’re confident in our quality and that’s why the rugged S410 comes standard with the industry’s best 3 years Pack & Collect warranty. It’s the peace-of-mind protection of knowing you’re covered1.

Standard.
3 years Pack & Collect.

S410 Brochure

GET A QUOTE (312) 262-3930 or SALES@classcomputing.com

CARVIR™ CYBER SECURITY NOW AVAILABLE THRU CLASS COMPUTING

Originally from https://www.neverpaytheransom.com/ ©2017CARVIR INFOSEC®

CLASS COMPUTING (www.classcomputing.com) is thrilled to be able to offer this elite Security Service for your companies IT Infrastructure.

The CARVIR™ security team provides the first line of defense – without the noise of managing threat intelligence, research, analysis and false positives. CARVIR will:

  • Kill malicious processes
  • Quarantine malware and infected files
  • Disconnect infected endpoints from the network to prevent lateral spread
  • Alert IT Security personnel via email and SMS
  • Immunize all other protected endpoints on the network against new, never-before-seen threats
  • Report and escalate

Heaps of deep forensic data are transformed into an intuitive visualization in real time. The attack storyline depicts the threat execution flow in high resolution, from inception. Our team can view a specific process on the attack story line and drill down into the individual network, file, process, or data actions that occurred. This information allows our team to take decisive action towards securing your network.

If escalation is needed, we will provide an outline of the attack details. This will often include attack statistics, file information, path, machine name, IP, domain, along with information about where else on the network the attack has been seen, what we’ve done to isolate or eliminate the threat and what your team’s next step should be, if any.

In addition, we can provide cloud reputation, certificate information (if the file is signed or not), and advanced attack details (such as a list of known packers that may have been used). And lastly, we will provide a .csv or .json file of the attack providing forensic level reporting on the threat for your incident response team reporting – especially helpful in compliance driven environments.

Detection

Leverage powerful, behavior-based threat detection to protect data from the types of advanced malware, exploits, drive-bys and script-based attacks that evade outdated, signature based anti-virus technology and sandboxing solutions in Windows, Apple and Linux environments.

Our team actively detects and prevents attacks, even those using memory, PowerShell scripts, insider attacks and browser based drive-by exploits. Once detected, we automatically shut down the attack on the infected machine and prevent lateral movement across the network.

Prevention

Prevention starts with silent monitoring of all user- and kernel-space activity on the endpoint. Our security agent rapidly builds a complete context of normal system activity, which serves as the backdrop for the industry’s most advanced behavior-based threat detection.

With full visibility into the endpoint, the engine pinpoints malicious activity—even by the most sophisticated, stealthy attacks.

We secure Windows, OS X, and Linux endpoint devices (servers, workstations and laptops) for full endpoint protection.

Rollback Ransomware

Eliminate threats the instant they are detected with fully integrated response capabilities. If something slips through, we can reverse any attack-driven file damage and restore* files back to their previous trusted states with the click of a button.

Well, technically our team says it’s two clicks. But who’s counting?

And it’s not just ransomware. We protect data from the types of advanced malware, exploits, drive-bys and script-based attacks that evade outdated, signature based anti-virus technology and sandboxing solutions.

* Requires use of Windows Shadow Copy

Contact CLASS COMPUTING for a QUOTE today!

sales@classcomputing.com

(312) 262-3930

Don’t expect much from Windows 8.1

Has Microsoft made Windows 8 much better with its Windows 8.1 tweak? Not really, says David Pogue, tech writer for the New York Times. And in a recent preview of the update, Pogue writes that if you’re not a fan of Windows 8, you most likely won’t like Windows 8.1, as well.

Start still missing

The first problem? Windows 8.1 doesn’t resurrect the much-missed Start menu. Pogue ponders if that is just stubbornness by Microsoft.

Two worlds

Secondly, Windows 8.1 still doesn’t know if it’s a touch-screen or mouse-and-keyboard system. The system’s TileWorld section works the best for touchscreens. But its Desktop section is clearly made to be navigated with a mouse and keyboard. By splitting itself like this, Windows 8.1 doesn’t make anyone happy.

Stick to Windows 7

Pogue’s advice? If you’re not much of a fan of Windows 8, the upgrade won’t do much to change your mind. Stay with the superior Windows 7.

Don’t think you need to back up your Evernote notebooks? Think again

How safe do you think your data is when you store them in an Evernote notebook? The surprising answer: Less safe as you might think. That’s because Evernote isn’t a true backup service. It’s a synching service.

Is it really necessary?

You may be wondering: Do I need to back up my Evernote notebooks? How-To Geek would answer with an emphatic “yes!” This is because Evernote isn’t a backup system. It’s a synching system. And in a worst-case scenario, Evernote’s remote file store can be wiped. Then, the local file store can be wiped, too.

Protecting yourself

Fortunately, you can protect yourself fairly easily by backing up your Evernote notebooks. As How-To Geek says, you’ll need an installed copy of Evernote’s desktop application for either Windows or OS X, depending on what kind of computer you use.

Export/import

To do this, right-click on any notebook saved in Evernote. Then select the “Export Notes” option. Then you’re able to export the notebook in any of several formats. If you happen to lose the notebook or the information it includes, you can simply choose to import the previously exported notebook. This will bring in a new version of the notebook that can act as a wholesale replacement for the notebook that you lost.

Hate Windows restarting after updates? Time to stop it

Windows is a living thing: It downloads updates routinely. That’s beneficial, especially when these updates include important anti-virus protections meant to keep your computer safe. But there is a frustrating side effect with these updates: Windows wants to restart your computer after every update.

Stop the restarts

As Lifehacker says, the restarts are an aggravation. Nobody likes seeing that message about your computer restarting in 15 minutes. If you don’t want this to occur, though, you can put an end to it. Tech site Lifehacker recently dealt with how to keep the automatic update on hold.

Editing the registry

Start the disabling process by turning on your computer’s “Start” menu. Open the registry by typing “regedit.” Next, start the registry editor. Now you’ll need to find a specific line in the registry: HKEY_LOCAL_MACHINESOFTWAREPoliciesMicrosoftWindowsWindowsUpdateAU. Click on the AU key and, when you see it appear in the right pane, right-click on the empty space and select New >DWORD (32-bit) Value. Now, name the new DWORD: “NoAutoRebootWithLoggedOnUsers”. Finally, double-click on the new DWORD and give it a value of 1.

Reboot

Once you’ve finished this procedure, Windows won’t automatically restart your computer after its automatic updates. This doesn’t mean, though, you shouldn’t reboot your computer manually in the future. Your Windows updates won’t take effect if you don’t do this. And that could leave your computer and software vulnerable.

This isn’t a joke: A MacBook ranks as best Windows laptop

Another humiliation for Microsoft? Looks like it. Following the critical drubbing the company has had for Windows 8, a PC services company has now ranked the 13-inch MacBook Pro as being the laptop that does the best job running Windows software. And, yes, the MacBook Pro is manufactured by Microsoft rival Apple.

The Report

CNET recently reported on a study by Soluto that looked at the frequency of frustrating events on Windows laptops. The study examined everything from crashes to blue screens to hang-ups. The laptop that experienced the fewest of those annoying events? The 13-inch MacBook Pro.

Clean Installation

The main benefit of running Windows on a MacBook? According to Soluto, the Windows programs placed on the machine run cleanly. Simply put, they run as they are advertised.

Crashes Per Week

According to Soluto, the MacBook Pro suffered fewer crashes, hang-ups and blue screens when running Windows software. The MacBook also booted at a faster rate. Just what does this suggest? Only that Microsoft’s rough patch continues.

Do you think Microsoft is going backward with its new logos?

People say that everyone is a critic. You can see this firsthand at the Quora knowledge-sharing Web site. A short time ago, a Quora user took Microsoft to task. This user wasn’t annoyed that Windows 8 was clunky and counter-intuitive. The user wasn’t mad, either, that Internet Explorer didn’t return the best search results. No, this user took Microsoft to task for its lack of artistic ambition. Yes, that’s right.

A Quora Critic

This user believes that Microsoft isn’t putting sufficient time into designing artistic, aesthetically pleasing logos. Instead, the user writes, Microsoft is dashing off simplistic, minimalist logos. These logos, the assertion goes, look like graphics pros dashed them off in five minutes. The user adds that Microsoft is dumbing down their logos since introducing Windows 8 and Office 2013.

The argument

To no one’s surprise – at least to anyone who’s ever used Quora – the user’s argument immediately stirred up debate. A lot of fellow site users stood up for Microsoft, declaring that the logos are actually rather striking in their minimalism. And, indeed, when you look at the logos lined up side by side, the effect is a bit striking. Microsoft’s new, simpler icons, instantly tell you what program you can open by touching them.

A Growing Trend?

The fans of Microsoft’s new logos might be right. The purpose of the icons is to let users know what program will pop up after they click on the icon. And the logos convey this information well. You immediately can recognize which icon will open Microsoft Publisher and which will open Microsoft’s new cloud services. And if a logo does that? Then who cares if it’s simple?