Originally from ©2017CARVIR INFOSEC®

CLASS COMPUTING ( is thrilled to be able to offer this elite Security Service for your companies IT Infrastructure.

The CARVIR™ security team provides the first line of defense – without the noise of managing threat intelligence, research, analysis and false positives. CARVIR will:

  • Kill malicious processes
  • Quarantine malware and infected files
  • Disconnect infected endpoints from the network to prevent lateral spread
  • Alert IT Security personnel via email and SMS
  • Immunize all other protected endpoints on the network against new, never-before-seen threats
  • Report and escalate

Heaps of deep forensic data are transformed into an intuitive visualization in real time. The attack storyline depicts the threat execution flow in high resolution, from inception. Our team can view a specific process on the attack story line and drill down into the individual network, file, process, or data actions that occurred. This information allows our team to take decisive action towards securing your network.

If escalation is needed, we will provide an outline of the attack details. This will often include attack statistics, file information, path, machine name, IP, domain, along with information about where else on the network the attack has been seen, what we’ve done to isolate or eliminate the threat and what your team’s next step should be, if any.

In addition, we can provide cloud reputation, certificate information (if the file is signed or not), and advanced attack details (such as a list of known packers that may have been used). And lastly, we will provide a .csv or .json file of the attack providing forensic level reporting on the threat for your incident response team reporting – especially helpful in compliance driven environments.


Leverage powerful, behavior-based threat detection to protect data from the types of advanced malware, exploits, drive-bys and script-based attacks that evade outdated, signature based anti-virus technology and sandboxing solutions in Windows, Apple and Linux environments.

Our team actively detects and prevents attacks, even those using memory, PowerShell scripts, insider attacks and browser based drive-by exploits. Once detected, we automatically shut down the attack on the infected machine and prevent lateral movement across the network.


Prevention starts with silent monitoring of all user- and kernel-space activity on the endpoint. Our security agent rapidly builds a complete context of normal system activity, which serves as the backdrop for the industry’s most advanced behavior-based threat detection.

With full visibility into the endpoint, the engine pinpoints malicious activity—even by the most sophisticated, stealthy attacks.

We secure Windows, OS X, and Linux endpoint devices (servers, workstations and laptops) for full endpoint protection.

Rollback Ransomware

Eliminate threats the instant they are detected with fully integrated response capabilities. If something slips through, we can reverse any attack-driven file damage and restore* files back to their previous trusted states with the click of a button.

Well, technically our team says it’s two clicks. But who’s counting?

And it’s not just ransomware. We protect data from the types of advanced malware, exploits, drive-bys and script-based attacks that evade outdated, signature based anti-virus technology and sandboxing solutions.

* Requires use of Windows Shadow Copy

Contact CLASS COMPUTING for a QUOTE today!

(312) 262-3930

Make Microsoft Office 365 Work For You Affordably

For about $4.95 per month you can get professional grade email hosted by Microsoft Exchange servers with 50 GB storage. You can use your custom or company domain and aliases. And for a couple bucks more you can add SharePoint, 1 TB of OneDrive Cloud Storage, MS Office Web Apps and Skype For Business. For the Power User you can load MS Office on up to 5 of that users machines for under $15 on a monthly basis (call for specific restrictions) Call Class Computing at (312) 262-3930. There are many more plans that make sense too.


Chicago & Suburbs are included in the LTE ADVANCED roll-out.

LTE Advanced is not a new technology, with Verizon and other carriers working over the past couple of years to gradually roll it out through “carrier aggregation” upgrades that allow multiple bandwidth channels to be combined for faster speeds.

The LTE Advanced upgrades come to Verizon’s customers at no additional cost.  Verizon LTE Advanced will work on one of 39+ devices found at this URL:  already on the carrier’s network, including the iPhone, Moto Droid, and Galaxy S6 and S7.

“Verizon LTE Advanced means your data session moves more quickly over the best network,” said Nicki Palmer, Verizon’s chief wireless network engineer. “Imagine a road with multiple lanes in which, once you pick a lane, that’s the lane you drive in. That describes our award-winning 4G LTE network.

Continuing the metaphor, Verizon LTE Advanced allows cars to change lanes efficiently and flawlessly, balancing the flow of traffic and getting drivers to their destinations more efficiently. That means blindingly fast data transmissions when you need it most.”

Verizon’s LTE Advanced deployment currently uses a combination of two- and three-carrier aggregation, with two-channel carrier aggregation resulting in download speeds of up to 225 Mbps under ideal conditions, compared to “typical” speeds of 5-12 Mbps.

CLASS COMPUTING is very passionate about Hardware and Gadgets!  This includes Cellular Products and Remote Computing.  Remember, Hardware is part of the Network…we manage your entire companies IT, so shouldn’t we consult you on the hardware too?

CALL US AT (312) 262-3930.


  • Mbps = megabits per second.
  • 1 byte = 8 bits, which is 1 character (i.e. A).
  • 1 Kilobyte (KB) = 1024 bytes = 210  bytes
  • 1 Megabyte (MB) = 1,048,576 bytes = 1024 Kilobytes = 220
  • 1 Gigabyte (GB) = 1,073,741,824  bytes = 1024 MB = 1,048,576 KB = 230  bytes
  • 1 Terabyte (TB) = 1024 GB = 1,048,576 MB = 240 bytes
  • 12 Mbps divided by 8 bits per byte is ~ 1.5MB per second or 90 MB per minute download. In the real world, this means a movie downloaded in about 15.92 minutes.
  • (1.4 GB)(1024 MB/GB)/ (90 MB/min).  With this new Roll-out, under ideal conditions, you might download at speeds of (225 Mbps / (8 bits/byte)) =                     28 MB / Second or 1.64 GB per minute.  About 1 non-HD movie per minute!

Microsoft’s Patch update is breaking Outlook and touch screen machines

Microsoft latest patch Tuesday has caused many issues with users of outlook and touchscreen machines. The Windows KB Update is 3097877 Some of the major issues that have been seen after this update is applied is that computers wont logon, outlook buttons will not work, outlook will not open at all, or emails with certain fonts will crash outlook. Microsoft has release an update to this patch. Call Class Computing if uou need any help 312-262-3930

Missing Just One Of These Could Instantly Open Up Your Computer Network To A Cyber Attack

Welcome to the brave new world of cyber-warfare.


Gone are the days when software patches were just for nifty little feature add-ons or updates.


Today, a software update notice could mean your whole computer network is suddenly at risk. Dangers include data theft, crippling malware attacks and mischief you may not discover for months, or even years…


As with graffiti on your garage door, if you don’t pay attention and clamp down on bad behavior, your problems have likely just begun…


And, like those who hire a professional security firm to keep thieves out of the warehouse, thousands of CEOs and business owners are now waking up to the fact that it’s absolutely imperative to hire a pro when it comes to securing your data network.


Here’s why you need a professional handling this:


#1: Speed is of the essence.

“If you didn’t update to version 7.32 within seven hours, you should assume you’ve been hacked.” That’s what software maker Drupal told millions of its customers around the world last year. It’s just one example of what can happen if you don’t respond with lightning speed.


Once a security breach has been identified, hackers rush in. On “Day Zero,” cyber-crooks around the world go after at-risk targets. You’ve got to be quick to patch the gap, or else you risk a system compromise.


Unless you have the time, knowledge, experience and tool set to respond instantly, you are far better off leaving this to a professional IT firm you can trust.


#2: It’s not just the big boys they’re after.

Sure, the top news stories are about the attacks on companies like Target, Home Depot and Sony…


Yet your business is just as vulnerable, if not more so.

Chances are, you simply do not have the resources that giant corporations have to manage a data disaster. The statistics bearing this out are shocking: more than 60% of small businesses close their doors following a serious data breach.


The threat is not confined to giant corporations. Small and medium businesses are being attacked every day, and, unfortunately, your business is no exception.


#3: Dealing with data breaches requires specialized knowledge, skill and experience

Here are just a few of the things a competent data guardian must be able to do to effectively protect

your systems:

Review documentation and monitor forums. Sometimes your software vendor doesn’t tell the whole story. It’s critical to check online forums and other communities to see if anyone else is having issues with the new patch before jumping in with both feet.


Know when to apply a patch immediately and when to wait. Typically, somewhere around 95% of patches work hassle-free. The trick is to spot the 5% that don’t — before installing them. This requires identifying unique patching requirements, and applying exceptions accordingly. For instance:


Does the patch deal only with a security issue?

Or does it just add new features or fix non-security-related bugs? Obviously, security issues get top priority.


Is the system currently having issues?

If not, and if the patch doesn’t address a security issue your system is vulnerable to, it may be better to heed the old adage “If it ain’t broke, don’t fix it.”


What security gaps does it address? How severe is the threat to your particular network? If, for example, the only way a virus can enter your system is through an e-mail attachment and this functionality has been disabled for all users, perhaps the threat needn’t be a great concern.


Keep options open in case of complications. Once a patch has been applied, if things aren’t working, it’s critical to restore the data network to pre-patch functionality, with little if any downtime. That means having good backups in place along with a tested and proven recovery process.

Does just thinking about data security give you a headache? We strongly advise that you let us handle this critical part of your business for you.


Call (312) 262-3930 and schedule our no-cost Security Update Audit today. You’ll discover how easy it is to rest assured that your network is secure 24/7.

Free Report Download: If You Are Considering Cloud Computing For Your Company—Don’t, Until You Read This…

If you are considering cloud computing or Office 365 to save money and simplify IT, it is extremely important that you get and read this special report, “5 Critical Facts Every Business Owner Must Know Before Moving Their Network To The Cloud.”


This report discusses in simple, non-technical terms the pros and cons of cloud computing, data security, how to choose a cloud provider, as well as 3 little-known facts that most IT consultants don’t know or won’t tell you about cloud computing that could end up causing you MORE problems and costing you more money than you anticipated.


Even if you aren’t ready to move to the cloud yet, this report will give you the right information and questions to ask when the time comes.


Get Your Free Copy Today:



XP and Office 2003 end of life

An URGENT Security Warning For Businesses Running
Windows XP Or Office 2003

If your organization is currently running either Windows XP or Office 2003 on one or more computers in your office, you need to know about a dangerous security threat to your organization that must be addressed within the next 3 months. Please take a moment to read this important announcement.

As your local Microsoft Partner, we are aggressively reaching out to all businesses within Southeastern New England area that use Windows XP and Office 2003 to alert you of this serious security risk to your organization and inform you about what you need to do now to protect your company.

XP And Office 2003 Changes Must Be Made By April 8, 2014

Microsoft has officially announced that it will retire support on the XP operating system and Office 2003 software suite on April 8, 2014. That means any computer with these software programs installed will be completely exposed to serious hacker attacks aimed at taking control of your network, stealing data, crashing your system and inflicting a host of other business-crippling problems you do NOT want to have to deal with.

This is such a serious threat that all companies housing financial and medical information are being required by law to upgrade any and all computer systems running XP or Office 2003 because firewalls and anti-virus software will NOT be sufficient to completely protect them (or you).

Unless you don’t care about cyber criminals running rampant in your company’s server, you MUST upgrade any equipment running these programs.

The PC isn’t dead yet

You’ve probably heard how the PC is dead. People are buying up tablets and smartphones, but they are bypassing new desktop computers. Well, ITworld is here to let you know that the rumors of the PC’s death are overblown.

Job’s Quote

Those predicting the death of the PC had a boost when Steve Jobs, before his untimely death, compared PCs to trucks. He said trucks dominated when most people lived rural lives. But now that more people live in cities, cars are more important than trucks. In Jobs’ analogy, PCs are trucks and tablets are cars.


But ITworld claims that Jobs’ argument is flawed. The best-selling vehicle in the United States remains a truck, the Ford F150 pickup. That’s because people still need trucks to get work done. This holds true for PCs: People need them to get work done.

Tablet Limits

Tablets are impressive tools. But they can’t compare to a PC when it’s time to get work done. Try typing a report on a tablet or creating a PowerPoint. That is what PCs do best. And unless all of us plan to stop working, we’ll need those “antiquated” PCs.

Is Office Mobile a good buy?

Excited that Microsoft has finally developed a mobile version of its Office suite of products for the iPhone? Temper your enthusiasm. As Jill Duffy, a tech reviewer for writes, Microsoft’s Office Mobile is probably not worth the money.

Not free

Duffy writes that Office Mobile is an elegant piece of software, one that’s simple to use and understand. The issue, though, is that accessing the program makes it necessary that you get a subscription to Office 365. That will run you a minimum of $99 a year. And that price is way too high, Duffy writes.


As Duffy writes, most smartphone users can make use of a collection of free options to handle everything from word-processing to spreadsheets. So why, then, should a consumer invest nearly $100 yearly for Office Mobile?


Duffy recommends that users search the Internet for free apps that handle such tasks as word-processing and spreadsheets. Users will probably discover something interesting: The free apps are often just as effective as Office Mobile. And, needless to say, they come at the low, low price of nothing.

Taking an e-mail break

Tired of returning to work after vacations to see an inbox overflowing with messages? It is possible to reduce this. You’ll simply need a willing helper at the office and some advance planning.


Jonathan Feldman, a contributing editor at InformationWeek, recommends that prior to taking your trip, you create a partnership with a co-worker. While you’re gone, this worker will handle your e-mail messages, reading them, sorting them and placing them in specially labeled folders. When this co-worker goes on vacation, you’ll handle that person’s e-mail.

Preventive measures

Before your trip, inform your colleagues and friends that you’re going on vacation. Explain that a co-worker is going to be handling your e-mails while you’re gone. And, yes, explain that this means someone else other than you will be reading your e-mail. Make sure to set up your e-mail rules so that your messages go directly to your helper.

The rules

When you return to work, you should be returning to an orderly e-mail inbox. Your helper should have read your messages, placed them in labeled folders based on their importance and left you notes on any e-mails that need your urgent attention. Just remember: When your co-workers go on vacation, you’ll need to do the same for your helper.