POST
Welcome to POST by ResTech Solutions
Thank you for subscribing to our newsletter. Every week we will bring you new content covering recent events and news related to technology, Microsoft, Apple, Google, tips & tricks, useful information, and more! To read the full articles in our newsletters you can either click on the image or article headline. We've had a great response each week to our newsletter and we've been hard at work to bring you even more great information this week. Please let us know what you've enjoyed thus far about our newsletter. To see past issues click on the archives link above.
Why the name POST? In the world of computers POST stands for Power On Self Test. This is the action computers take when they are first powered on to check their basic functionality prior to loading the operating system. We decided to take this same concept and to provide you with useful technology information at the beginning of your week to help get you started. POST is also a term associated with news as well and we felt this was an appropriate and fitting name.
If you have suggestions about topics you are interested in or would like more information on any of the articles presented in our newsletters you can fill out our Content Request form to let us know what you would like to know.
Do you need any help or assistance with any item in our newsletter? Reach out and we will be happy to help.
Reply to this email to let us know what you liked. Please forward this newsletter to anyone who needs this information.
The best thank you that you can give us is by sending us referrals. It means so much to receive a referral. We look forward to having you with us every week! Let's POST and get started with this issue.
News
Amazon explains outage that took out a large chunk of the internet
Image from Engadget
Many companies and services rely on Amazon for their cloud hosting. When Amazon's AWS US-East-1 data center, the main US data center, suffered an outage last Tuesday morning there was a noticeable issue with accessing and using many services and devices. This brings up a valid question, are we too reliant on these major centralized data centers or do the benefits outweigh the risks? Hosting can be expensive on a small scale which is why services such as AWS and others exist.
The good news of this issue was that there was no outside or malicious threat. The issue was related to internal network clients experiencing unexpected behavior. Amazon is also taking steps to keep its customers better informed for future events.
‘The Internet Is on Fire’
Image from Wired
Log4j is a widely used open-source logging framework that is used to keep a record of activity within an application. Recently a critical bug was discovered that when exploited could allow for systems to be taken control of remotely. This is a serious flaw and as outlined in the linked article many users of systems are finding simple and easy ways to exploit the flaw.
Since the disclosure of this flaw, many companies have already taken immediate action by updating to the patched version of Log4j and notifying their users by means of various channels. After multiple major cyber incidents, this year companies are not taking any chances and have become extremely focused on protecting their systems and users.
Cyber Security
Why You Should Avoid Lenovo PCs: 7 Security Risks to Consider
Image from MUO
The short version of this is that Lenovo computers are not safe. Your security and privacy are compromised if you use a Lenovo computer. There have been many incidents over the years some of which are noted in the linked article.
On a personal note, I have seen some users have had constant issues with their Lenovo computers in the past. If you want to use a computer that will be safe and reliable then consider sticking with well know companies such as Dell or HP.
Is Your Network Secure? 5 Ways to Check Your Internet Connection
Image from MUO
In today's environment, it has become critical to ensure that your network is secure. Cybercriminals will attack anyone they can and access any network they can. They do not care who you are or how small you are. Everyone is a target and the most vulnerable are users at home and small businesses. If you have not done anything to secure your network now is the time. Check out the linked article for steps to get started.
If you need additional help with the crucial security step you can also reach out to us.
Can Stalkers Track You Using Apple AirTags?
Image from MUO
Since the release of Apple's AirTags, we have already seen some very clever uses of the devices as well as malicious uses where people have used them to track other people. The AirTags work similar to other tracking devices on the market such as Tile.
To avoid unwanted tracking, Apple has integrated certain protective features inside AirTags, such as the "AirTag Found Moving With You" notification with the updated iPhones. But the fact remains that AirTags are tiny devices, and anyone can easily stash them in your belongings or vehicles to track your location without your consent or knowledge.
While Apple takes great strides to protect the privacy of its users Android users will not know for up to three days before the AirTag starts beeping. This also applies to iOS devices not running iOS 14.5 or later.
There are ways to protect against AirTag stalking. Check out the linked article for full details.
Windows
Windows 11 might seriously slow down your SSD
Image from PCWorld
If you are on Windows 11 and use an SSD and noticed performance issues after updating it may be a driver issue and not a hardware issue. This issue specifically affects the newer NVMe or the M.2 sized drives which are smaller than the 2.5 inch SSDs. Microsoft is currently aware of and investigating the issue. There is no known resolution at this time.
Apple
How Apple Can Read Your Encrypted Messages
Image from Lifehacker
If you use iCloud Backup then it is possible for Apple to read your iMessage messages (blue bubble messages). SMS or green bubble messages do not go through Apple's system and are not encrypted. Please read the linked article for full details.
Tips & Tricks
How to Reduce Video File Size Without Losing Quality
Image from MUO
At one point or another most users will work with video files. Many times the video files need to be reduced in size for various reasons. Unless you work with video files on a regular basis you may not know how to do this or where to begin. Check out the linked article for a step-by-step guide.
Useful Information
Foldable vs. Rollable Smartphones: Which Design Is Better?
Image from MUO
The flexible phone market is still in its infancy and the devices and technology need time to mature and evolve. This is a keen interest of ours that we will be following as the technology develops. Currently, you can only find foldable phones out on the market. For some great background of these devices check out the linked article.
FAQ of the Week
What Happens to Your Data if Facebook Ever Dies?
Image from MUO
Each week we will address a frequently asked question. This week we are looking at what will happen to your Facebook data if Facebook were to die.
The linked article goes into great detail on what happens to your data but essentially your data and the data collected on you will exist until you request that it be permanently deleted. Typically once something is out on the web it is there forever.