Blog

We love to share our knowledge!  

Are You A Google Guru?  13 Search Tricks Few Know

Are You A Google Guru? 13 Search Tricks Few Know

We here @ DEC Networks count ourselves as true masters of the Google arts. From working with AdSense & AdWords (their advertising programs), to Google Voice, complex web queries, and even implementing and maintaining some of their professional Google Apps solutions (e-mail antivirus/antispam with Postini), we have embraced all things related to the mighty search […]
Posted in Blog

Canadian ATM’s Default Passwords Allow Admin Access

Recently, two teenagers from Winnipeg attempted to access an ATM inside a local grocery store. After performing research online, they found a few of the weak default passwords, intended to be changed before the units were put into service. In less that one mintue of Googling, administrative guides showing “123456” are easily discovered. Instead of […]

Free Encryption Pack From Reset The Net

In the wake of the Edward Snowden NSA leaks, and the prevalence of data breaches online and at home, the group from Reset The Net teamed up with Google and other top tier companies, to release a free encryption and security package. These tools and guides cover everything from encrypting your iPhone & Android devices, […]

International Space Station Installs Laser Data Link

NASA’s antiquated radio based data transfer system, typically required about 10 minutes to transfer a 300MB file over the 4Mbps network. However, with the recent additions of laser based digital link, they managed to transfer the following video in a short 3.5 seconds. The complexity of aligning the laser from an orbiting station, to Earth, […]

Video Production Services

DEC Networks is excited to add a HUGE advertising and marketing option for our clients, with our new Video Production Services! Some of the new features include: 1. Script Writing By Professional Copy Writers 2. High Quality Background Music and Sound Effects 3. Fast Delivery Turn-around, as little as 10-days 4. Professional Voice Acting 5. […]

iCloud Devices Being “Held-Hostage” For Ransom

In a brand new series of exploits, International iCloud users are reporting their devices as being remotely locked, with instructions to provide payment in order to continue using their iPhones & iPads. This is the first such use of remote ransom attacks, which specifically target security vulnerabilities in the “Find My iPhone” feature, which most […]
Posted on
Posted in Blog

When Cyber-Victims Turn The Tables

Recently, a world renowned Bitcoin Activist (and early adopter, worth an undisclosed sum of the currency) Roger Ver, began receiving extortion requests from a hacker known as “Clerk1337”. The culprit utilized a frequently overlooked method of highjacking a domain registration, this time through Register.com, whereby he guessed certain generic user information requests, such as the […]
Posted on
Posted in Blog

Windows 9 Rumors, Possible Summer 2015 Release!

In breaking news today, rumors surrounding the successor to Windows 8 got us interested. While Microsoft hasn’t yet confirmed anything, we are hearing a possible release date of Spring/Summer 2015! One of the most exciting new features appears to be application cross compatibility from Windows 9 Phones, Desktops, Tablets, and possibly even Xbox. Also rumored […]
Posted on
Posted in Blog

Apple Finally Acknowledges iPhone iMessage Issue

We’ve helped more than one customer resolve the issue of lost SMS messages, after switching from an iPhone to Android or our favorite, Windows Phone. Essentially, iMessage hooks into the SMS message functions of the carrier, and routes ALL incoming SMS to their internal datacenter, where their applications send it back to the mobile device. […]
Posted on
Posted in Blog
Security – eBay Breach Leaves Passwords Exposed

Security – eBay Breach Leaves Passwords Exposed

Wednesday morning (05/21) eBay published a notification that some of their internal servers, and the encrypted passwords stored there, were breached. They have since updated the post a few times, and haven’t released any specifics to clarify the issue. As with all security breaches such as this, it’s best to err on the side of […]
Posted on
Posted in Blog