Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Spot a Hacker By Investigating Their IP Address

b2ap3_thumbnail_ip_addresses_400.jpgHave you ever wondered how your PC is identified from the billions of devices out there in the world today? Just like every human being has specific physiological traits that make up who they are, your computer’s IP address is somewhat unique to your machine, and it can say a lot about you. Therefore, it’s important that you are able to identify your own IP address when you need to.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business Malware User Tips Business Computing Computer Internet Network Security Google Microsoft Productivity Software Tech Term Hosted Solutions Mobile Devices Efficiency IT Services Communication Small Business Backup Windows 10 Hardware Ransomware Android Smartphone Data Saving Money Workplace Tips Productivity IT Support Browser Data Management Microsoft Office Managed IT Services Upgrade Business Continuity Cloud Computing Internet of Things Gmail Data Recovery Windows Facebook Managed IT Services Server Innovation Phishing Office 365 Word Data Backup Disaster Recovery Passwords App Mobile Device Windows 10 Business Management Smartphones Employer-Employee Relationship Cybersecurity Managed Service Provider VoIP Artificial Intelligence Remote Monitoring Encryption Outsourced IT Users Content Filtering Government Big Data Social Media communications Tip of the week Miscellaneous BYOD Vulnerability Information Analytics IT Support Infrastructure Money Office Tips Network Chrome Spam Applications Website Maintenance Employee-Employer Relationship Bandwidth Managed Service YouTube Save Money Tablet Risk Management Apple Antivirus Firewall Wireless Data storage Display WiFi Virtual Reality Avoiding Downtime The Internet of Things Access Control Customer Service Robot Paperless Office Router Printing IT Management Hacker Settings Automation Two-factor Authentication Holiday Mobile Security Company Culture Hosted Solution Unified Threat Management Computing Google Drive Quick Tips Password Mouse Vendor Management Scam Apps Search LiFi Education Networking Development IBM Computers Hacking Document Management Storage VPN Administration Mobile Device Management Retail Data Security Customer Relationship Management Data loss Presentation Business Technology Wi-Fi Virtual Private Network Outlook Laptop Augmented Reality HIPAA Monitors Office Wireless Technology Gadgets Server Management Virtualization Business Intelligence SaaS Recovery Touchscreen Safety Operating System Downtime End of Support Telephone Systems Address Value Security Cameras Bring Your Own Device sip Update Specifications Compliance Scary Stories How To Uninterrupted Power Supply Hard Drives Patch Management Online IoT Recycling Human Error User Error Downloads IT Technicians IP Address Cybercrime Digital Payment Cooperation MSP Bitcoin Network Congestion Bluetooth Break Fix Cookies Corporate Profile Politics Hotspot Professional Services Managing Stress Managed Services Knowledge Best Practice telephony Chromebook Black Friday Regulations PowerPoint Sports Information Technology Solid State Drive Refrigeration Microsoft Excel Star Wars eWaste Device Google Docs User VoIP Collaboration Multi-Factor Security Mirgation Mobile Office Writing Nanotechnology LED How To Public Speaking Staff Windows 8 Dark Web Google Wallet WannaCry Tech Support Competition Language USB Cables Laptops Experience Business Growth Unified Communications IT service Heating/Cooling Cyber Monday Social Networking Onboarding Hard Disk Drive Computer Care Blockchain Cost Management Continuity Mobility Time Management File Sharing Google Calendar Chatbots Slack Running Cable Current Events Net Neutrality Screen Reader Smart Office Co-Managed IT Virtual Desktop Legal Firefox Printer Wearable Technology Charging Cabling Samsung Buisness Drones Websites Identity Theft Computing Infrastructure Dongle Wires Software as a Service Alt Codes Dark Data BDR Servers Smart Technology Motherboard Digital Signage Undo Training Permissions Assessment Solar Print Toner IT solutions Network Management Legislation Identity Monitoring Lithium-ion battery Going Green Social Engineering FCC Smart Tech Work Content Automobile Techology Social Marketing Managed IT G Suite Desktop 5G Digital Lenovo Alerts Service Level Agreement Voice over Internet Protocol Typing Google Maps Application Distributed Denial of Service Mail Merge Fraud Internet Exlporer Shortcuts Cortana Deep Learning Humor Comparison Spying Halloween Shortcut Title II Connectivity Optimization Streaming Fun Unified Threat Management SharePoint Analysis Hacks Disaster Troubleshooting Budget Spyware Superfish Licensing FinTech Cryptocurrency Remote Computing Statistics Managed IT Service Modem GPS IT Consultant Computer Repair Printers CrashOverride Relocation Domains Processors Cameras Tracking Meetings Cleaning Health Mobile Computing Physical Security Private Cloud Alert CCTV Upgrades Emergency Emoji Webcam Work/Life Balance Electronic Medical Records Error 3D Printing Black Market Point of Sale Law Enforcement Travel Regulation Notifications Unsupported Software Botnet Supercomputer Entertainment Twitter Gadget Staffing Motion Sickness Taxes Personal Information Administrator Crowdsourcing Mobile Data Machine Learning IT Budget Web Server