Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Spot a Hacker By Investigating Their IP Address

b2ap3_thumbnail_ip_addresses_400.jpgHave you ever wondered how your PC is identified from the billions of devices out there in the world today? Just like every human being has specific physiological traits that make up who they are, your computer’s IP address is somewhat unique to your machine, and it can say a lot about you. Therefore, it’s important that you are able to identify your own IP address when you need to.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers Malware User Tips Computer Business Computing Microsoft Google Network Security Internet Productivity Hosted Solutions Tech Term Software Communication Mobile Devices Efficiency IT Services Backup Hardware Data Small Business Workplace Tips Windows 10 Smartphone Ransomware Android IT Support Microsoft Office Saving Money Productivity Browser Business Continuity Data Recovery Managed IT Services Data Management Cloud Computing Server Users Office 365 Upgrade Word Internet of Things Innovation Managed IT Services Gmail Windows Data Backup Facebook Phishing Disaster Recovery Social Media Smartphones Outsourced IT Windows 10 App Passwords Artificial Intelligence Business Management communications Remote Monitoring Managed Service Provider Employer-Employee Relationship VoIP Mobile Device Encryption Network Chrome Vulnerability Cybersecurity Content Filtering Managed Service Spam Money Website Big Data Government Miscellaneous Information Applications Infrastructure BYOD Save Money Apple Office Tips Tip of the week Analytics Hacker IT Support Virtualization Bandwidth Access Control Robot YouTube Router Printing Education Automation Risk Management Wireless IT Management Firewall Maintenance Virtual Reality Customer Service WiFi Tablet Data storage Avoiding Downtime Paperless Office The Internet of Things Settings Display Antivirus Two-factor Authentication Employee-Employer Relationship Hosted Solution Outlook Recovery Unified Threat Management Hard Disk Drive VPN Monitors Holiday Data Security HIPAA Data loss Business Technology Search Operating System Chromebook Development Virtual Private Network IBM End of Support Apps Server Management Computing Document Management Administration Touchscreen Google Drive Mobile Device Management Password Mobile Security Mouse Vendor Management Customer Relationship Management Hacking Telephone Systems Wi-Fi LiFi Laptop Augmented Reality Quick Tips Computers Presentation Business Intelligence Storage Scam Safety Retail SaaS Solid State Drive Office Networking Wireless Technology Company Culture Gadgets Downtime Computing Infrastructure Dongle Recycling Human Error IT service Heating/Cooling Smart Technology Motherboard Remote Computing Scary Stories Students WannaCry Going Green Social Engineering Time Management Legislation Identity Update IP Address Cybercrime MSP Scalability Social Permissions Assessment Firefox Managing Stress Managed Services Cabling Typing FCC Smart Tech PowerPoint Alerts Service Level Agreement Digital Payment Knowledge eWaste Device BDR Servers Deep Learning Humor Distributed Denial of Service Sports LED Network Management Comparison Mobile Office Migration Hacks Hard Drives Fraud Internet Exlporer Politics Techology Budget SharePoint Collaboration Cables Laptops Managed IT Cryptocurrency Title II Connectivity Onboarding Licensing Experience Continuity Unified Communications Mobility Google Maps Bring Your Own Device sip Managed IT Service Modem Slack Digital Lenovo How To Tech Support Smart Office Co-Managed IT User Specifications Compliance Running Cable Charging Mail Merge Refrigeration Value Virtual Desktop Digital Signage Unified Threat Management Downloads Public Speaking IT Technicians File Sharing Wires Software as a Service Disaster Shortcut Bitcoin Network Congestion Online IoT Computer Care Competition Cooperation Solar Print Toner Statistics Best Practice telephony Break Fix Cookies Samsung Buisness Monitoring Spyware Superfish Information Technology Professional Services Websites Identity Theft Work IT solutions Content Google Docs Black Friday Regulations Lithium-ion battery Messaging Address Writing Hotspot Desktop User Error Multi-Factor Security Mirgation Voice over Internet Protocol Entertainment Uninterrupted Power Supply Patch Management Windows 8 Microsoft Excel Star Wars Training Google Wallet Staff Automobile Shortcuts Bluetooth Business Growth Dark Web Nanotechnology G Suite 5G Spying Undo Language USB Cortana Optimization Streaming Cyber Monday Social Networking Halloween Analysis Employee-Employer Relationships Corporate Profile Current Events Fun Troubleshooting VoIP Legal Google Calendar Chatbots FinTech iOS Marketing Blockchain Cost Management Drones Printer Wearable Technology Security Cameras Alt Codes Dark Data Application Net Neutrality Screen Reader How To Machine Learning IT Budget Web Server Emergency Printers GPS Unsupported Software Computer Repair IT Consultant Relocation Processors Cameras Tracking Meetings Mobile Data Domains Health Cleaning Private Cloud Alert CCTV Emoji Webcam Windows 7 Electronic Medical Records Work/Life Balance Error Black Market Point of Sale Regulation Mobile Computing Physical Security Travel Law Enforcement Upgrades Notifications CrashOverride Botnet Supercomputer Twitter Motion Sickness Gadget Staffing 3D Printing Personal Information Administrator Crowdsourcing Taxes