Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Spot a Hacker By Investigating Their IP Address

b2ap3_thumbnail_ip_addresses_400.jpgHave you ever wondered how your PC is identified from the billions of devices out there in the world today? Just like every human being has specific physiological traits that make up who they are, your computer’s IP address is somewhat unique to your machine, and it can say a lot about you. Therefore, it’s important that you are able to identify your own IP address when you need to.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business User Tips Malware Microsoft Computer Business Computing Google Hosted Solutions Network Security Productivity Internet Software Tech Term Data Ransomware Small Business Backup Mobile Devices Efficiency Communication IT Services Hardware Workplace Tips Smartphone Windows 10 Cloud Computing Data Recovery Android IT Support Microsoft Office Saving Money Productivity Gmail Browser Data Management Business Continuity Facebook Managed IT Services Upgrade Social Media Information Data Backup Office 365 Internet of Things Server Users Managed IT Services Phishing Mobile Device Innovation Word Windows Passwords Smartphones Disaster Recovery Outsourced IT Windows 10 App Encryption Employer-Employee Relationship Network Vulnerability Chrome Cybersecurity Business Management Miscellaneous communications Artificial Intelligence Remote Monitoring Managed Service Provider VoIP Save Money Office Tips Tip of the week Hacker Applications Apple Content Filtering Analytics IT Support Government Big Data Gadgets Infrastructure BYOD Money Spam Website Managed Service Virtual Reality Apps Router Tablet Paperless Office Settings Firewall Antivirus Two-factor Authentication Data storage WiFi Unified Threat Management Display VPN Bandwidth YouTube Avoiding Downtime The Internet of Things Education Robot Risk Management Virtualization Wireless Printing Automation Employee-Employer Relationship IT Management Maintenance Customer Service Access Control Augmented Reality Scam Safety Hacking Development LiFi SaaS Computers Solid State Drive Storage Downtime Networking Mobile Security Retail Hosted Solution Hard Disk Drive Presentation Holiday Data Security Outlook Office Data loss Business Technology Chromebook Monitors Virtual Private Network Search Wireless Technology Recovery Business Intelligence IBM Server Management Touchscreen Mobile Device Management Administration Document Management Operating System End of Support Company Culture Customer Relationship Management Bring Your Own Device Telephone Systems Wi-Fi Computing Laptop Password Google Drive HIPAA Mouse Vendor Management Quick Tips Mixed Reality Automobile Best Practice telephony Alerts Bluetooth Service Level Agreement 5G Refrigeration eWaste Device G Suite Information Technology Distributed Denial of Service User Fraud Internet Exlporer Halloween LED Writing Comparison Corporate Profile Cortana Public Speaking Migration Google Docs Onboarding Windows 8 SharePoint Fun Competition Cables Laptops Title II VoIP Connectivity Slack Data Breach Business Growth Licensing Continuity Mobility Google Wallet Managed IT Service How To Modem IT service Heating/Cooling Value Scary Stories Smart Office Co-Managed IT Remote Computing Current Events Specifications WannaCry Compliance Charging Time Management IoT IP Address Cybercrime Digital Signage Update Downloads IT Technicians Wires Software as a Service Legal Online Monitoring Hard Disk Drives Alt Codes Dark Data Cabling Cooperation Undo Solar Print Toner Drones Break Fix Firefox Cookies BDR Hotspot Servers Professional Services Marketing Sports Work Content Going Green Social Engineering Black Friday Regulations Knowledge Messaging Digital Payment Microsoft Excel Network Management Star Wars Mobile Office Application Desktop Social Multi-Factor Security Mirgation Voice over Internet Protocol Entertainment Politics Spying Solid State Drives Collaboration Typing Staff Managed IT Shortcuts Dark Web Nanotechnology Techology Private Cloud Deep Learning Humor Google Maps Language USB Optimization Streaming Cyber Monday Digital Social Networking Lenovo Experience Unified Communications Analysis Employee-Employer Relationships Blockchain Cost Management Running Cable Troubleshooting Hacks Google Calendar Chatbots Mail Merge FinTech iOS Tech Support National Security File Sharing Cryptocurrency Printer Disaster Wearable Technology Shortcut Virtual Desktop Security Cameras Computer Care Budget Net Neutrality Screen Reader Unified Threat Management sip Computing Infrastructure Statistics Dongle Buisness Hard Drives Recycling Human Error Samsung How To Smart Technology Spyware Motherboard Superfish Students Permissions Assessment Lithium-ion battery Legislation Identity Address IT solutions MSP Scalability Websites Identity Theft PowerPoint Bitcoin Network Congestion Uninterrupted Power Supply Patch Management Managing Stress Managed Services Training FCC Smart Tech User Error Notifications CrashOverride Twitter Mobile Computing Botnet Supercomputer Motion Sickness Gadget Staffing Physical Security Personal Information Administrator Crowdsourcing Taxes Upgrades Web Server Emergency Windows 7 Machine Learning IT Budget GPS Computer Repair IT Consultant 3D Printing Processors Cameras Regulation Relocation Meetings Tracking Health Cleaning Unsupported Software Alert CCTV Emoji Webcam Electronic Medical Records Work/Life Balance Mobile Data Error Printers Black Market Point of Sale Domains Updates Travel Law Enforcement