647.956.6081 / 705.302.7937

Computer Blog

Welcome to the 1CS computer blog! This page displays various articles on computer related topics. Although not just any computer related topics but topics which relate to IT Services for Small and Medium Sized Business and also Residential Computer Services for Individuals and Home Based Business. Additionally, the topics were and continue to be selected based on their relevance, at a particular time, when the article is written. We post these articles out of our passion for computers and technology. Also for the benefit of our clients and to enrich the experience of visitors to our website.

Our Computer Blog

Admittedly, our computer blog has not been updated in a while. We have been busy setting up and fixing our clients computers. When company’s outsource their IT to 1CS, as do many business across the GTA, we run into a wide variety of issues and interesting information. As such, from time to time, we would like to share some of it with you, if our schedule permits, of course!

Future Articles

Later this year, 1CS is planning to roll out a few articles on fun and interesting computer related topics. While the topics have not been finalized, the selection process is coming to a close. Please watch for the above mentioned articles to be posted later on this year and any preceding announcements in that regard, directly on this page.

Submit Blog Requests

If you have a request for a certain topic, you may submit it for consideration. Please submit your requests by email to the administrative contact listed on the contact page of our website. Given our wide breadth of experience in providing IT Services to Small and Medium Sized Businesses. As well as Residential Computer Services to Individuals and Home Based Business. We believe we are well positioned to speak on many issues surrounding information technology. We look forward to hearing from you!

Extortion Popup Scams and Infection Vectors

Posted by on 9:44 pm in Computer Blog | Comments Off on Extortion Popup Scams and Infection Vectors

Extortion Popup Scams and Infection Vectors

In part 1 and 2 we discussed what an extortion Pop-up scam, and other virus’ were. In this chapter we will now discuss Extortion Popup Scams and Infection Vectors. Extortion Popup Scams and Infection Vectors: What is an infection Vector? An infection Vector is basically a way for a virus to be able to infect you or others on a network with it’s code. Whether that be an email, a shared drive, or an infected webpage or document. There are unfortunately many ways to get a virus but there are ways to minimize the risk, which we will discuss here....

read more

The 4th Wave of the Internet

Posted by on 4:57 pm in Computer Blog | Comments Off on The 4th Wave of the Internet

The 4th Wave of the Internet

The 4th Wave of the Internet: Social Media The 4th wave of the internet is about going crazy copying and sharing every piece of media one could find. People were also looking for better ways to communicate and express themselves. There were hundreds, if not thousands, of small private forums and chat rooms, but they were getting annoying with solicitations (Spam), and they didn’t allow you to voice your opinion in a specific location. The 4th Wave of the Internet: Myspace Until one day a website called Myspace forever changed the way masses...

read more

Your Local SMB Managed Service Provider

Posted by on 7:25 pm in Computer Blog | Comments Off on Your Local SMB Managed Service Provider

Your Local SMB Managed Service Provider

1CS is Your Local SMB Managed Service Provider If you work near mid-town Toronto, 1CS is your local SMB Managed Service Provider. 1CS is a virtual company however we market our self and have a concentration of customers and clients in mid-town Toronto. Additionally, we have an administrative address located on Merton St, 2 blocks south of Davisville Ave in between Yonge St and Mt Pleasant Ave. We bring solutions to computer problems. What is an SMB Managed Service Provider? SMB refers to small to medium sized business. 1CS provides Managed IT...

read more

Toronto Computer Repair Services

Posted by on 3:40 pm in Computer Blog | Comments Off on Toronto Computer Repair Services

Toronto Computer Repair Services

Toronto Computer Repair Services by 1CS Toronto Computer Repair Services as offered by 1CS consist of 3 categories of services. The first being residential computer repair services, offered to individuals and home based business. The second being business computer repair services which are offered to businesses. The third being managed computer repair services which are offered to business and home based business. Some of our services are rendered on an a la carte or one time basis, while others are offered as part of a support package or...

read more

The 3rd Wave of the Internet

Posted by on 1:38 am in Computer Blog | Comments Off on The 3rd Wave of the Internet

The 3rd Wave of the Internet

The 3rd Wave of the Internet: P2P Filing Sharing Despite a growing community of people being able to connect and communicate freely, there was a hunger for more. While individuals were able to talk in chat rooms, and share tidbits of information, they were not able to share or transfer large sets of data in formats like Microsoft Excel, HTTP or Mp3, to name a few. The need quickly became apparent for individuals to have the ability to transfer all kinds of data. To others around the globe, and not just data by way of text documents. The 3rd...

read more

WannaCry WCrypt Ransomware Virus Alert

Posted by on 6:53 pm in Computer Blog | Comments Off on WannaCry WCrypt Ransomware Virus Alert

WannaCry WCrypt Ransomware Virus Alert

WannaCry WCrypt Ransomware Virus Alert: What is it? This is a WannaCry WCrypt Ransomware Virus Alert. If you haven’t heard, WannaCry (WCrypt) is one of the latest ransomware virus’s. It seems to be spreading globally via infected emails, ultimately due to a Windows vulnerability. Once a computer is infected, Wannacry will encrypt the most valuable dataincluding pictures and documents. If a computer has been infected, a screen will pop up like this or some variation: WannaCry WCrypt Ransomware Virus Alert: How it works? Similar to Extortion...

read more

Extortion Popup Scams by Email and How You Can Protect Yourself Part 2

Posted by on 1:20 am in Computer Blog | Comments Off on Extortion Popup Scams by Email and How You Can Protect Yourself Part 2

Extortion Popup Scams by Email and How You Can Protect Yourself Part 2

Extortion Popup Scams by Email and How You Can Protect Yourself Part 2 is a continuation of the original article sharing the same name. Extortion Popup Scams by Email and How You Can Protect Yourself Part 2:Red Flag 1 Ok in this case someone received an email first thing in the morning from her elderly Aunt with an attachment and a subject of “Urgent”. The first question we would ask is when did your Aunt send it? Since it’s first thing in the morning, it probably came in sometime at night when you were asleep. Does your aunt have a habit of...

read more

The 2nd Wave of the Internet

Posted by on 11:23 pm in Computer Blog | Comments Off on The 2nd Wave of the Internet

The 2nd Wave of the Internet

The 2nd Wave of the Internet: Chat/Messaging Shortly thereafter I became familiar with the process of connecting and navigating around the World Wide Web, I started to learn about other online locales through message boards called News Groups (The 2nd Wave of the Internet). Apparently, there were places that you could watch news feeds. You could exchange information with people more quickly than a message board. There was still a sense of the unknown each time I was connecting to these groups. Shortly thereafter it started to become a...

read more

Extortion Popup Scams by Email and How You Can Protect Yourself

Posted by on 11:10 pm in Computer Blog | Comments Off on Extortion Popup Scams by Email and How You Can Protect Yourself

Extortion Popup Scams by Email and How You Can Protect Yourself

What are Extortion Popup Scams by Email? In this article “Extortion Popup Scams by Email and How You Can Protect Yourself“, we will talk about how you can protect yourself from malicious programs that you may come into contact with through email.  We will also offer a few examples, which will help you arm yourself with the knowledge to defend yourself against suspicious attachments. We will also cite a worst case scenario just to show you the damage that some of these malicious programs can cause. A Story about Extortion Popup...

read more

The 1st Wave of the Internet

Posted by on 12:55 am in Computer Blog | Comments Off on The 1st Wave of the Internet

The 1st Wave of the Internet

The 1st Wave of the Internet: Websites It seems not that long ago that I remember getting my first AOL disk in the mail. AOL was advertising 30 days of free dial-up internet service. I had an old beat-up computer with a 33.3k modem. At the time was all you needed according to the disk. I plugged the phone cable into my system and put the AOL disk in. Within minutes I heard a song of computerized static and pinging noises and was online. I had no clue what to do when I got there, but I felt a sense of accomplishment. I knew that I was a part...

read more

No pushy salespeople, just helpful advice to solve your problems