IT and Computer Technology Articles

Microsoft Changes its Policies after Hacking into Blogger’s Hotmail Account

Microsoft Changes its Policies after Hacking into Blogger’s Hotmail Account

Microsoft recently searched a blogger’s Hotmail account to find the person who leaked copies of Windows 8 and anti-piracy software. The leaker, who turned out to be an ex-Microsoft employee, was arrested and charged shortly after the search revealed his identity. John Frank, Microsoft’s VP and deputy general counsel, said the company searched the blogger’s…

Read more »

Microsoft Changes its Policies after Hacking into Blogger’s Hotmail Account

Microsoft Changes its Policies after Hacking into Blogger’s Hotmail Account

Microsoft recently searched a blogger’s Hotmail account to find the person who leaked copies of Windows 8 and anti-piracy software. The leaker, who turned out to be an ex-Microsoft employee, was arrested and charged shortly after the search revealed his identity. John Frank, Microsoft’s VP and deputy general counsel, said the company searched the blogger’s…

Read more »

Microsoft Changes its Policies after Hacking into Blogger’s Hotmail Account

Microsoft Changes its Policies after Hacking into Blogger’s Hotmail Account

Microsoft recently searched a blogger’s Hotmail account to find the person who leaked copies of Windows 8 and anti-piracy software. The leaker, who turned out to be an ex-Microsoft employee, was arrested and charged shortly after the search revealed his identity. John Frank, Microsoft’s VP and deputy general counsel, said the company searched the blogger’s…

Read more »

Microsoft Changes its Policies after Hacking into Blogger’s Hotmail Account

Microsoft Changes its Policies after Hacking into Blogger’s Hotmail Account

Microsoft recently searched a blogger’s Hotmail account to find the person who leaked copies of Windows 8 and anti-piracy software. The leaker, who turned out to be an ex-Microsoft employee, was arrested and charged shortly after the search revealed his identity. John Frank, Microsoft’s VP and deputy general counsel, said the company searched the blogger’s…

Read more »

Always Use Private Browsing Mode To Conduct Online Financial Transactions.

Always Use Private Browsing Mode To Conduct Online Financial Transactions.

Every major browser offers some type of private browsing mode: On Safari and Firefox, it’s called Private Browsing. On Google Chrome, it’s called Incognito Mode. On Internet Explorer, it’s called InPrivate. These modes are designed to keep your online activity safe from prying eyes. Despite different names and companies, all private browsing modes work in…

Read more »

Page 1 of 13312345...102030...Last »
Speak With An IT Professional

Agile IT Solutions is committed to serving our business community. Please enter your contact information and we will call you.

Do you have an immediate need?
 Yes No Unsure

My need is for?
 Business Home