Thor Computing, Inc.

Blog

Virus, Trojan Horse, Worm, Rootkit – What Does It All Mean?

You hear your IT guys toss these terms around all the time. It can be dizzying. They all amount to the same thing, don’t they? The answer to that question is both ...

What You Need to Know About Net Neutrality

We hear a lot of talk about internet neutrality, but what does that really mean? Once we come to some understanding of the term, the next question that naturally follows is, is ...

The Best Way To Stay Anonymous Online

As the number of hacking attacks and identity theft attempts continues to increase, people around the world are gaining a greater and greater appreciation for, and understanding of, the need for privacy. ...

Six Ways To Sharpen Your Focus In Dull Meetings

Let’s face it, meetings can be boring sometimes, but you’re supposed to be paying attention, right? Here are some useful tips to help you stay sharp when the meeting seems to be ...

2014 Is The Year Of Encryption

The signs are everywhere, and they are disturbing. Now more than ever before in history, everything you do is being watched, recorded and stored for later. It seems that not a week ...

What You Need To Know About DOS Attacks

You’ve probably heard the term before. Such and so company got hit with a Denial of Service (DOS) attack, but do you know what that actually means? If not, this will ...

Can Lost Data Be Recovered?

Sooner or later it will happen to you, no matter how careful you try to be. You, or someone using your computer, will wind up deleting that uber-important file you’ve just got ...

Why Two-Step Verification Makes Sense

If you hear the phrase ‘Two-Step Verification’ and roll your eyes, thinking to yourself that someone has just figured out yet another way to waste your time and make it harder than ...

What To Do When You Lose Your Twitter Password

Social media has become such a big, important aspect of our daily digital lives that people are inclined to panic when they get locked out of one of their cherished accounts. Twitter’s ...

Do Temporary Credit Cards Make Sense for Online Use?

Identity theft is the second fastest growing crime in the nation, behind only smartphone theft. In recent months, we have seen some high profile cases of hacking making the news, most recently ...

Contact

Thor Computing, Inc.Thor Computing, Inc. Logo $$$
  • 2551 Springdale Drive
    Rockford, IL 61114-6449
  • Phone: 815-637-4640
  • Phone: 815-637-4640

Social Media