Due to COVID-19, we are only able to offer remote services. We will reopen our mobile services when we are cleared to. The remote services can cover most software issues. Fill out the contact form below and we will get back to you as soon as we can. You can also find us on Facebook, Twitter, Instagram all @sobxtech to make appointments.
Now more than ever, consumers spend increasing amounts of time on the Internet. With every social media account you sign up for, every picture you post, and status you update, you are sharing information about yourself with the world. How can you be proactive to stay safe online and, “Own IT. Secure IT. Protect IT.”? #BeCyberSmart and take these simple steps to connect with confidence and safely navigate the social media world.
You can learn more at https://bit.ly/2LLRe7R
Held every October, National Cybersecurity Awareness Month (NCSAM) is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity and to ensure that all Americans have the resources they need to be safer and more secure online.
We are big believers in keeping our data protected and secured.
There are lots of great tips and information out there that we will be sharing all month long. Stay tuned and we will be back with more information this week.
Feel free to read and download this information about Cybersecurity while traveling.
In today’s technology era, people do a lot of tasks online, right from the comfort of their home. With these privileges comes the need to input important information (such as credit card numbers, social security numbers and account numbers) into web pages where you don’t know who’s reading the information on the side or who is spying on what you do from a separate location.
Network security is very important, so I have listed a couple of things to remember:
1. Don’t click on links that you are unsure about
2. Don’t open emails that you don’t know
3. Keep your home network secured so people around you can’t piggy back off of you.
If you are having issues with viruses, network issues, malware, etc. Don’t hesitate to give us a call or drop us an email.
Have you always wanted to learn how to code? Here’s your chance! Learning to code just got easier. Check out this excellent article on coding for anyone who wants to learn how to code, from TakePart.
If you take part, let us know in the comments below. We’d love to hear from you!
The Tobacco Road Cruisers car show is the first custom car show I’ve been to since moving to North Carolina in 2012. The show took place at MacDaddy’s in Cape Carteret and though I only snapped a few pictures, it was a great show.
The great thing about Tobacco Road Cruisers is that they’re a local non-profit organization (located in Jacksonville, North Carolina) with the goal of uniting one body for the purpose of enjoying all aspects of classic auto sports and camaraderie among the members.
1950’s Custom Classic Car
Beautiful Red 1957 Chevy
2011 Green Chevy Camaro SS
Vehicle Information sheet for the 2011 Chevy Camaro SS
Awesome license plate for the 2011 Green Chevy Camaro SS “El Grinch”
This car owner paid tribute to those affected on 9/11. Never Forget 9-11-2001
I love this convertible Mustang GT!
Finally, a car for every die-hard Steelers fan. Now that’s a fan!
As a recent graduate with a degree in Computer Network Systems, I love computers and technology. I wanted to share what I’ve learned from my classes with those of you who also have a love of computers. I hope you find this information helpful, interesting and useful.
Routing Basics (Routing Over WANs)
The most important function of a router, simply put, is that Routers route packets. From the perspective of the OSI network, layer-Layer 3-hosts (computers) and routers work together to deliver packets from one host to another. To do that, the host that creates the packet sends the packet to a nearby router. That router might send the packet to a second router, with that second router forwarding the packet to a third router and so on until the packet is delivered to a router that is connected to the same LAN (Local Area Network) as the destination computer.
Figure 1-1 shows three main steps, all from the perspective of Internet Protocol:
- The web server needs to send a packet to the computer on the right (172.16.3.3), so the webserver sends the packet to its default gateway router-namely router 1 (R1)
- R1 decides to forward the packets to R2 next based on R1’s routing table.
- R2’s routing table shows that 172.16.3.3 should be on a subnet directly connected to R2, so R2 knows to send the packet directly to the destination (172.16.3.3).
Figure 1-2 focuses on how the hosts and routers need to encapsulate the packet before sending anything over the LAN and WAN (Wide Area Networks) links. Hosts and routers must use data-link protocols, such as Ethernet on the LAN and Point-to-Point Protocol on WAN links, to forward the packets over the physical links.
An Example of the OSI Layers and What They Represent
- (7) Application Layer – This layer is where the end-user (computer user) begins the communication process. At this layer, user authentication is identified and protocols like FTP, TELNET, E-MAIL, and other file transfer protocols begin with the user starting the process.
- (6) Presentation Layer – This layer is where encryption occurs. This layer converts the file and/or information into a language (format) that the remaining layers can read and handle without any compatibility problems.
- (5) Session Layer – This layer is where the communication is coordinated. Applications are managed in this layer. This layer manages the exchange of information by creating and terminating all communication between the application layer at both ends.
- (4) Transport Layer – This layer is responsible for ensuring the data completes it’s transmission to the other user. It’s also responsible for flow control and error recovery.
- (3) Network Layer – This layer is where the routing and switching take place. Packet sequencing, addressing, congestion control, and internetworking happen at this layer. Logical paths are created at this level to allow users to communicate with each other. This layer utilizes IP addresses.
- (2) Data Link Layer – This layer is where packets (information) is broken into bits through encoding and decoding. At this layer you have two sections; Media Access Control (MAC), and Logical Link Control (LLC). The MAC section is where packets (information) is gathered and gets permission to transmit the data. The MAC section is where your computer’s MAC address is located to allow proper delivery to a specific system (computer). The LLC section controls synchronization, flow control, and error checking.
- (1) Physical Layer – This layer is where your hardware such as ethernet cable, Network Interface Cards, etc., provide the transmission through electrical impulse, light, and radio waves. This layer is the hardware means of sending and receiving data (information).
Geek tip: Some ways An acronym to remember the seven layers are: All People Seem To Need Data Processing
That’s a great way to remember the 7 layers of the OSI model! There is much more to come. Stay tuned for more!
Ever wonder about the evolution of the personal computer (PC)? Here’s a neat visual timeline in photos and chronological order. Enjoy!
Timeline of Computers
Computers and technology change everyday. These days, most people have a computer right in their hands. Technology is a wonderful tool and seeing how computers have changed over the years is amazing.