Blog

Microsoft Testing User Based Windows Setup For Performance Optimization

What do you primarily use your PC for? It's a more important question than you might think, because different use cases for your PC require it to be configured in different ways ...

Microsoft And HP Partnering For Better Laptop Battery Health

Do you own a newer HP laptop? If so, do you make use of the HP Battery Health Manager? If you don't know what that is, then the answer to the second ...

Kraken Malware Uses Microsoft Windows Error Reporting To Exploit System

Hackers are relentless when it comes to testing the boundaries of software for potential weaknesses to exploit. It seems that an unknown group of hackers has found a new one.  Based on ...

New HEH Botnet Malware Can Destroy Devices It Attacks

Security researchers at Netlab have recently reported on their discovery of a terrifying new botnet on the web. Dubbed HEH, this botnet is a different sort of threat. Unlike most others, this ...

Update Windows Display Drivers Soon For Security Fix

If you've got an NVIDIA graphics card in your PC, and odds are pretty good that you do, be aware that the company recently released a security update. It patches a number ...

Solid State Drives Get Health Monitoring In Windows 10 Update

Do you have a solid state drive (SSD) inside your PC? An increasing percentage of newer models are including them, taking advantage of their better speeds, relative to HDDs. Unfortunately, a recent ...

Software Crack Sites Are Being Used To Distribute Ransomware

Hackers have long used the lure of software cracks to infect unsuspecting users, but recently, a new group is making waves and finding significant success in using the Exorcist 2.0 ransomware to ...

Microsoft Edge Browser Is Included With Latest Windows 10 Updates

Do you use Microsoft Edge? Unfortunately, Microsoft doesn't care whether you do or not, they're force-installing the browser on Windows 10 systems as part of their updates. Ostensibly, this is because the ...

Windows Makes Changes To Avoid Finger Command Security Vulnerability

Hackers use a variety of techniques to infiltrate systems and make off with data, but one of the more effective approaches is to use the system against itself. There are a number ...

Bluetooth Vulnerability Could Affect The Majority Of Devices

Do you have a smartphone, tablet, laptop or a "smart" device in your home? Or perhaps the better question is, how many of those devices do you have? Whatever your number is, ...

Contact

DataStream Networks LLPDataStream Networks LLP Logo $$$
  • Nanaimo Location
    70 Church Street, Unit 2
    Nanaimo, BC V9R 5H4
  • Duncan Location
    435 Trunk Rd #208
    Duncan, BC V9L 2P4
  • Victoria Office (Coming Soon)
  • Phone: (250) 929-0745
  • Phone: (250) 929-0745