Skip to Content


Cloudstar Now Offering Open VZ Support

Cloudstar is please to announce support for pre-existing OpenVZ instances, as well as fully managed OpenVZ, and OpenVZ isolated container hosting.

OpenVZ is container-based virtualization for Linux. OpenVZ creates multiple secure, isolated containers (otherwise known as VEs or VPSs) on a single physical server enabling better server utilization and ensuring that applications do not conflict. Each container performs and executes exactly like a stand-alone server; a container can be rebooted independently and have root access, users, IP addresses, memory, processes, files, applications, system libraries and configuration files. For more information about the technology and how it differs from the others like Xen, VMware etc., see introduction to virtualization

While virtualization technologies such as VMwareXen and KVM provide full virtualization and can run multiple operating systems and different kernel versions, OpenVZ uses a single Linux kernel and therefore can run only Linux.

Containerized Applications benefit from being both highly portable, and sand-boxed for additional security.

Open VZ



0 Continue Reading →

American Bankers Association Launches Phishing Prevention Campaign

Every day, thousands of people fall victim to fraudulent emails, texts and calls from scammers pretending to be from their bank. Banks of all sizes are suffering significant monetary and reputational losses from these increasingly sophisticated scams targeting their customers. We want to change that.

ABA is calling on all banks across the country—members and nonmembers alike—to register to participate in the new #BanksNeverAskThat anti-phishing campaign—a fresh, bold plug-and-play campaign created to educate consumers about phishing scams and how to thwart them.

Register your bank now and receive a toolkit full of ready-to-use assets. Designed to be humorous, eye-catching and engaging, the kit includes videos, GIFs, social posts, printables and more to help educate and protect bank customers. The campaign is entirely FREE (including for non-ABA members) and can be co-branded, bank-branded or ABA-branded. Take a sneak peek at the toolkit.

0 Continue Reading →

How to present your video and content side by side in a Microsoft Teams meeting

Present your screen content and webcam feed side by side, on top of each other, or however you want, in your Teams meeting with this handy trick.

By Matt Wade

Today we’re going to cover a little workaround—this probably qualifies as a life hack, actually—for presenting both your face and shared content—like a slideshow, your browser, a file—at the same time during a Microsoft Teams meeting. Basically, you can present like a newscaster in a meeting and it requires no additional software or skills to do it. It can really amp up your presentation, class, meeting, whatever.

For a video version of this post, press play below. You probably want to watch the video. I go through a bunch of demos on how to actually do this and discuss a bunch of the nuances to maximize the professional look, which may help make it all make more sense.

Microsoft Teams has announced some major changes and improvements when it comes to how people’s faces and content displays during meetings, but there’s still a big need—at least in my opinion—for sharing your face with content in a configurable side-by-side way (and there will remain that need even with the announced updates). Think of a newscaster with a graphic above their shoulder or a gamer live-streaming their play with their face in the corner.

I see this having a big impact on meetings where there is one or only a few main presenters, not really for meetings where many people discuss or brainstorm back and forth. It’s also fantastic if you’re a teacher presenting slides or a white board in your browser and you want to show your face to keep students more engaged.

Read more where originally posted, HERE

0 Continue Reading →

Microsoft warns digital currency owners to be aware of new malware

In a tweet, Microsoft Security Intelligence (MSI) warned cryptocurrency owners who are also Windows users on August 27 that their funds in crypto wallets might be in danger because of a new malware.

The new malware, called Anubis, seems to use code forked from Loki. It steals crypto wallet credentials, credit card details and other valuable information from these Windows users.

According to MSI, it first discovered the malware in June in the cybercriminal underground. It has the same name with another potent banking Trojan that has been targeting Android smartphones for months.

MSI stressed that the malware seems to be controllable, stating that it has only been deployed in “what appears to be limited, initial campaigns that have so far only used a handful of known download URLs and C2 servers.”

Certain websites trick people into downloading Anubis, then the malware steals information and sends these to command and control servers via an HTTP POST command.

MSI says it will continue to monitor the threat. Cybersecurity experts suggested that the way to avoid the download is not to click on any email that seems fishy. Because the original code Loki used social engineering techniques to target its victims, sending attachments via email, which, once clicked on, would install the malware.

Read more from the original article HERE

0 Continue Reading →

4 Benefits of Using a FedRAMP Authorized Cloud Service Provider (CSP)

Security breaches and cybersecurity attacks happen every day, making it imperative that organizations have the proper security controls in place. In addition to having your own security measures established and tested, you also need to ensure that every service provider you work with is up to your standards, especially a cloud service provider (CSP).

This is why the U.S. government enacted FedRAMP (The Federal Risk and Authorization Management Program) in 2011. Establishing this set of security standards addressed the measures needed to keep sensitive government data secure when working with cloud service providers. FedRAMP addresses the assessment, authorization, and continuous monitoring processes these CSPs need to align with in order to be authorized to work with federal agencies.

Does your agency or business work with government data? Do you need to comply with FedRAMP regulations? If so, let’s take a closer look at two types of CSPs you can work with – FedRAMP Ready and FedRAMP Authorized. We’ll learn more about these two distinctions and the benefits of working with a FedRAMP compliant CSP.

Continue Reading Original Article HERE

0 Continue Reading →

New Python-scripted trojan malware targets fintech companies

PyVil RAT is capable of keylogging, taking screenshots and more – and the those behind it have gone to great lengths to keep it as under the radar as possible.

A well-resourced hacking operation has deployed newly-developed trojan malware in a campaign targeting financial tech organisations with the aim of stealing email addresses, passwords and other sensitive corporate information – and the malicious code is bundled inside code ripped from legitimate applications.

Known as Evilnum, the advanced persistent threat (APT) group first emerged in 2018 and one of the reasons for their success is how often they’ve changed tools and tactics as they take aim at targets related to Fintech mostly located in Europe and the UK, although some victims are located in the Americas and Australia.

Read More HERE

0 Continue Reading →

How to Fix a Bad Comcast Connection

I’m not going to begrudge anyone for using the modem and router that their ISP provides them. You shouldn’t—because you’re probably paying your ISP to “rent” a device that isn’t very good—but not everyone has the patience or inclination to understand the nuances of wireless networking, or even their monthly bill.

On Instagram the other day, a friend of mine—a teacher currently spending her days video-chatting a room full of kids—was complaining about her Internet connection. Her video chats kept dropping, and she was seeking any troubleshooting advice the Insta-masses could send her way. She admitted she know nothing about wifi, but presumed that was the problem.

Read more from the original article HERE

0 Continue Reading →

Just Because macOS Lets You Install an App Doesn’t Mean It’s Not Malware

As long as macOS lets you install an app, it should be safe, right? That’s the point of Apple’s Gatekeeper and notary service, which it began to enforce in macOS Catalina back in February. In theory, it means that any app you install on your Mac should have “been checked by Apple for malicious components.” But you would be wrong in assuming that any app with a Gatekeeper greenlight is actually safe.

As a recent article from Objective-See’s Patrick Wardle describes, there’s a new Mac attack making the rounds that uses Gatekeeper-passing payloads to distribute a particularly popular and problematic piece of malware: OSX.Shlayer.

Read the original article HERE

0 Continue Reading →

Cloudstar to Offer ProDoc Hosting for Arm-Based MacBooks

Cloudstar, a leader in legal technology, and legal application hosting continues to look for new ways to help clients.

Later this year, Apple will start switching its Macs to its own ARM-based processors, but you won’t be able to run Windows in Boot Camp mode on them. This will present problems to many law offices. Microsoft only licenses Windows 10 on ARM to PC makers to pre-install on new hardware, and the company hasn’t made copies of the operating system available for anyone to license or freely install.  This leads to challenges to many Mac based law firms- specifically those who prefer to run ProDoc locally via Windows dual boot, or via Parallels.  ProDoc is a document drafting system that helps lawyers and legal professionals save valuable time by decreasing paperwork and increasing accuracy.

Cloudstar has solved this problem for our legal client base in our Citrix-based AND our HTML5 based compliant legal cloud.

Via hosted desktop, or published app, lawfirms can quickly and easily run ProDoc as if the application was naively installed on ANY apple device-  iPad, iPhone, Intel Macbook, or ARM Macbook (even Google devices such as Android and Chromebook).

Please contact us for additional information about ProDoc hosting, or how Cloudstar helps law firms embrace the latest in legal technology.

ProDoc for Lawyers

0 Continue Reading →

Cloudstar To Offer HTML 5 Desktops

Cloudstar is now please to announce HTML 5 based hosted applications, desktops and workloads.

Access Windows applications and desktops via any modern web browser without installing or configuring any client-side software with HTML 5 based solutions from Cloudstar.

With support for Windows, MacOS X, iOS, Android and Chromebook among others, Cloudstar HTML 5 Remote Access is leading the way in the remote working concept.

Benefits Include:

  • Lower costs
  • Simple, fast printing
  • Works on any device
  • No client side software to install
  • No plugins to install

Easily load balance workloads across multiple Windows Server 2019 application servers:  from just a few to several hundred.  Publish applications, desktops, complex workloads and more.

html 5

0 Continue Reading →