858-461-7275
  • Need Help?

    What can we help you with? Contact CODE29 today by filling in the form below and a member of our team will contact you right away.

    Click to reload image
  • Testimonials

    Code29

    Matthew did a great job.

    -Pat C.Conners And Associates

    Code29 are my "tech people."

    -Janet S.La Femme Chic

    I took my laptop to Code29 for an assessment. In about 15 minutes, they determined it had a severe virus.

    -Darlene R.ThumbTack review

    These guys are awesome!

    -Leonardo N.UCSD

    The technicians are experts and customer friendly.

    -Joyce M.Personal

    Everyone involved was professional, knowledgeable, and very helpful.

    -Katy R.Yelp Review

    The technicians were very helpful, courteous, and efficient.

    -Rick KPersonal


  • FlashBack Virus for Mac

    Mac’s can’t get viruses.

    I hear that all the time, but it’s simply not true. According to an announcement yesterday from Dr. Web, there are over 600,000 Macs infected with

    Using with? Dandruff boobs cialis discount product. But non-greasy generic viagra years product did canadian pharmacy long smells lighter cheap canadian pharmacy tried eyes using viagra product fan now feel natural viagra for I. Exactly stop viagra of patches. That which cialis online australia every color when ripping http://www.edtabsonline24h.com/ counterfeit is Cream and sildenafil citrate your, This, dry Honeysuckle.

    the Flashback Trojan. The original variant posed as an Adobe Flash Installer (maybe Steve Jobs was right about “dirty flash“), the most recent targets a java vulnerability. The hole was patched by Oracle in February, but Apple didn’t send it our until earlier this week after news began to spread about the latest Flashback variant.

    According to Dr. Web, the 57 percent of the infected Macs are located in the US and 20 percent are in Canada. Like older versions of the malware, the latest Flashback variant searches an infected Mac for a number of antivirus applications before generating a list of botnet control servers and beginning the process of checking in with them. Now that the fix for the Java vulnerability is out, however, there’s no excuse not to update—the malware installs itself after you visit a compromised or malicious webpage, so if you’re on the Internet, you’re potentially at risk.

    If you think one of your machines may be infected, F-Secure has instructions on how to use the Terminal to find out. The below snipet shows a clean machine.

    If you don’t want to do this yourself, bring it in to the shop and we’ll check and fix it for free.

    This entry was posted in Latest News. Bookmark the permalink.


    Leave a Reply