• You can have someone with loads of experience in building IT infrastructures from the ground up. We field and manage a large number of important IT projects for our clients. From facilitating software think-tanks to finding the best applications for your business needs to general computer training and even process improvement, THC has an incredible track record for providing its clients with enterprise-level solutions for a vast array or processes.

  • THC provides professional web and app development services geared to augment your business and keep you competitive now and in the future. We can provide any web application and design needs your business may have, from a small landing page to complex mobile applications.

  • Incredibly affordable hosting that is easy on the budget. We offer dedicated web & email hosting with the best and most reliable data centers and incredibly competitive rates and production capabilities to scale with any operation. From a simple Shared Server, to Enterprise-level Cloud Arrays, we have the hosting and online communication tools your business needs. We can service and customize an email system for every need, large or small, that will allow your company to truly grow and communicate reliably well into the future.

  • If your business provides services to a competitive local market, you definitely want to sit down with us for a review. We can guarantee tangible results in helping build your business’ reputation as well as make sure your business stays as competitive and responsive as it can be. Let us help make your business the first thing people find when looking up your services or products.

  • As a leading provider of ZFS based storage solutions, we can provide complete storage options for any on-premise or cloud data storage project. SanAppTX (Synaptic Cloud) has implemented solutions for many enterprises with substantial storage needs where ZFS based solutions are a better architecture, more scalable and lower cost. With Synaptic Cloud you have immediate access to a team that is here to support your needs today and into the future. From 30TB to 50 Petabytes, we can not only handle your storage needs, we can do so at a fraction of what the competition bids.

Contact Us Now!

Welcome to our new site! Look forward to a vast array of new services designed specifically to make your company more profitable.

  • A little tech-ness from Tony

    Originally posted on Hold No Virtue by Tony Hunt

    How paranoid are ya?

    I know a lot of us are at the very least a little wary of getting hit by a computer virus/malware/generally nasty code.

    Before you get incredibly paranoid, or worse, you write it all off as fiction, let me give a little insight:

    It exists, it’s incredibly easy to find, and most importantly, it’s incredibly easy to avoid and defend against.

    1. Keep your virus scanner up to date.
    If you find that some virus scanners are outside your budget, use a free one. AVG & Kapersky are great examples of free scanners. If you want concrete details on which scanners actually pull their weight, I highly suggest you check out av-test.org. They really put scanners to the test and make sure the scanners do what they are meant.

    AV-Test.org’s Current Reviews

    Know the name of the virus scanner you have installed. Some harmful links and sites will attempt to trick you into scanning your system by creating a popup saying you need to scan your computer immediately. You run the scan, buy their software to remove the incredible number of harmful files on your machine (without realizing that you just downloaded them from the same source), and that’s it…you just paid them $50 for cleaning up all the bad stuff they gave to you in the first place. This is very BIG business for many country’s overseas, so knowing what you scanners name is will keep you from giving these scams a chance to rip you off.

    2. Don’t run it unless you know what it is.
    I can’t tell you the number of times I’ve watched turbo-trigger-happy people decimate their machine because of their uncontrollable need to double-click everything they see. I don’t need to give examples, we all have done it at some time or another. The bottom line is as a practice, running programs you aren’t familiar with on your machine is asking for fun.

    Some of these creepy business applications deliberately create icons and links designed specifically to make you think they are something else. I found one last year that looked like the windows update icon…but it wasn’t, it was a little program that set up a download point on your machine and checked an IRC channel for instructions from people as to what to download to the infected machine.

    If you ever have a question about what a program is, Google it. Here are some sites that are really good about telling whats what about a program:
    File.net
    ProcessLibrary.com

    If you want to scan a file, check out Jotti’s Virus Scan, it will let you scan a file on your machine with a gazillion scanners.

    3. Questionable sources.*cough* Torrents *cough*
    Some friend or buddy gives you a “freebie” copy of some software hookup they got. You have to be incredibly careful here. In addition to risking your computer, you’re probably breaking a handful of laws by using cracked software. Even worse, it’s estimated that 90% of the intrusions and malware/virus infections come from cracked or illegitimately licensed software. The difference is that you shouldn’t be downloading software that is from a questionable source. Any software you acquire that is deliberately cracked to enable the full use of the product without purchase/registration is asking for trouble, the decision is yours, but an incredible percentage of cracked software out there is wired to to make computer do a lot more than what you’re expecting.

    So thats it, simple advice. You can probably get away with the stuff in bold, but I thought it might be good to explain a little bit. Also keep in mind, this is the basics. There are tons more things you can do to tighten things up on your machine and I am sure I will write about those at some point.

    Regardless, the guidelines really are this simple folks. If you’re using the above, the odds are distinctly in your favor. Most of the time.

    Unless you’re me and happen to actually find malware in a legitimate application and have to alert the vendor that they made me cry when their software came up as toxic on 5 different scanners’ 🙂

    -T

Our Areas of Expertise

  • IT Infrastructure Design & Management

  • Risk Assessment, Compliance & Security Services

  • Enterprise Resource Planning

  • Disaster Recovery / Business Continuity Systems

  • Enterprise Storage

  • Website & Email Hosting

  • Website & Application Design

  • Search Engine Optimization

  • Online Reputation Management

  • Managed Services

  • Data Integration

  • Document Management

A couple quick lessons for new bloggers…

For those people interested in being Bloggers…beginning a blog…writing online…you might want to check this out.

What is CDN?

CDN is a “Content Delivery Network.” These networks allow for much faster response times by co-locating website content in multiple places, usually around the country they offer services in or in some cases even globally.

Google Analytics Update

Just a heads up. Apparently the revamp of Google Analytics does not feature automatically scheduled reports via email for clients …

Don’t be scared, it’s just Google

Sometimes people crying because their info is public & online via Google just make my arse twitch. How do you think it got there?!

Tony Hunt Consulting (THC) is a managed service and project management firm dedicated to helping businesses large or small grow and become a success via technology. We utilize some of the greatest talent in multiple arenas to provide enterprise level solutions that make it easy for businesses to operate with greatly-reduced IT costs. We are experienced in all environments, from law enforcement to server implementation to corporate risk management, and are constantly evolving our processes and services to meet the needs of today's demanding IT Consulting and Security industries.