If you find yourself typing the same e-mail repeatedly in Microsoft Outlook with slight variations, you'll be pleased to know there is a feature within Outlook called e-mail templates. This feature allows you to create an e-mail as a "template" and save the contents of the e-mail as a file where multiple people can access it later. read more
So, you want to know more about IP addresses, ports, and DNS... Fortunately, it's not a combination of intellectual property, port and other drinks, and does not involve a Director of Nursing Services (though you may feel like you need a combination of these things once finished). read more
Keeping secure with the latest software updates can be quite a challenge. Similarly, working out what software packages to use can be just as confusing. In this post we aim to show you a couple of great software packages and a few simple methods you can use that we hope will help keep you safe and up-to-date. read more
Bamboozled by DNS? Let's face it, this stuff is really not as straight forward it looks. You buy a domain name, then what happens? There's root server, TLD servers, the Registrar, Domain Name Service, your own web server and possibly and eMail server! read more
If you are feeling in a charitable mood, and want to make life easier for hackers, crackers and other variations on the words that rhyme with packers, you should store all your passwords in a plain text file, word document or excel document, and call it something like "passwords". This will greatly assist anybody who gains access to your files to remove as much money from you as possible. read more
A great deal of confusion surrounds the simplicity of how internet DNS names work... (just at a simple level - when we type in a web site address or send email to an email address). Below is a simplified summary of how the basics work. This is not meant to be a hard and fast "this is how it works" but more a brief explanation of what happens behind the scenes without trying to go into too much complexity. Tools are available such as DIG and WHOIS that can verify these operations. Contact us if you would like further information on delving deeper into the inner workings.
An exploit kit is a software toolkit which gets injected into a site that is either malicious (created for the purpose of infecting PC’s via things such as spam e-mail links) or hacked (a trusted site that has been compromised) and silently installs itself while you are using your computer. read more