Err

CALL US NOW AT 0118 411 5000

How To guides

What you can do with your Laptop

So you have purchased your shining new laptop, you can go on the Internet and send Emails but is there more you could be doing with it ? READ ON to find out ….

1. Use your laptop/Computer to connect to the Internet where you can send and receive Emails. Do Internet banking, Search for a job, search for stuff to buy, Read the news/ research news articles, educate yourself and family, download music, chat with family and friends world wide and much more.

2. Watch DVDs, Play music and listen to the Radio

3. Add other users so that different members of your family can use your computer/Laptop

4. Transfer, Store and watch photographs you have taken from your Mobile phone or Camera on your computer.

5. Store videos, music and photos

6. Produce Documents, Spreadsheets, Calendar/Diary and Reminder. Use your computer to store names and addresses of people you know and remind you of important events such as birthdays, Anniversaries appointments.

7. Use social networking sites such as Facebook, MSN, Twitter with your webcam and microphone

8. Use your Laptop to play games such as Solitaire, Chess, Flight simulator, Golf Simulator, Car Racing, Sonic

9. Load additional programs that will allow you to do many other things such as home accounts, produce databases.

10. Connect other devices such as Printers, Scanners, Modems, Phones.

Here some other more advance things you can do. (Some of these things may require that you purchase additional equipment)

Use your mobile phone to connect your laptop to the internet if there is no network, Phone or Wireless facility.

Use you laptops at Airports and other places where they offer wireless connectivity

Use your Laptop in your Garden, Upstairs, attic any where in your house without using wires..

Set up a secure connection to your workplace over the Internet (VPN) connection and work from home!

Synchronize your contacts, Phone numbers, Calendar between your Mobile phone and Laptop ( very useful if you loose your phone )

Transfer files using a Flash Drive

Use your Laptop for Presentations by connecting to a TV, Projector or similar device.

Make FREE or cheap calls using the Internet (Sype)

Use your laptop to watch TV

Add a portable external Hard Drive to store Music, Videos, Photographs

If you would like to be able to do these things and you don’t know how. We can help you ! Just give me us call the number is

0118 988 4777

Created On  16 Jan 2012 23:42 in How To guides  -  Permalink
0 Comments  

How to avoid the Top 4 Email Security Threats

The Top Four Email Security Threats – And How to Avoid Them

Companies of all types and sizes have come to rely on email as a means of enabling fast, cost-effective communication, collaboration, and information-sharing. Email correspondence has, for many organizations today, become the primary method for corresponding with colleagues, customers, and business partners.

But, email is fraught with risk, such as viruses that can corrupt mission-critical documents and applications, hackers that will try every trick imaginable to obtain confidential information, and spam that can impact the performance other components within the communications infrastructure. These threats have the ability to wreak havoc on operations – stopping business systems and the mission-critical activities they support dead in their tracks.

Below is an overview of some of the most common email security threats, and a summary of how today’s email security technology solutions can help prevent them.

Viruses

In spite of the severity of the many widely-publicized outbreaks over the past several years, and the documented devastation they have caused, many corporate email systems are still quite vulnerable to viruses. In fact, in the first quarter of last year alone, an estimated 19 email virus attacks hit US companies.

Today’s viruses are very sophisticated, and often appear to be harmless correspondence such as personal notes, jokes, or marketing promotions. And, while most viruses require recipients to download attachments in order to facilitate infection and spread, some are designed to launch automatically, with absolutely no user action required.

The effects of email-borne viruses can be significant. Many can be distributed around the world in just a matter of hours, bringing down critical communication systems, hindering the performance of global networks, and corrupting vital business documents.

How Email Security Solutions Prevent Viruses

There are a variety of email security solutions on the market today that offer highly advanced virus protection. These applications automatically scan all ingoing and outgoing messages and attachments for infection before they reach servers and email inboxes. If you are considering an email security solution, be sure to choose one that has automatic update capabilities. New threats emerge all the time, so you’ll need to be sure that your solution offers immediate protection from all the latest and greatest risks.

Spam

Some studies show that as much as 15 to 20 percent of all corporate email can be considered spam, and that the average 1,000 employee company can receive 2.1 billion non-solicited email messages each year. Spam cost US corporations a whopping $8.9 billion in lost productivity and system slow-downs annually, according to industry experts.

But while most spam is simply annoying and counter productive, some of it can be downright dangerous. In an effort to "trick” more recipients into opening malicious emails to facilitate faster spread, many hackers have begun disguising viruses, spyware, and malware as innocent-looking spam.

How Email Security Solutions Stop Spam

Cutting-edge spam filters are included with many email security packages today. These filters help identify non-relevant communications using key words and phrases, or other more advanced measures such as format, size, or ratio of graphics to text. Emails flagged as possible spam are typically moved to a separate folder, or are instantly deleted from email servers. Many solutions will also block email addresses that are known to have sent spam, so they cannot distribute additional disruptive emails in the future.

Phishing

Phishing schemes are used to perpetuate identity theft or financial fraud by posing as "authorized” emails from established and trustworthy institutions, in an attempt to get recipients to surrender personal information such as social security or bank account numbers. While most phishing campaigns are aimed at individuals and private email addresses, there are some more bold and brazen hackers who have been known to target smaller businesses, in hopes of obtaining corporate credit card numbers, log in IDs and passwords that provide access to CRM and financial systems, and other information.

How Email Security Solutions Stop Phishing Expeditions

Anti-phishing protection is a key component of many email security solutions. Through a powerful combination of techniques and services for authentication, detection, prevention, and reporting to enable effective threat analysis, as well as attack prioritization and response, these applications are designed to minimize both the risk, frequency, and impact of phishing.

Spyware

What would happen if an outsider could monitor every mouse click, every key stroke, every action that took place on your company’s PCs? Would they gain access to confidential product development plans? Would they find out more about your customers and prospects than you want them to know? Would they learn about emerging competitive strategies?

Spyware enables hackers to do just that – record all activities and data on the infected computer via a program that dynamically gathers information and transmits it via an Internet connection. Spyware is often bundled in with shareware and freeware programs, and usually installs and runs without the knowledge of the user.

How Email Security Solutions Prevent Spyware

Firewalls alone are not enough to help you avoid falling victim to spyware. An advanced email security solution that scans desktops, laptops, and other network devices regularly for spyware programs – and immediately removes them – is needed to offer full protection. Most email security software will even offer a proactive approach to spyware security, blocking known spyware programs before they can be downloaded and installed.

Created On  16 Jan 2012 23:39 in How To guides  -  Permalink
0 Comments  

How to get the best from your Laptop Battery

Keeping your laptop running for longer without recharging…

The beauty of notebook PCs is the portability, making them an essential device with an obvious advantage of mobility over desktop computers. Of course, after several hours, you will need to recharge your laptop’s battery, plugging an AC charger from the mains into your laptop, which means, for a short period of time, it’s fixed to one place, making it effectively a desktop PC for a short while. Annoying, but with the incredibly increased run times from new laptop computers on the market, the need for recharging is less frequent, as battery run-times have significantly increased over the past few years. It’s not uncommon to have a laptop that can run for a working day without recharge, making it ideal for those on the move.

Of course, if you’re demanding a lot of performance from your machine, the battery will drain faster than normal. Your system might be running unnecessary programs right now, which creates a burden on the battery run time. We have a few tips for you to get the absolute potential from your laptop and its battery. These tips apply to old as well as new laptop computers, for the now ubiquitious Lithium Ion (Li-Ion) batteries, the Nickel Metal Hydride (Ni-MH) batteries and the virtually obsolete Nickel Cadmium (Ni-Cd) batteries.

1. Essential treatment of a new battery

Whether you have a new battery, or a totally brand new laptop system, the most important thing to do before normal usage is to fully charge the laptop battery to 100%, then deliberately discharge it completely. Then, charge it up again, and use your laptop normally. Why do this? Well, this method allows your battery to ‘learn’ how much electrical charge it can hold. Without this important treatment, you won’t be getting the potential out of your battery’s life span. Also, ensure that when you charge your battery, it reaches 100 percent.

2. Turn down your screen brightness!

The LCD display is quite a big drain on your battery power. Do you really need the brightness on the highest setting? Adjust your display so that the screen is not fully lit, but comfortable enough for your viewing. This will help increase your battery run time.

3. Use power wisely

Unused devices are also a drain on your system’s power. Remove USB devices and other connected units when they’re not needed. Try to only use your CD/DVD drive when necessary. If you need to repeatedly access files/music from a disc, it helps to copy the material to your hard disk - the spinning of a CD/DVD to read files is a huge factor in battery drainage, whereas hard disk access is a significantly lighter burden. If you’re not using your laptop, put it into sleep mode, which keeps enough power running to maintain minimal function, so you can resume full power when you’re ready to return to your work or play. Also, close down programs you’re not using. If you don’t have a net connection, you won’t be needing a web browser or an Instant Messenger running, for example.

4. Streamline your system’s hard drive

If you’ve been using your computer quite a lot, it helps to defragment your hard drive. This cuts out a lot of work your computer must do when accessing files. You can do this in Windows XP by clicking on the START button, All Programs, Accessories, System Tools and selecting Disk Defragmenter. It’s simple to use, and should be performed regularly to get the most out of your system. Doing this will ease stain on your hard drive, and thus will make the battery run time last longer.

5. Remove start-up items

When you switch on and run Windows, start-up items load into memory, adding to the load on your CPU. It’s possible that you may never use any of these programs in your session, but with them hanging around ready to be used, your battery will be drained further. You can review and remove selected programs from the start-up process by clicking the START button, selecting RUN… and type MSCONFIG into the prompt.

6. The heat is on…

High temperatures are not good for laptop batteries. They work at their best in cold conditions, although they are optimised for great usage at room temperature, so you don’t have to worry about taking your laptop into an igloo to have it running! Where possible, keep your laptop battery away from excessive heat and/or hot weather - which is also vital for the safety of batteries. Having your battery relatively cool will increase its total lifespan. It can help to remove the battery and utilise AC power from the mains when possible, to keep the battery lifespan safe.

7. Power up frequently

Lithium Ion (Li-Ion) batteries should be charged as soon as possible, and often. (The exception to this rule if if you’re not using them for a longer time, in which case you should bring them to a charged level of 40%.) Get your battery charged up before it hits 0%, this will prolong the battery lifespan and avoid major problems. 

8. Storing spare or rarely-used batteries

We’re not kidding, the best place for a rarely used Lithium Ion (Li-Ion) laptop battery is in your refridgerator - the benefits for the battery lifespan are at the best! At 0°C, the battery loses less charge than at higher or lower temperatures. Before doing this, we recommend the charge to drop to 40%. We also highly recommend that when taking a battery out of such a cold condition, that you let it remain in room temperature for at least 24 hours before using it in any laptop.

Created On  16 Jan 2012 23:37 in How To guides  -  Permalink
0 Comments  

How to protect against Computer Viruses


How to avoid the Top 4 Email Security Threats

The Top Four Email Security Threats – And How to Avoid Them

Companies of all types and sizes have come to rely on email as a means of enabling fast, cost-effective communication, collaboration, and information-sharing. Email correspondence has, for many organizations today, become the primary method for corresponding with colleagues, customers, and business partners.

But, email is fraught with risk, such as viruses that can corrupt mission-critical documents and applications, hackers that will try every trick imaginable to obtain confidential information, and spam that can impact the performance other components within the communications infrastructure. These threats have the ability to wreak havoc on operations – stopping business systems and the mission-critical activities they support dead in their tracks.

Below is an overview of some of the most common email security threats, and a summary of how today’s email security technology solutions can help prevent them.

Viruses

In spite of the severity of the many widely-publicized outbreaks over the past several years, and the documented devastation they have caused, many corporate email systems are still quite vulnerable to viruses. In fact, in the first quarter of last year alone, an estimated 19 email virus attacks hit US companies.

Today’s viruses are very sophisticated, and often appear to be harmless correspondence such as personal notes, jokes, or marketing promotions. And, while most viruses require recipients to download attachments in order to facilitate infection and spread, some are designed to launch automatically, with absolutely no user action required.

The effects of email-borne viruses can be significant. Many can be distributed around the world in just a matter of hours, bringing down critical communication systems, hindering the performance of global networks, and corrupting vital business documents.

How Email Security Solutions Prevent Viruses

There are a variety of email security solutions on the market today that offer highly advanced virus protection. These applications automatically scan all ingoing and outgoing messages and attachments for infection before they reach servers and email inboxes. If you are considering an email security solution, be sure to choose one that has automatic update capabilities. New threats emerge all the time, so you’ll need to be sure that your solution offers immediate protection from all the latest and greatest risks.

Spam

Some studies show that as much as 15 to 20 percent of all corporate email can be considered spam, and that the average 1,000 employee company can receive 2.1 billion non-solicited email messages each year. Spam cost US corporations a whopping $8.9 billion in lost productivity and system slow-downs annually, according to industry experts.

But while most spam is simply annoying and counter productive, some of it can be downright dangerous. In an effort to "trick” more recipients into opening malicious emails to facilitate faster spread, many hackers have begun disguising viruses, spyware, and malware as innocent-looking spam.

How Email Security Solutions Stop Spam

Cutting-edge spam filters are included with many email security packages today. These filters help identify non-relevant communications using key words and phrases, or other more advanced measures such as format, size, or ratio of graphics to text. Emails flagged as possible spam are typically moved to a separate folder, or are instantly deleted from email servers. Many solutions will also block email addresses that are known to have sent spam, so they cannot distribute additional disruptive emails in the future.

Phishing

Phishing schemes are used to perpetuate identity theft or financial fraud by posing as "authorized” emails from established and trustworthy institutions, in an attempt to get recipients to surrender personal information such as social security or bank account numbers. While most phishing campaigns are aimed at individuals and private email addresses, there are some more bold and brazen hackers who have been known to target smaller businesses, in hopes of obtaining corporate credit card numbers, log in IDs and passwords that provide access to CRM and financial systems, and other information.

How Email Security Solutions Stop Phishing Expeditions

Anti-phishing protection is a key component of many email security solutions. Through a powerful combination of techniques and services for authentication, detection, prevention, and reporting to enable effective threat analysis, as well as attack prioritization and response, these applications are designed to minimize both the risk, frequency, and impact of phishing.

Spyware

What would happen if an outsider could monitor every mouse click, every key stroke, every action that took place on your company’s PCs? Would they gain access to confidential product development plans? Would they find out more about your customers and prospects than you want them to know? Would they learn about emerging competitive strategies?

Spyware enables hackers to do just that – record all activities and data on the infected computer via a program that dynamically gathers information and transmits it via an Internet connection. Spyware is often bundled in with shareware and freeware programs, and usually installs and runs without the knowledge of the user.

How Email Security Solutions Prevent Spyware

Firewalls alone are not enough to help you avoid falling victim to spyware. An advanced email security solution that scans desktops, laptops, and other network devices regularly for spyware programs – and immediately removes them – is needed to offer full protection. Most email security software will even offer a proactive approach to spyware security, blocking known spyware programs before they can be downloaded and installed.

Created On  16 Jan 2012 23:30 in How To guides  -  Permalink
0 Comments  
Already registered? Enter your email and password:First Visit?Create an account
Subscribe to our newsletter.