Month: June 2016

Top Tech Tip – Monitor your hard drive health

Monitor your hard drive health Knowing the health of your computer’s hard drive can help you avoid downtime and data loss by taking pre-emptive action before it fails. Acronis Drive Monitor is a free program that monitors your hard drive health while it is in use. You download the program here: If you need …

Top Tech Tip – Monitor your hard drive healthRead More »

Company History

Written by Jonathan Ansell, Director Alex (my buisiness partner) and I met at Secondary School. Our friendship centered around a shared interest of technology and the internet, and many a lunch time and free period were spent in the school computer room surfing the internet eyeing up the latest computer componants. Our first company, Ansell …

Company HistoryRead More »

Fixed cost IT for business

What is RMM? Fixed cost outsourced IT with proactive monitoring and management. What are the benefits? Fixed monthly price per device Unlimited remote support for covered devices Issues detected before they become major problems Proactive maintenance to ensure network stability Minimised disruption during routine servicing Anti-Virus Protection included Click here for more information.

VoIP and its requirements

What is VoIP? VoIP stands for Voice over IP which means that voice data is transmitted using a data connection. For example, your ADSL or Fibre Broadband connection. To establish a VoIP Telephony system, you need three things. The first is at least one IP phone that will plug into your switch or router. There …

VoIP and its requirementsRead More »

What is a rootkit?

A rootkit is a type of malware that enables remote control of a user’s computer without their knowledge. Once a computer has been infected it becomes part of a botnet, the goal of which is to create a network of infected computers that can be used by cyber-thieves to do their bidding.

What is a botnet?

A botnet is made up of computers that have been compromised by a malicious program known as a rootkit. These computers are then used to perform tasks without the owner’s consent. The most popular uses of a botnet are sending large volumes of spam email and launching denial of service attacks.