Tuesday , 7 May 2024
Home 4 John Black (page 11)

John Black

A professional fast learner, with experience in the IT management, capable of technical troubleshooting to identify and solve problems.

Protect Your Network with OpenDNS

The security benefits are well worth the times investment, OpenDNS can protect your small business network, is take a few minutes to set it up and is free and has contributed significantly to combat against the conficker worm, and it will protect your network from any number of future attacks, as a bonus, it may …

Read More »

Facebook VS Reality

I began wonder, what if life isn’t as good facebook , so in the spirit of review, i decide to do a head to head comparison of two. Getting dressed in the morning Real life, Unless you’re nudist, clothing is mandatory. Facebook, Clothing optional, even the concept of morning loses its imperative when friends happen to be scattered across the globe. Hygiene/Grooming Real Life, Strongly recommended. Facebook, Optional, except when you take your profile pictures, then again you could use any image and some friend will post a picture of you when you were younger, thinner and better looking, albeit with underwear on your head and you can use that.

Read More »

Facebook, is your identity at risk

The total number of users on the social networking site Facebook has now soared above the 200 million mark. Just to put that into perspective: if Facebook were a country, it would be the fifth largest on Earth, after China, India, the U.S. and Indonesia. According to a recent report by ComScore, European users of social network Facebook have grown by 314% over the past year to nearly 100 million users. Many of the aspects that make Facebook and other social networking sites so popular also make them a prime hunting ground for identity thieves, online scam artists and criminals. However, there are a few measures you can and should take to protect yourself. Beware of divulging personal information on your user profile Many users don’t think twice about entering a wealth of personal information into their user profiles, everything from their address to their date of birth and home …

Read More »

Small Business Server

Your small office probably relies on more than one computer to get work done, for managing tasks across all of your company’s PCs, consider using a small business server, the main benefit of this central hub will be shared storage space and increased backup options, as your company’s need grow, however, you can use the server to design and test a web site, host intranet service and host your own internet presence. Choosing a sever The cheapest server have very low hardware requirement, a PC with a Pentium Pro CPU can handle an Ubuntu Linux based server. Windows Small Business Server 2008 is a step up from that, you might be able to run it on a recent, unused PC, or you could buy a new server with it preinstalled, Small Business Server 2008 is ideal for a staff of 24 or fewer people, with 25 or more employees, you’ll …

Read More »

What does your desk say about you

If you are sitting at your desk now, take a look around and ask yourself, “what is this desk saying about me?”, for example, what messages does a photo of your mum send to your co-workers, or a low-maintenance cactus, or the tons of boxes and files below your desk? Ask a psychologist and, unsurprisingly, they’ll tell you that just like the clothes we choose to wear or the meal we take at lunch, our desk is often perceived as an extension of our personalities, nothing ground breaking there but certainly worth bearing in mind. Recent studies have revealed that desks can be useful to managers attempting to understand and motivate their staff, if you are interested in the way you are perceived at work and perhaps you are thinking of modifying that perception a desktop makeover is a great place to start. When considering the state of your desk …

Read More »

A guide to wireless guest access

Wireless guest access for smaller organizations People today expect Internet and e-mail access everywhere they go. Even if your business is quite small, it’s likely that your customers, vendors or partners could benefit from network access while they are your guests. Many small and medium-sized businesses (SMBs) assume that providing guest network access is complicated and costly and best left to the large enterprises. The benefits of guest access Regardless of the size or profile of your organization, interaction with people outside your business is crucial. So how do we define guest. Well, they can include customers, temporary workers and contractors, trainees, colleagues from a partner business, visiting consultants or faculty, members of joint development teams, conference or seminar participants, representatives of manufacturers or distributors, and vendors or suppliers who want to manage inventory or re-order parts while on-site.

Read More »

Tweak your registry to speed up your broadband connection

If your physical infrastructure is in good shape, or you’re using a fast cable broadband service, there’s little else you can do in the way of repairing to improve your broadband connection performance, but ensuring that Windows is set up optimally for good network performance is one way of eking out a bit more speed and reliability, especially on high-speed broadband packages. Consumer cable broadband provider, recommends using a program called TCP Optimizer to improve performance of its 20Mbits/sec service, but the software can also be used by ADLS customers, TCP Optimizer (www.snipurl.com/a3mdy) is a small utility that edits the TCP and IP parameter in the Windows Registry, the most important tweak it makes is to the TCP Receive Window size. The TCP Receive Window defines the amount of data a computer can accept from a server without acknowledging the server, if the website has not receive acknowledgement for a …

Read More »

Get paid to be a hacker

Talking about ethical hacking, which is the need of the hour, to protect all online transactions from the wrath of viruses, An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing, and red teaming. Ethical Hacking is a scientific approach of understanding the tools, techniques and methodologies used by malicious hackers, thereby evaluating and mitigating the enormous threat posed by them. In other words, it is studying the vulnerability of a computer system and designing a security system, which is non-hack able. The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a …

Read More »

Manage Telecommuting Easily and Securely

If you could roll out of bed, commute just 40 feet, work in your robe and fuzzy slippers, and save thousands of dollars on travel expenses, would you do it? And, as a business owner or manager, would you offer the same benefit to your employees?, according to a survey commissioned by the Computing Technology Industry Association, 67 percent of respondents said their organization has seen greater productivity as a result of allowing employees to telecommute, either full or part-time, the main reason for the increase in output less commute time. No doubt telecommuting benefits employees and employers alike, but with the distractions of home beckoning children to drop off, a kitchen to clean, and laundry to wash can a telecommuter be as productive as employees in the office more important, can technology keep your data secure, your teams connected, and your staff accountable? It can, if you plan well.

Read More »