Tuesday , 7 May 2024
Home 4 John Black (page 12)

John Black

A professional fast learner, with experience in the IT management, capable of technical troubleshooting to identify and solve problems.

Optimising Your Router

If you want to get the most out of your router, for wired and home plug (power line) networks, check the network activity icon in the taskbar to see if a PC is connected at 10, 100 or 1,000Mbits/sec, if it’s stuck at 10Mbits/sec, which happens with older network cards that can’t auto-negotiate these settings …

Read More »

Staying safe on Facebook

Recent news stories have reported a litany of facebook horror stories from geriatrics, people over age 30 who dented their dignities, if not their careers, through careless social networking, some people think that the post-collegiate crowd is simply too fuddy-duddy for facebook. Others insist that the site is now as essential as email and phone service, if not air and water, and nobody of any age should be discouraged from squandering time on facebook, even Bill Gates is reported to have a half-hour a day facebook habit, a typical facebook humiliation scenario involves having someone post something questionable to your wall, the public facebook page and then having that item inadvertently and automatically blasted to everyone you know via facebook. That group often includes business associates and other people with whom you’ve cultivated an illusion of respectability, because of the internet offers so many paths to public humiliation, it’s not …

Read More »

Deal with information overload

We live in a 24×7 culture, where multitasking isn’t just fashionable, it’s considered essential. Astounding numbers of people write text messages or take phone calls while they’re driving, write to-do lists in meetings, or read e-mails while they’re on the phone. The more tasks we juggle, the more we cram into our lives, the more productive we feel. But have we really got it all, or just pieces of everything? Are we juggling too much as we race breathlessly through the day, and are we losing the ability to focus on anything in depth? Has a constant flow of data become something we crave, the symbol of a full life? Drowning in data with messages flying at us from all directions, we’re drowning in data. The average office worker receives over 150 e-mails a day, not to mention numerous calls on different types of telephone, faxes, SMS and instant messages …

Read More »

TransferJet Better Bluetooth

TransferJet wireless technology under development by major camera makers, is intended to make wireless transfer of images between devices easier, now Toshiba is getting behind the wireless standard, having shown off laptop that uses the technology at the consumer electronics show in January, the companies pushing the technology tout transferjet (www.transferjet.org) as being more than 100 times faster than Bluetooth and transferring data between devices needs no pass code or pairing (as Bluetooth requires). Place a camera with TransferJet on the Toshiba laptop’s palm rest and it will automatically sync files on the camera with the laptop’s hard drive. The new technology can achieve throughput of 357 mbps, fast enough to support streaming video from camcorder and expects same impact on battery life, but not a significant one, the company plans to embed the technology in laptop and external devices in the fourth quarter of this year. Source : PC …

Read More »

Antisocial Social Networking

A message from one of your friend appear in your inbox, sent via a social network site that you use regularly, the message promise a big laugh and points to a web site you’ve never heard of, you click the link and the next thing you know, your PC or laptop misdirected to a phishing page that steal your log-in details or drive by download site that infect your system with a password stealing Trojan horse, and your friend says that she never sent you the message. Whether the culprit is a fake linkedIn profile page that serves up URLs leading to dangerous web site or bogus twitter message that purportedly comes from a friend, social networks are rapidly becoming the newest medium for malware attacks, as operating system and applications become harder to hack directly, online criminal comes to realize that is was much easier to fool people into …

Read More »

Server tips you should not miss

Investing in a server-based network can offer numerous advantages, better data protection, enhanced productivity, and money saved through efficient resource sharing, but purchasing a first server can be a headache. To help make the process easier, here some tips that will help you select and configure your server for optimal performance, security and efficiency. Choosing a server Two of the most important factors to consider when choosing a server are reliability and security. Because servers are often left on 24×7, they are more vulnerable to attacks; many people are dependent on them, so you can’t risk downtime. Another major consideration is the amount of power and capacity you need. Start by evaluating your expected business growth on the basis that a server has an active lifespan of five years. So if you anticipate an increase in the number of employees who will be using your business applications simultaneously, you should …

Read More »

What real world working you need from a laptop

Technology vendors often make the mistake of thinking that what you want dumber down technology or couldn’t be more wrong, I’ve tested more than my share of notebook in the past few years, in fact, I’ve had the pleasure or trying out nearly every notebook on the market, I’ve taken them on business trips, into meetings and home for the weekend, what I’ve learned is that I’ve never been happy with dumbed-down notebook, here are the real specs i look for every time. Weight and size I’ve got to able to put a portable in my large purse or extra shoulder bag, less than 5 pound is doable, less than 4 is ideal. Performance For a fast laptop that will last few years, i recommend a 2 GHz CPU or faster (they nearly dual-core) and 4GB RAM. Battery life Long time battery life often comes at the expense of weight, …

Read More »

Risk overstated for kid surfers

Children surfing the web are at no greater risk than when they are offline, according to US report, it says internet related sexual exploitation of young people remains a concern, but research showed it usually involves adolescents well aware that they are engaging with an adult with a view to sexual activity. The biggest problem for young people, online or off is bullying and harassment by their own age group, submissions from social report from a technical advisory group, most of the research pre-dates the rise of social network and area that needs further investigation, the research shows that the risk minors face online are complex and multifaceted and are in most case not significantly more than those they face offline and that as they get older minors themselves contribute to some of the problems. Unwanted exposure to pornography does occur online but those most likely to be exposed are …

Read More »

You have power to defeat security threats

Security is a top concern for businesses of all sizes, everywhere. Your valuable business data is the lifeblood of your organisation, and protecting it is vital. There may be a host of conflicting messages out there about how to best protect your data. Is not designed to help you resolve every single security problem on a technical level, but rather to help you better understand which are the true threats to your business systems and data. Establishing a security policy Examine the rationale for the immediate and prioritised implementation of solid security mechanisms. You’ll learn how to work with a trusted security business partner to craft your security policies. Identifying and mitigating reconnaissance and access attacks Learn about the unauthorised discovery and mapping of your corporate computer systems, services and components, and how to be constantly aware of the potential for information gathering, which is often the precursor to a …

Read More »