So you’ve decided to purchase a new computer, and the first thing you do is look in a newspaper or flyers you received; now you’re flooded with more information than you can handle. The questions seem endless. Which is the best computer to get? Why is this model more expensive that the other, they both look the same? Should I get a MAC or a PC? The questions seem endless.Details
Over the past few weeks we’ve gone over many of the powerful new features of our mail system. However, no series on email would be complete without reviewing the proper email settings for your mail clients. In order to ensure the best security and reliability for your email, please ensure that your email clients are…Details
I recently had an APPROVED proposal on the table for a Cisco Router, Untangle UTM (Unified Threat Management) and a Windows PDC/File Server.
Then came (Nerd) Alex Brown…we spoke about ClearOS and ClearBox300. I was amazed it could take the place of all this gear, so I checked with David Redekop (co-founder of Nerds On Site) out of my disbelief, and he confirmed all of it.
Our new mail server provides searchable message archiving at the mailbox, domain, and system level for inbound and outbound email messages and complies with Sarbanes-Oxley (SOX), the Health Industry Portability and Accountability Act (HIPAA), and other regulatory requirements. Email archiving is not turned on by default, but is available at no extra charge to any…Details
With the recent launch of the Windows Phone 7, I think the major thing they did to set themselves aside from others is the “Live Tiles” function which basically makes everything accessible from one screen. For Gamers, one aspect they are taking advantage of is the X-box live feature where you can play games through…Details
I called the client and opened up a Bomgar session (remotely connected to her computer) with her and re-downloaded the file, and saved it to the desktop. We opened up the program and looked for the database folder. We found the file location, re-named the current file, and placed the restored file in the correct folder location.Details
SME’s often think that they are not targets for cyber-attacks. Over the past few years, most attacks have been aimed at banks and large retailers, but this is changing. Like the rest of the world, the bad guys like to look for the low-hanging fruit. As banks and retailers become more aware of the risks, they are spending large sums of money on security.Details
Many web hosts provide the ability for clients to provide their customers with SSL (Secure Socket Layer) connections when signed into their websites or email. It’s important to understand how SSL works, and why so many websites use the protocol to protect user data. Websites use SSL to encrypt and secure each user’s session while…Details
Digital technology is a reality in every aspect of our lives, at home at play and at work. In some applications we cannot control how it affects our daily routine; we just hope that it works. In others however we can manage its impact with knowledge, education and good advice.Details