post

Ransomware and the Importance of Backups

Ransomware has been around for a few years now, but it’s still evolving rapidly. It’s usually a program which is transmitted by email or via a malicious website, or even via links in social media. Cryptolocker and similar trojans will encrypt most of your files and then invite you send money to get them back. […] more »

post

Notes on the Heartbleed Bug

The Heartbleed bug represents a significant security threat to a wide number of systems that use a recent version of the OpenSSL library. This library is perhaps the most commonly used software for secure (e.g. HTTPS) applications and, as such, the risks are widespread. It’s hard to gauge the nature of the risks, or to […] more »

post

Christmas Wishes & Our 2013 Charities.

As we run up to Christmas, it’s time to thank you all for your support in 2013 and wish you all the best for a happy and successful 2014. Like last year, we’re making a small donation to some charities rather than sending out cards. 1. The Pepper Foundation (http://www.irhh.org/Pepper/) The Pepper Foundation provides funds […] more »

post

Watchguard Wireless Access Points: Update

After last week’s post, here’s a little more info regarding Watchguard upgrades and their wireless access point solution. I recently wrote about the arrival of Watchguard’s new wireless solution, integrating managed wireless with the familiar Watchguard firewall management. At today’s UK partner briefing, there was an opportunity to see the Access Points and get a […] more »

post

Tech Tip: “The type of filesystem is RAW” may not always signal disaster

This week, a client had a Windows server hard reboot (for no obvious reason) and when it came back their data volume wasn’t available. The data partition was visible in “My Computer” and Disc Management, but it didn’t show free/used space and clicking on the drive letter resulted in an invitation to format the disc. […] more »

post

How to: Set “Password Never Expires” on Office 365 accounts.

This isn’t something we’d recommend for normal operations.  However, using Office 365 with external applications isn’t great when it comes to dealing with password resets. In many cases, the first thing a user knows is that their email no longer connects, as the countdown warnings on a regular domain account don’t necessarily apply. With this […] more »

post

iPod/iPhone/iPad remote desktop with Pocket Cloud

Wyse Pocket Cloud provides a remote desktop (Windows terminal server), VNC and VMWare View client for mobile devices. Wyse provide two versions, the free edition which is limited to a single server connection, and the paid-for edition which offers additional features, such as multiple connections and support for Terminal Services gateway. http://pocketcloud.com/remotedesktop#tab-video This quick guide […] more »

post

Using Exinda to Help Improve Equallogic Replication – Setup

We’ve recently undertaken a project that involves replication between Equallogic iSCSI SANs. Using Exinda appliances, the objective is to use acceleration (WAN memory) to improve replication  performance, whilst using shaping to ensure that other business critical applications get priority during the day. We may look to using schedules to give the replication high priority access […] more »