Uncategorized

5
Aug

Watch out for this costly hoax from ‘Microsoft’

[Taken from IT Security News and the news.com.au website] Further to my warning a few weeks ago about the Ransomware Trojan / Virus which could cripple your entire network, here’s a serious warning just published in IT Security Reports I subscribe to, as well as on some news sites. Note that this warning / heads up is also valid to

Read more

21
Jul

A tip explaining how to avoid common email traps..

Ransom Ware – Crypto Locker Infections Recent events prompted this blog post to remind everyone about the traps when dealing with email and attachments. Those who are interested in learning more, please see the end of this post for links to web sites that explain the destruction this type of infection causes and how it works. DO NOT OPEN ATTACHMENTS in email unless

Read more

30
Jun

A great tip about securing your online accounts..

This is something I’ve been doing for years. Many sites offer you the opportunity to save a set of questions and answers in the event that you lose access to your web site account, online email account or whatever. There’s been a bit of press lately about folks accounts being hacked because Hackers managed to guess the answers to their

Read more

5
Dec

List of Run Commands in Windows 7

People often ask me how I remember all the commands in Windows 7 that can start programs in by just clicking the Start ORB in Windows 7, clicking Run and then entering a short command, which is more often than not, starting the program by Navigating the Start > Programs Menu and clicking the programs Icons. Well, the truth is

Read more

25
Nov

Poodle Vulnerability – Are you protected?

Most would by now have heard of the SSL 3.0 Vulnerability, but have you tested if you’re at risk? How to test your browser’s TLS/SSL protection Several websites test whether your currently open browser supports SSL 3.0. For a simple test, Poodletest.com displays a poodle dog if your browser still supports SSL 3.0, and a Springfield terrier if it doesn’t.

Read more

16
Jan

Windows 8 – Limited support.. Business Users take note.. [Updated]

Updated Monday, February 25th 2013.. I wrote about this topic a few months ago, but as I just saved another client from a potentially expensive time wasting experience because they called to ask if upgrading to Windows 8 would cause them any problems, I think it’s worth repeating. To date, I’ve have formatted Windows 8 out for 2 people who decided to  downgrade ..

Read more

18
Dec

2012 Christmas Closure Dates Notification..

Andrew’s Computer Help Zone Services will be closed from Friday 21st of December to Monday 14th of January 2013. I would like to thank you for your support throughout 2012 and look forward to seeing you again in 2013. Finally, I’d like to wish you all a very Merry Christmas and a Safe and Prosperous New Year. Enjoy your break

Read more

24
Oct

Some Hints, Tips and Cautions from Andrew..

Hints & Tips.. Still confused and frustrated with the Microsoft Office 2007 & 2010 Ribbon Interface? To this day, I still get questions on a weekly basis from people who hate the Microsoft Office 2007 & 2010 “Ribbon” interface with a passion! Like many folks, I too loved the previous Microsoft Office Menu Interface from Version 2003 and below and

Read more

18
Sep

Serious Internet Explorer Vulnerability Discovered in IE Versions 7, 8 and 9..

Security Alert News sites around the world are reporting a serious “Zero-Day-Exploit” security flaw just discovered (in the wild) involving Microsoft’s Internet Explorer Web Browser. The exploit affects Versions 7, 8 and 9 of Internet Explorer running on Windows XP, Windows Vista or Windows 7.   Microsoft have confirmed the problem exists and are working on patching it up, however you

Read more

12
Jul

Don’t become a statistic – How NOT to get hacked online..

The Scenario.. Sadly, one of my clients (identity withheld for privacy reasons) recently had a Hotmail email account hacked into. The hacker guessed the account password. By reading emails in the account, the hacker discovered other websites often visited. What made the whole scenario worse was that the person used the same password on just about every website they needed

Read more