Chapter 3: DNS and Domains
In this excerpt from Ciaran’s upcoming White Paper ‘The Mail Must Get Through’ on email deliverability, we examine one of the core underlying features of the internet, DNS and Domains.
In this excerpt from Ciaran’s upcoming White Paper ‘The Mail Must Get Through’ on email deliverability, we examine one of the core underlying features of the internet, DNS and Domains.
Password management can be a bit of a nightmare. We’re always told to use complex passwords that are hard to guess, and to never re-use passwords. But, in practice this can be a challenge to remember them all! Most of us may have dozens if not hundreds of online services that require a username and password to access. How on Earth are we supposed to have a different complex password for them all and be expected to remember them without writing them down?
The good news is, you don’t have to remember them, or write them down!
When was the last time you received a fax? Possibly never. But, it might surprise some of you to know that millions of faxes get sent every day. In Germany, Japan and the US especially, they are alive and well, if not so much here in the UK. But how are they used in Phishing?
You can’t have IT without Security!
There, we said it, but what does that mean and perhaps more importantly, what does it mean for our customers?
Save as you go. If ever there was a golden rule of working with computers, this is it. Anyone who has ever worked on a document before losing their progress to an application crash or power cut knows only too well the dangers of not saving your work. So the introduction of Auto Save in Office seems to be, on the face of it, an absolute gem. But how does it work and what if you need to turn it off?
The evolution of the MSP started in the 1990s with the emergence of application service providers (ASPs) who helped pave the way for remote support for IT infrastructure. From the initial focus of remote monitoring and management of servers and networks, the scope of an MSP’s services expanded to include mobile device management, managed security, remote firewall administration and security-as-a-service, and managed print services.
That sounds a bit counter-intuitive, doesn’t it? There have already been great strides made by architects, engineers, and other related construction professionals to adopt cloud-based software such as Autodesk BIM360. Whilst these tools bring huge benefits, it still seems that it’s the domain of large practices and corporates. Why is that?
Continuing our expose on Phishing, let’s take a look at this real example of a common scam where you’re asked to enter bank card details to re-schedule a missed delivery.
Everyone gets phishing emails. Unfortunately they’re everywhere. Most get filtered through to your junk folder or caught before they are even delivered, but some still get through. But what they are and how they work isn’t always clear. Here we’ll try to de-mystify an all too common and potentially dangerous nuisance.
Domains are everywhere and they’re a vital part of the internet, not to mention your online company identity. A key part of our service is Domain Management so, by and large, if you’re a client of ours you don’t need to worry too much about what it is or what it does. But having some background on what they are and how they work is always useful.
The Bee Network is a phone-based crypto currency application for your smart phone
You may have noticed when browsing online that some website addresses start with https:// whilst others start with http://. But have you ever wondered what that means in practice?
In short, the difference is quite simple: one is secure (https) and the other is not (http).
A strong password is essential for preventing others from gaining unauthorised access to your account or device. The stronger the password the more difficult it will be for a hacker to crack.
It can be hard to think of a password that you can remember when you need it, let alone multiple passwords and variations. What can make this is easier is using a methodology or naming convention for your passwords.
Protecting your sensitive data with a password seems like a good thing to do, right? So why would we say it is not a good idea? Because protecting the location is better than protecting the document.
Both applications do the job of video conferencing well, and they’re not the only ones (e.g. Google Meet, Starleaf, Webex). But what’s the real difference, and when should you use one over the other?
How to compare different computer processors. It is not as simple as looking at the clock speed. This article is a little technical but aims to demystify.
What is the future for GDPR in the UK once the country has completed its transition out of the EU by the end of 2020?
Visual representations make trends and differences easy to spot. Trying to make sense of the news during the Coronavirus crisis provides a powerful example of
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.