About Us

Computer services tailored for small and medium businesses

You're here: Skip Navigation LinksHome > Search


Page 1 of 1

Windows Mail is no more

If you're upgrading from Vista to Windows 7, and you presently use Windows Mail, you need to find another eMail application to use under Windows 7.  Pre-release versions of Windows 7 includ...

How to change your Internet Service Provider

How to change your Internet Service Provider At some point or other, you may find yourself needing to change your Internet Service Provider (ISP). The reasons may be many and include cost, perform...

Beware the SBS POP Connector

Microsoft provides in Small Business Server (both SBS 2003 and SBS 2008 versions) a POP Connector.  This enables the server to collect email from user POP mail accounts. The purpose of provid...

Privacy Statement

We are committed to respecting and protecting your privacy. The purpose of this privacy statement is to inform you about the type of information that we gather about you when you visit our Site, how w...


Post Office Protocol (POP) is one of the most common forms of internet email.  Emails are received by a mail server on the internet and are stored until the user logs on and downloads them to t...

Moving from Blackberry to Android

For Blackberry fans, finding something that works well enough to replace it can be difficult.  Key functions that it is good at are: email handling (Notification) Profiles Notification ...


Sender Policy Framework (SPF) is an e-mail validation system designed to prevent e-mail spam by addressing a common vulnerability, source address spoofing.  Domain Name Service (DNS) records fo...

Problem connecting smartphone to Active Sync

Many smartphones support Active Sync connection to Microsoft Exchange mail servers, including iPhones, Android and Windows Mobile models.Usually the process of creating a smartphone account for Exch...

And more hacked Cloud systems

Another month, another round of breaches to online systems.  IMF, Citigroup, Codemasters, Sony again - all have reported significant breaches of security resulting in unauthorised access to data....


A Firewall is a means of controlling network access to a system.  This is usually in the context of preventing intrusion from the internet to a private system.  Firewalls may be in the for...


Internet Message Access Profile is an internet email system.  In IMAP, email messages are stored on a server as well as locally.  The usual method of use is to work online with the server ...


What is RSS? In a world heaving under the weight of billions of web pages, keeping up to date with the information you want can be a drag. Wouldn't it be better to have the latest news and features de...

Customer Projects - Typical Tasks

Customer Projects - some typical tasks A selection of typical tasks undertaken for customers Management and IT Consultancy Deal with ineffective support provider on behalf of customer Re...