Dragonrider Computing (image © original artist)

Dragonrider Computing

Follow me

Share Buttons

Crucial Memory

Crucial Memory Cards

Search Engines

To make things easier to submit a site to the various Search Engines, we recommend AceBit's Hello Engines currently in version 10 for under £100 and this version will allow submission of up to ten different websites (Free version allows submission for two websites).

Also available is the professional version of Hello Engines, called AESOPS 10 which currently costs approximately €350/£280 for an unlimited number of web sites.

 

Remote Assistance

If you are after Remote Assistance and we have agreed to this, we will probably connect via Teamviewer to your desktop. Please download this Quick Connect program in readiness. We will require the ID and password once this is run.

If we require FTP access, please arrange for us to receive temporary FTP access to your server and let us know the details, URL, username and password. Thank you.

If we are de-bugging something like Joomla or phpList please ensure we have the access details, url, username and password.

Warning! Fake infected email Latest infected fake email this week is alledgedly from Xero Billing and refers to a subscription invoice although there is no mention of the amount billed in the email.

This will no doubt be on the infected file that the scammers are trying to you to download to infect your machine. The email seems to be sent from open-e-mail {DOT} com and as seems to be the norm uses a sharepoint {DOT} com url, in this case sharepoint.com/personal/enna_lugo_stisd_###/_layouts (partial url).

As always NEVER click on such a link in an email like this, the whole idea of sending this rubbish out is to con people into infecting their own computers in an effort to send this sort of thing out to everyone in your address book, or worse still, encrypt your files that requires you to pay the hackers/criminals money to maybe, give you an unlock code! Much better to invest a little time and money in making secure backups of your computer regularly and if infected, reformat your hard drive, reinstall your OS and restore your computer from the backup.