Dragonrider Computing (image © original artist)

Dragonrider Computing

Follow me

Share Buttons

Crucial Memory

Crucial Memory Cards

Search Engines

To make things easier to submit a site to the various Search Engines, we recommend AceBit's Hello Engines currently in version 10 for under £100 and this version will allow submission of up to ten different websites (Free version allows submission for two websites).

Also available is the professional version of Hello Engines, called AESOPS 10 which currently costs approximately €350/£280 for an unlimited number of web sites.


Remote Assistance

If you are after Remote Assistance and we have agreed to this, we will probably connect via Teamviewer to your desktop. Please download this Quick Connect program in readiness. We will require the ID and password once this is run.

If we require FTP access, please arrange for us to receive temporary FTP access to your server and let us know the details, URL, username and password. Thank you.

If we are de-bugging something like Joomla or phpList please ensure we have the access details, url, username and password.

danger iconToday's round of infected emails have a Subject of either Significant or Essenital notification followed by a random 6 digit number and the content varies but is basically either:

Good morningGood Afternoon,We have attained a payment from you for the sum of £ 1265. Please would you provide me with a remittance, in order for me to conform the statement.I will be  handing on you a statement of outstanding invoices tomorrow, the whole amount of outstanding is £ 4434 less the 1 draft received...

danger iconToday's infected email has the Subject of Important information and the subject is just

Good morning

Please find attached a remittance advice, relating to a payment made to you.

Many thanks


Zachariah Burgess

Seniour Finance Assistant

Shame the guy can't spell Senior, might just have been a valid email if he could spell (NOT!)

The infected ZIP file has a file name starting with your email prefix plus"_" then random characters and ends with the filetype of .doc which is probably...

danger iconYet another round of infected spam emails arriving today, this time they have a Subject of CITY OF Port Arthur - STORM SEWER Project and come from various spoofed email address. The contents seem to be the same regardless of the apparent sender's address:

Please see attachment for contract.  Please sign and return.
Fred Stepp - Office Manager
McInnis Construction, Inc.,
675 South 4th Street
Silsbee, Texas 77656
email: This email address is being protected from spambots. You need JavaScript enabled to view it.
Phone: 409-385-5767

danger iconToday's round of infected emails have a Subject of "Levy adjustment notice", have an approx size of 31Kb and a ZIP attachment of 8 random characters as it's name.

The email has the contents of:

Be warned that VAT alters from Monday.
See the file enclosed.
Note that tax amounts to be paid to the tax authorities have to be reestimated.

Jane Nelson
Chief accountant

As always, never open such an attachment as they usually have a exe file embedded that will automatically run once opened and will...

danger iconLatest batch of infected emails received today have a subject of Check your requisite and have a size of approx 31Kb with the content being

Good morning
Could You please check your requisite details under the contract #5yyx0U

Where the characters after the hash (#) are random but match the file name of the attached, and infected, zip file which in fact will contain an auto running exe file. If you open it, you'll infect your computer to send out even more of this infected rubbish. The four...

danger iconYet another batch of fake and infected emails turning up today, this time the subject is "Hello" followed by a random set of character or name, which also matches the first part of the from address. EG: "Hello e9997e7" with the From appearing to be "Sale (e9997e7@ some domain).

The contents of the fake email are:

Please find downloaded notification of your BACS payment from Essex County Council.

If you require further information please refer to the contact details in the attached document....

danger iconToday's infected email has a subject of Invoice for car # followed by a random 8 digit number from random email addresses, and are apparently bills for car repairs from a German garage and of course there is a attached zip file which if opened will try to infect your computer, so as to send out more of these infected emails to your address book, probably attempt to steal your bank details etc etc.

Obviously, you should never open such emails and never ever click on any link within, not open...

danger iconJust had 4 infected emails from HSBC, or rather, some one pretending to be from HSBC but in fact these are another Nigerian Scam and attempt to infect my computer.

The Subject for these emails is Payment Advice - Advice Ref:[GB775470] / CHAPS credits though each Reference varies on eaqch email.

The sending email address seems to be hsbci.co.uk which is registered in Nigeria and requests that you download a payment advice from their server which varies from ajewishgift.com, ...

danger iconLatest infected eMail to drop on my inboxes doormat is alledgedly from L.A.B. Investments stating that a claim has been issued against me and passed to HM Courts with a reference number in Square Brackets.

It's a fake and carries an infected payload like all the other recent infected emails. In fact the sending domain is I believe amnetdatos.net and includes a .doc file extension attachment, which no doubt uses a Word Macro to infect your computer and steal your details, including your bank...

danger iconYet another batch of infected emails hitting our inboxes currently. These have a subject of Unpaid Invoice [*****] attached, where the stars are a random set of numbers, and the attachment is named something along the lines of "YZ80679ACMG.zip".

This contains yet another infected exe file which will run as soon as you open the zip file, infecting your computer with its malicious payload.

You can tell if these are fakes as they do seem to be coming from a polish domain: kielce.net.pl

Do not...