Dragonrider Computing (image © original artist)

Dragonrider Computing


Follow me

Share Buttons

Search Engines

To make things easier to submit a site to the various Search Engines, we recommend AceBit's Hello Engines currently in version 10 for under £100 and this version will allow submission of up to ten different websites (Free version allows submission for two websites).

Also available is the professional version of Hello Engines, called AESOPS 10 which currently costs approximately €350/£280 for an unlimited number of web sites.


Remote Assistance

If you are after Remote Assistance and we have agreed to this, we will probably connect via Teamviewer to your desktop. Please download this Quick Connect program in readiness. We will require the ID and password once this is run.

If we require FTP access, please arrange for us to receive temporary FTP access to your server and let us know the details, URL, username and password. Thank you.

If we are de-bugging something like Joomla or phpList please ensure we have the access details, url, username and password.

danger iconRE: Voice message from 077######90 pretending to come from tel: 077######90 <non-mail-user {AT} voiplicity.co.uk>;with  a zip attachment is another one from the current bot runs which try to download various Trojans and password stealers especially banking credential stealers, which may include cridex, dridex, dyreza and various  Zbots, cryptolocker, ransomware and loads of other malware on your computer.

Further details of this infected WAV attachment can...

danger iconLatest fake infected eMail comes with a subject of Invoice: with a random set of characters and in my case the content was "Hi,Please find attached a recharge invoice for your broadband. Many Thanks.Random Name" All one line and no punctuation as shown.

It's yet another infection that is tryingto get you to open the Doc attachment which according to MXLab.eu is a 49kB attached file is named veizaioj_87B9A16BB5.doc (characters will vary) is a malicious Word file with embedded macro that will...

danger iconSecond of two infected email warnings recieved today.

This one basically warns you to that payment is overdue.

Financial department report that You failed to file statements copies of month are attached below.
Please be noticed that from Thursday fine amounts are going to be imposed.
Please consider this e-mail as rather crucial so do not distribute to call our colleagues.
Sarah Lewis

The appalling grammar is a bit of a giveaway. The attached files, if you were to download them would run a file...

danger iconFirst of two infected email warnings recieved today.

This one basically asks you to resubmit an invoice for payment, or should that be infoice?

Kindly advise You that fee schedules received yesterday include two defects in amounts.
Please mail corrected infoices according to the enclosed files.
Our company will pay new invoices in four days.
Rebecca Smith

The attached files, if you were to download them would run a file that would at the least infect your computer, at worst, would send your...

danger iconThe dreaded, and dreadful, Nigerian 419 Scams are still dropping into our inboxes from time to time. I don't know if the scammers think our attention span is so poor we'll forget about them if they stop sending them for a while or not?

These scams attempt to con the reader into sending their bank details off to total strangers who pretend to offer you the chance to "help them out" by transferring funds from some bank account wherever it may be, into yours to basically launder it, then transfer...

danger iconYour latest invoice from The Fuelcard Company UK Ltd pretending to come from This email address is being protected from spambots. You need JavaScript enabled to view it. with a malicious word doc or Excel XLS spreadsheet attachment  is another one from the current bot runs which try to download various Trojans and password stealers especially banking credential stealers. They are using email addresses and subjects that will entice a user to read the email and open the attachment.

The contents of the spoof email are similar to the following:

Please find your...

danger iconA second round of infected emails hitting my inbox today! This time the Subject starts with "Statement from" and follows with a random firm's name. This evening I've received infected emails from a couple of random firms, whose names are all in Capitals so a bit of a giveaway there.

The content is pretty similar and punctuation is pretty appaling. Of course this email is NOT sent by the firms mentioned but the firm's email address is spoofed and their accounts have not been hacked...

danger iconWell, today's infected email is a strange one! The sender is me, alledgedly, having been supposedly sent from Administrator [AT] dragonrider.co.uk (there's no such email address existing by the way). The Subject is Administrator - Exchange Email id####### where the Administrator is taken from the sender's email prefix and the id is made up of 7 random characters which also makes up the infected attachment's filename.

Looking closer at the send path brings up the a more likely suspect email...

danger iconToday's round of infected emails have a Subject of either Significant or Essenital notification followed by a random 6 digit number and the content varies but is basically either:

Good morningGood Afternoon,We have attained a payment from you for the sum of £ 1265. Please would you provide me with a remittance, in order for me to conform the statement.I will be  handing on you a statement of outstanding invoices tomorrow, the whole amount of outstanding is £ 4434 less the 1 draft received...

danger iconToday's infected email has the Subject of Important information and the subject is just

Good morning

Please find attached a remittance advice, relating to a payment made to you.

Many thanks


Zachariah Burgess

Seniour Finance Assistant

Shame the guy can't spell Senior, might just have been a valid email if he could spell (NOT!)

The infected ZIP file has a file name starting with your email prefix plus"_" then random characters and ends with the filetype of .doc which is probably...