Dragonrider Computing (image © original artist)

Dragonrider Computing


Follow me

Share Buttons

Search Engines

To make things easier to submit a site to the various Search Engines, we recommend AceBit's Hello Engines currently in version 10 for under £100 and this version will allow submission of up to ten different websites (Free version allows submission for two websites).

Also available is the professional version of Hello Engines, called AESOPS 10 which currently costs approximately €350/£280 for an unlimited number of web sites.


Remote Assistance

If you are after Remote Assistance and we have agreed to this, we will probably connect via Teamviewer to your desktop. Please download this Quick Connect program in readiness. We will require the ID and password once this is run.

If we require FTP access, please arrange for us to receive temporary FTP access to your server and let us know the details, URL, username and password. Thank you.

If we are de-bugging something like Joomla or phpList please ensure we have the access details, url, username and password.

danger iconYet another round of infected spam emails arriving today, this time they have a Subject of CITY OF Port Arthur - STORM SEWER Project and come from various spoofed email address. The contents seem to be the same regardless of the apparent sender's address:

Please see attachment for contract.  Please sign and return.
Fred Stepp - Office Manager
McInnis Construction, Inc.,
675 South 4th Street
Silsbee, Texas 77656
email: This email address is being protected from spambots. You need JavaScript enabled to view it.
Phone: 409-385-5767

danger iconToday's round of infected emails have a Subject of "Levy adjustment notice", have an approx size of 31Kb and a ZIP attachment of 8 random characters as it's name.

The email has the contents of:

Be warned that VAT alters from Monday.
See the file enclosed.
Note that tax amounts to be paid to the tax authorities have to be reestimated.

Jane Nelson
Chief accountant

As always, never open such an attachment as they usually have a exe file embedded that will automatically run once opened and will...

danger iconLatest batch of infected emails received today have a subject of Check your requisite and have a size of approx 31Kb with the content being

Good morning
Could You please check your requisite details under the contract #5yyx0U

Where the characters after the hash (#) are random but match the file name of the attached, and infected, zip file which in fact will contain an auto running exe file. If you open it, you'll infect your computer to send out even more of this infected rubbish. The four...

danger iconYet another batch of fake and infected emails turning up today, this time the subject is "Hello" followed by a random set of character or name, which also matches the first part of the from address. EG: "Hello e9997e7" with the From appearing to be "Sale (e9997e7@ some domain).

The contents of the fake email are:

Please find downloaded notification of your BACS payment from Essex County Council.

If you require further information please refer to the contact details in the attached document....

danger iconToday's infected email has a subject of Invoice for car # followed by a random 8 digit number from random email addresses, and are apparently bills for car repairs from a German garage and of course there is a attached zip file which if opened will try to infect your computer, so as to send out more of these infected emails to your address book, probably attempt to steal your bank details etc etc.

Obviously, you should never open such emails and never ever click on any link within, not open...

danger iconJust had 4 infected emails from HSBC, or rather, some one pretending to be from HSBC but in fact these are another Nigerian Scam and attempt to infect my computer.

The Subject for these emails is Payment Advice - Advice Ref:[GB775470] / CHAPS credits though each Reference varies on eaqch email.

The sending email address seems to be hsbci.co.uk which is registered in Nigeria and requests that you download a payment advice from their server which varies from ajewishgift.com, ...

danger iconLatest infected eMail to drop on my inboxes doormat is alledgedly from L.A.B. Investments stating that a claim has been issued against me and passed to HM Courts with a reference number in Square Brackets.

It's a fake and carries an infected payload like all the other recent infected emails. In fact the sending domain is I believe amnetdatos.net and includes a .doc file extension attachment, which no doubt uses a Word Macro to infect your computer and steal your details, including your bank...

danger iconYet another batch of infected emails hitting our inboxes currently. These have a subject of Unpaid Invoice [*****] attached, where the stars are a random set of numbers, and the attachment is named something along the lines of "YZ80679ACMG.zip".

This contains yet another infected exe file which will run as soon as you open the zip file, infecting your computer with its malicious payload.

You can tell if these are fakes as they do seem to be coming from a polish domain: kielce.net.pl

Do not...

danger iconI've just receive an email supposedly sent by VistaPrint at 12.15 today, it wasn't, it's an infected malware laden attempt to con people into opening the payload in the attachment.

I spoke to Vistaprint and they are now becoming aware of the issue. It is fake and Vistaprint are looking into it.

It seems genuine at first as it was sent to the same email address as I do use for Vistaprint but the subject refers to an invalid invoice number and according to Steve at Sane Security there is a...

danger iconYet another infected Spam email doing the rounds, first time I've received one with this subject.

It comes claiming to be from Aspiring Solicitors representing National Westmenister Bank demanding payment for GBP 2,345 (pounds). As an incentive to pay you are informed that an additional GBP 995 (pounds) will be added once proceedings have been issued. The mis-spelt name of a bank is used 4 times. All pointing to the fact that this is of course a FAKE email, a badly faked one at that.