Dragonrider Computing (image © original artist)

Dragonrider Computing

Accessibility

Follow me

Share Buttons

Search Engines

To make things easier to submit a site to the various Search Engines, we recommend AceBit's Hello Engines currently in version 10 for under £100 and this version will allow submission of up to ten different websites (Free version allows submission for two websites).

Also available is the professional version of Hello Engines, called AESOPS 10 which currently costs approximately €350/£280 for an unlimited number of web sites.

 

Remote Assistance

If you are after Remote Assistance and we have agreed to this, we will probably connect via Teamviewer to your desktop. Please download this Quick Connect program in readiness. We will require the ID and password once this is run.

If we require FTP access, please arrange for us to receive temporary FTP access to your server and let us know the details, URL, username and password. Thank you.

If we are de-bugging something like Joomla or phpList please ensure we have the access details, url, username and password.

danger iconLatest batch of infected emails received today have a subject of Check your requisite and have a size of approx 31Kb with the content being

Good morning
Could You please check your requisite details under the contract #5yyx0U

Where the characters after the hash (#) are random but match the file name of the attached, and infected, zip file which in fact will contain an auto running exe file. If you open it, you'll infect your computer to send out even more of this infected rubbish. The four...


danger iconYet another batch of fake and infected emails turning up today, this time the subject is "Hello" followed by a random set of character or name, which also matches the first part of the from address. EG: "Hello e9997e7" with the From appearing to be "Sale (e9997e7@ some domain).

The contents of the fake email are:

Please find downloaded notification of your BACS payment from Essex County Council.

If you require further information please refer to the contact details in the attached document....


danger iconToday's infected email has a subject of Invoice for car # followed by a random 8 digit number from random email addresses, and are apparently bills for car repairs from a German garage and of course there is a attached zip file which if opened will try to infect your computer, so as to send out more of these infected emails to your address book, probably attempt to steal your bank details etc etc.

Obviously, you should never open such emails and never ever click on any link within, not open...


danger iconJust had 4 infected emails from HSBC, or rather, some one pretending to be from HSBC but in fact these are another Nigerian Scam and attempt to infect my computer.

The Subject for these emails is Payment Advice - Advice Ref:[GB775470] / CHAPS credits though each Reference varies on eaqch email.

The sending email address seems to be hsbci.co.uk which is registered in Nigeria and requests that you download a payment advice from their server which varies from ajewishgift.com, ...


danger iconLatest infected eMail to drop on my inboxes doormat is alledgedly from L.A.B. Investments stating that a claim has been issued against me and passed to HM Courts with a reference number in Square Brackets.

It's a fake and carries an infected payload like all the other recent infected emails. In fact the sending domain is I believe amnetdatos.net and includes a .doc file extension attachment, which no doubt uses a Word Macro to infect your computer and steal your details, including your bank...


danger iconYet another batch of infected emails hitting our inboxes currently. These have a subject of Unpaid Invoice [*****] attached, where the stars are a random set of numbers, and the attachment is named something along the lines of "YZ80679ACMG.zip".

This contains yet another infected exe file which will run as soon as you open the zip file, infecting your computer with its malicious payload.

You can tell if these are fakes as they do seem to be coming from a polish domain: kielce.net.pl

Do not...


danger iconI've just receive an email supposedly sent by VistaPrint at 12.15 today, it wasn't, it's an infected malware laden attempt to con people into opening the payload in the attachment.

I spoke to Vistaprint and they are now becoming aware of the issue. It is fake and Vistaprint are looking into it.

It seems genuine at first as it was sent to the same email address as I do use for Vistaprint but the subject refers to an invalid invoice number and according to Steve at Sane Security there is a...


danger iconYet another infected Spam email doing the rounds, first time I've received one with this subject.

It comes claiming to be from Aspiring Solicitors representing National Westmenister Bank demanding payment for GBP 2,345 (pounds). As an incentive to pay you are informed that an additional GBP 995 (pounds) will be added once proceedings have been issued. The mis-spelt name of a bank is used 4 times. All pointing to the fact that this is of course a FAKE email, a badly faked one at that.

The...


danger iconHad another spoof or infected email today, this time alledgedly from barclaycard. This one advising me that my credit limit has been incresed and asking me to download the document attached to confirm the increase.

Hidden in the email header is the fact that the email was routed via ua-hosting.com.ua which suggests that this is one of the many Ukranian Spoof sites, another major giveaway that this email is not from barclaycard is that I'm not, nor have I ever been a Barclaycard user.

Be...


danger iconYet another infected email on the rounds arrived today. It's very obvious to me that this is a spoof email with malicious intent as (a) I'm not a customer of NatWest and (b) it's addressed to "Good Afternoon". The email than goes on to request I open an "attached content" regarding my account incident". The subject starts off "RE:Incident..."

The email is supposed sent from Sherman.Cameron AT bankline.natwest.com but in actual fact this is a spoofed address and comes from scitpo [AT]...