18.3 C
London
Tuesday, August 22, 2017

Windows 8 picture passwords: Their great untapped potential

Love it or hate it, Windows 8 is the bellwether for PCs. Where Microsoft goes, PCs follow.And now Microsoft is making a grab for...

How to set up Link Aggregation on Synology NAS

Overview Link aggregation is a method of using two Ethernet ports in parallel to provide trunking and network fault tolerance. Link aggregation with trunking feature...

How to remove GOZ and CryptoLocker Malware – TrendMicro

GOZ and CryptoLocker are two of the most notorious malware that we have seen as of late. CryptoLocker is a ransomware that not only locks the system it affects, but also encrypts certain files found in the system's hard drive. This may be a tactic to ensure that the victim pays the ransom, as there is no other way to decrypt the files but with a key that the cybercriminals responsible can only provide.

Ubiquiti EdgeMAX – How to set QoS parameters for VoIP applications

These instructions assume: •eth0 is your connection to the internet. •eth1 is your local area network. •Downstream bandwidth is 5000kbit. •Upstream bandwidth is 1000kbit. •You want to guaranty 25%...

Backing up your Cloud Data?

I have been using gmail, picasa and many other cloud based services for a number of years. They have some excellent benefits such as being...

Troubleshooting IOS (Apple iPhone / iPad / iTunes / iCloud)

If you are having issues with an iPhone or iPad with IOS, here are some tips that might help solve the problem or at...

Windows 7 Networking – Quality of Service (QOS)

Managing Network Traffic Windows 7 and Vista support two different forms of QOS. Policy-based QOS prioritizes and throttles network traffic based on static parameters set...