Take over your phone from your PC – FREE Software !

I have just come across this awesome piece of software which I must share with you. This is a FREE utility that you install on your pc which allows you […]

Read more

The biggest hacking threat – the internal user

before you get all worked up  – let me explain… When a hacker is looking to penetrate a network, they look for the obvious open doors (in geek talk – […]

Read more

Yet another hacked bank account

This was reported in the Cape Argus on July 5th – The short version: a business man used an internet cafe to log onto his Standard Bank online banking. This […]

Read more

The Trojans are coming !

Well it’s time to chat about those Trojans – FYI – for those who don’t know what Trojans are (frankly that is scary all by itself): Trojans are small programs […]

Read more

Superb – Can’t Steal what you can’t see !

Now this is the level that we as South African have had to come down to in order to protect ourselves. The device is a Fog Generator. WHEN someone breaks […]

Read more

Catch 22 – IT Dept. has access to Confidential info

So here is the story – you have a company that relies heavily on their IT infrastructure. The company keeps all their info in some electronic form. The company uses […]

Read more

Outlook 2007: Have Replies Sent To

Here is another usefull tip when using Outlook 2007 – Have Replies Sent To When we send an Email, there are times when we would like the reply of that […]

Read more

Tell me what you from your cell phone

Itweb has a very intressting article quoting a research conducted in South Africa about what cell phone users want from their cell phone. “compared a set of 13 attributes among […]

Read more
1 190 191 192 193 194 201