Archive for the ‘Networking’ Category

Get Connected – Guide to Home Broadband

Sunday, April 20th, 2014

These days I think you would be hard pushed to find a home with a computer or mobile device and no Internet access.Router

We find when talking to people about to buy a new computer, when we ask what they want to use it for ‘Surfing the Web’ is normally one of the first things they say.

But does all that technical jargon about speeds and uploads confuse you? Do you know what you’re signing up for (or what you’ve already got!) and how do you know you are getting what you signed up for? Here’s a few hints and tips which might help.

Different types of connection

There are many different forms of connection but the most common ones for households are:

FibreFibre – supplied by companies like Virgin, Fibre Optic broadband offers one of the fastest service for domestic customers. It is independent of your telephone line and requires a dedicated fibre optic cable to be run to your home. This is often bundled with Cable television services. Whether you can get this service depends on whether any Cable companies have installed a cable network in your street.

Fibre to the Cabinet– services such as BT’s Infinity service operate over Fibre Optic cables to your street corner cabinet but then use your copper telephone wire for the last part of the journey. Although this requires an engineer visit to set up, there should be no need for any cabling work to your home. Speeds will vary depending on how far away you are from your street corner BT box as the signal degrades over the copper line the further it has to travel.

ADSL – This connection runs over copper wires from the Exchange, to the street box and then on to your home. This connection does not require an engineer visit to install, your provider will send you a router, which is generally pre-configured, and the service is ‘switched on’ remotely by your service provider. The speeds you get will depend on your distance from the Exchange.

Mobile – You can get a connection to the Internet by using either a compatible mobile phone or by purchasing a USB dongle Mobiles with connection to broadbandwhich connects using mobile signals. The price for this service is either included in your mobile phone contract by way of a Data tariff or with a USB dongle on a pay as you go scheme based up a certain amount of data usage. These services are great if you do not want, or cannot get, a fixed line service to your home or if you travel a lot but they do require a good mobile phone signal to work and speeds will not be as great as a fixed line service. Also ensure that your tariff will allow for the amount of data you will be using so as not to get large, unexpected bills!


The speeds you get will vary depending on your type of connection and your location. You have 2 speeds to consider – Upload speedwill generally be slower. That is the speed you will get when uploading data to the Internet such as sending emails or uploading photographs to social media sites or using a remote backup or file storage service like DropBox.

DownloadingDownload speed is the faster speed and this applies to browsing the Internet, receiving emails and downloading files, movies or music.

Speed is generally calculated in Mb/s or Megabits per second. Basically, the higher your Mb/s the faster your connection.

This should not be confused with MB – MegaBytes. This relates to file sizes, but can also be important as some providers will have a limit to the amount of data that can be downloaded.

Checking your connection

The best way to check your connection is to use an online speed test tool. This can normally be found on your provider’s website or by doing an Internet search for Speed Test. These tests should be run on a computer that is connected to your router by a cable rather than wirelessly, as this can affect the reports. You should also check that no-one else in the household is connected to the Internet and downloading or uploading anything as this will also affect the results. The tests will run through and then tell you what your upload and download speeds are. You should run these a few times to get an average result. If the speeds reported are significantly different to the speeds your provider says you should be getting then do speak to them about it. It could be that there is a fault on your line or with the connection, which they can repair to improve things.

So you think you’re a careful Internet user?

Thursday, April 10th, 2014

Photo of girl on phoneThese days it’s hard for us to avoid doing certain tasks online. Even if you prefer to receive you bills and statements manually, buy items in person on the High Street and don’t use Social Media, many of us will use a computer to browse the Internet and use Email.

So how much of the data we enter on our computers, or even fill out in coupons, can find its way into the Public domain? The answer is, more than you probably think!

Let’s think about an average day for our Virtual user, let’s call her Stacey. Stacey gets up in the morning and the first thing she does is check her Facebook page and respond to a friend’s photo taken last night. Most Social network sites will register your GPS co-ordinates when you post or even take a photo on your mobile phone, so that gives a pretty accurate idea of where Stacey’s friend was last night and where Stacey is this morning. As she always checks her Facebook page when she wakes up, that builds up a regular location and so without knowing Stacey’s address, we could assume that she lives at that location as she adds a post from there first thing most mornings.

Stacey makes her way to work. On the bus, she checks her personal emails. There’s an email in from a shop she goes to regularly. She has a loyalty card with them (which means they will know what products she purchases and when) and they are offering a chance to win a product she really likes. She enters the competition on line, giving her address and date of birth. She doesn’t check the box to deny access to this information from 3rd parties, so she’s probably now going to receive lots of other related offers either through the post or via email.

She gets to work and logs on to her computer and starts work. It’s a busy morning and the time flies by! At lunchtime she needs to check details of an order she placed recently with a mail order company. She tries to log in emailbut can’t remember her password, so gets a reminder sent to her personal, free email account. To do that, she has to enter her secret questions – date of birth and Mothers Maiden name. That’s right, it was her usual password. Uh, oh! One password for everything? Plus using 2 pieces of information that are commonly used to prove identity for Banking?

OK, so we would like to think that all companies treat their customers data as top secret , and the majority do, but we hear of cases where information does get in to the wrong hands occasionally. Try not to use the same password all the time, or have something that is too personal (date of birth, name of your house, favourite team) and don’t be afraid to lie if asked for the information and it’s not for a genuine identification purpose like a Bank, Inland Revenue or DVLA where it will be used to cross reference with other databases.

Stacey notices that in her email web portal she is seeing adverts relating to blue prom dresses. That’s strange, she was only looking at those last night on the web! It’s not a coincidence. Most free services such as Gmail and Yahoo are free because the companies are getting paid by the advertisers, and not just for space. Although personal identification details don’t get sold, they will pass on details of searches you carry out, phrases or words mentioned in your emails and websites you visit. This allows them to tailor the adverts you see to things supposedly relevant to you.

Lunch hour over, it’s back to work. Stacey takes the opportunity to update her Linked In page with some updated employment and education details and updates her contact information with her new mobile number. Although Linked In is a business networking site, it’s still posting personal information that’s available for all to see. Plus, there’s a lovely photo on there that she’s really proud of. Looks very professional (and now everyone can put a face to the name, email address and phone number!)

drinksAfter work, Stacey is catching up with some friends for a drink. They keep in touch via Social media about where they will meet and what time.

During the evening they all post comments and photos on Social media. Again, it’s advertising where they are and what they are doing. Looks like it’s going to be a long night… wonder if there’s anyone else at home??

So, should we pull down the shutters, bolt the doors and never venture into the virtual world again? Is it all full of crooks and villains just waiting to grab the first bit of information we put in the public domain? In reality, no, but it’s wise to be careful and think about what you are posting and where.

For example, taking a nice photo of your house and secluded back garden and posting on Facebook, at the same time as mentioning your up and coming 2 week family holiday, is not to be recommended!

As mentioned before, try to avoid using personal details where they are not required for proper identification purposes and read the small print carefully when filling out forms, both online and on paper (as they will just get entered onto a computer somewhere too eventually!)

Finally, check the privacy settings on your social media accounts to make sure that details are only shown to those you want to see them rather than being open to all.


What is Cloud Computing?

Thursday, April 3rd, 2014

Cloud – it’s been a big buzz word in the computing world for a few years now. But what does it mean and do you need it?

CloudBasically, Cloud Computing is where you use software, services or storage through your PC, laptop, tablet or mobile device and that software or storage is not local to your device or network but accessed via the Internet.

Many people have probably been using this for some time without even realising it! If you access you email through a web site rather than downloading it with an application like Outlook then that can be classed as Cloud Computing. If you use DropBox, GoogleApps, Facebook, Twitter – they are all effectively Cloud services or solutions because you are storing or accessing your information via a server and network somewhere else in the World.

As time goes on, more and more applications and solutions are turning to the Cloud to offer customers greater functionality, storage and applications with the customer having to invest in expensive hardware or software locally. As long as you have an Internet connection then you can generally access these services and files.

Cloud services logosIs it safe? You need to treat Cloud Computing and the Internet with care. At the end of the day, if you are using a cloud-based back up service or storing your data in GoogleApps, DropBox or some other similar online service then that storage space is out of your control.

Reputable companies will do all they can to maintain clients privacy and security. Many of them have larger, expensive corporate services as well as the cheaper or free consumer offerings and the last thing they would want to do is jeopardise those relationships with a security scare. However, users need to take steps to secure their data and protect themselves too.

Be aware that many free services offer no guarantee of uptime or protection of your data from deletion or corruption. In other words, don’t rely on a free service as the only means of storage of vital or precious documents or photos.

Make sure your online accounts are secure with strong passwords and usernames and that you change these regularly. Don’t use the same user name and password for everything!

Finally, make sure you read the terms and conditions before signing up to an online service to see if there are any restrictions on what you can upload or use the service for, the amount of storage you will get or the bandwidth you will have for access and if the company retains any rights to ‘interrogate’ or view your data.

Is your network secure?

Tuesday, November 2nd, 2010

Google has recently been accused of gathering personal information gained from their Street View cars whilst gathering WiFi hotspot information for the software. This information was only gained via unsecured and open networks which could have been accessed by anyone with a limited amount of IT knowledge. So how can you be sure that your network is safe and secure?

You should ensure that your wireless network is secured using the latest technology available on your device such as a WPA or WPA2 key. This is a strong form of encryption which prevents people without the key accessing the network.

You can hide your wireless network from being discovered by other wireless devices, although this is easily circumvented and can cause problems if you regularly connect different devices. If you don’t want to hide your network then give it an obscure name that does not relate it to you or your property. Older security technologies such as mac addressing and WEP are more easily cracked and should be avoided.

On most modern routers the wireless security key is printed on a sticker on the router along with the SSID or network name. It is a good idea to log into your router and change the default information such as the administration password, SSID and key so that they cannot be known by anyone but you. Just remember to keep a note of them for future reference!

When you are out and about with your laptop and do not want to use wireless or Bluetooth, turn off these services. This will prevent people finding and connecting to your machine. There should be a switch somewhere on the laptop for these services or possibly one of the Function keys on the numbers at the top of the keyboard.

When connecting to unsecured networks such as hotspots make sure your anti-virus and firewall protection is enabled and up to date to prevent unwanted access. Also, avoid sharing drives on your computer. Although this may be convenient when you are at home, if you are out and about and connected to Public networks your data could be available to everyone!

Finally, if you need any help setting up or securing your network please contact us on 01628 819515 or email