2020 What To Expect In Tech – WiFi

As this century leaves the teenage years behind and enters adulthood, we thought we’d take a peek ahead and see what we might expect from the tech world this year. WiFi 6 – the latest WiFi standard (officially 802.11ax), has actually been around for more than a year and has only recently been ratified in…

OPQ Data Centres

OPQ are pleased to offer services in our primary data centre situated in Gaborone International Commerce Park and disaster recovery facilities at our secondary site in Old Industrial, Gaborone. More and more companies are using data centre facilities to host either their own server hardware or to use Virtual Machines (VMs) hosted on OPQ’s servers.…

SPAM – Part 4

How To Be Proactive Against SPAM In this, the final part of the series, we are going to look at ways to fight back, develop good habits and gain better control of our inboxes. Never Respond To SPAM If  you’re certain an email is spam before you open it, don’t open it. If you open…

SPAM – Part 3

Continuing with this series we are going to look at: how we can spot SPAM and tell the difference from legitimate email adjust our emailing habits to protect our email identities Things have moved on significantly since those early days back in 1990. Email remains the killer messaging app in terms of sheer volume of…

Shared Internet Explained

Contention Ratios. A shared Internet package usually means a pool of bandwidth has been reserved for the use of x subscribers. Think of a cake – a cake that is 4 Megabits (4Mb). This cake is to be shared with 8 cake eaters (subscribers). Thus we can describe this as a contention ratio of 8:1. The…

SPAM – Part 2

In SPAM – Part 1, we covered the broad strokes of spamming as it relates to unwanted mail coming into your mailbox. In this, Part 2 of the series, we’ll look at the more insidious side of SPAM; using your own (compromised) email account, bandwidth and ISPs services to send  SPAM for or by the spammers.…

SPAM – Part 1

SPAM – Variously described as the scourge of the Internet, the bane of every legitimate ISP and the curse of every email user, how did this can of processed pork and ham become so maligned? In this first part of the SPAM story, we’ll cover the basics of how it all started and the ‘wherefores’ and…

VPNs – Why Should You Use Them

Virtual Private Networks are affordable, easy to use, and a vital component in your PC and smartphone set up. Along with a firewall and antivirus/anti-malware solution, you should have a VPN installed to keep every moment you spend online completely private. External links to more information: 10 Reasons You Should be Using a VPN 5 Free…

What’s Wrong With Your Pa$$word?

Lorrie Faith Cranor studied thousands of real passwords to figure out the surprising, very common mistakes that users — and secured sites — make to compromise security. And how, you may ask, did she study thousands of real passwords without compromising the security of any users? That’s a story in itself. It’s secret data worth…