OPQ Data Centres

OPQ are pleased to offer services in our primary data centre situated in Gaborone International Commerce Park and disaster recovery facilities at our secondary site in Old Industrial, Gaborone. More and more companies are using data centre facilities to host either their own server hardware or to use Virtual Machines (VMs) hosted on OPQ’s servers.…

SPAM – Part 4

How To Be Proactive Against SPAM In this, the final part of the series, we are going to look at ways to fight back, develop good habits and gain better control of our inboxes. Never Respond To SPAM If  you’re certain an email is spam before you open it, don’t open it. If you open…

SPAM – Part 3

Continuing with this series we are going to look at: how we can spot SPAM and tell the difference from legitimate email adjust our emailing habits to protect our email identities Things have moved on significantly since those early days back in 1990. Email remains the killer messaging app in terms of sheer volume of…

Shared Internet Explained

Contention Ratios. A shared Internet package usually means a pool of bandwidth has been reserved for the use of x subscribers. Think of a cake – a cake that is 4 Megabits (4Mb). This cake is to be shared with 8 cake eaters (subscribers). Thus we can describe this as a contention ratio of 8:1. The…

SPAM – Part 2

In SPAM – Part 1, we covered the broad strokes of spamming as it relates to unwanted mail coming into your mailbox. In this, Part 2 of the series, we’ll look at the more insidious side of SPAM; using your own (compromised) email account, bandwidth and ISPs services to send  SPAM for or by the spammers.…

SPAM – Part 1

SPAM – Variously described as the scourge of the Internet, the bane of every legitimate ISP and the curse of every email user, how did this can of processed pork and ham become so maligned? In this first part of the SPAM story, we’ll cover the basics of how it all started and the ‘wherefores’ and…

VPNs – Why Should You Use Them

Virtual Private Networks are affordable, easy to use, and a vital component in your PC and smartphone set up. Along with a firewall and antivirus/anti-malware solution, you should have a VPN installed to keep every moment you spend online completely private. External links to more information: 10 Reasons You Should be Using a VPN 5 Free…

What’s Wrong With Your Pa$$word?

Lorrie Faith Cranor studied thousands of real passwords to figure out the surprising, very common mistakes that users — and secured sites — make to compromise security. And how, you may ask, did she study thousands of real passwords without compromising the security of any users? That’s a story in itself. It’s secret data worth…

How to maximise your Internet

To maximise your Internet connection you will need to manage, as best you can, your connected devices and the various apps that use the Internet to function. Examples of this are emails/attachments, torrent downloads, Whatsapp, Youtube. There are many ways to monitor your devices but we’re not able to cover them here.  Google will be…