SPAM – Part 3

Continuing with this series we are going to look at: how we can spot SPAM and tell the difference from legitimate email adjust our emailing habits to protect our email identities Things have moved on significantly since those early days back in 1990. Email remains the killer messaging app in terms of sheer volume of…

Shared Internet Explained

Contention Ratios. A shared Internet package usually means a pool of bandwidth has been reserved for the use of x subscribers. Think of a cake – a cake that is 4 Megabits (4Mb). This cake is to be shared with 8 cake eaters (subscribers). Thus we can describe this as a contention ratio of 8:1. The…

SPAM – Part 2

In SPAM – Part 1, we covered the broad strokes of spamming as it relates to unwanted mail coming into your mailbox. In this, Part 2 of the series, we’ll look at the more insidious side of SPAM; using your own (compromised) email account, bandwidth and ISPs services to send  SPAM for or by the spammers.…

SPAM – Part 1

SPAM – Variously described as the scourge of the Internet, the bane of every legitimate ISP and the curse of every email user, how did this can of processed pork and ham become so maligned? In this first part of the SPAM story, we’ll cover the basics of how it all started and the ‘wherefores’ and…

How to Maximise Your Internet – Revisited

In an earlier article we briefly discussed the ways in which your Internet connection can be impacted and some of the basic things to be aware of. Revisiting the topic, we hope to include some more detail and cover some other areas that you may need to check. CLEAN SWEEP – Ensure your Anti-Virus and Anti-Malware…

VPNs – Why Should You Use Them

Virtual Private Networks are affordable, easy to use, and a vital component in your PC and smartphone set up. Along with a firewall and antivirus/anti-malware solution, you should have a VPN installed to keep every moment you spend online completely private. External links to more information: 10 Reasons You Should be Using a VPN 5 Free…