Most printers bought today have a wireless card and so can be used from any device anywhere. This can happen in different ways.
The word on the street is that Windows 9 will, as OS X and Linux have for years, support virtual desktops – the ability to group many programs’ windows and move the whole lot on/off the display together. The functionality is available now free by running Sysinternals Desktops.
But the thrust of this item is virtualisation – the ability to run one operating system inside another. This is often useful for running old programs you don’t have a licence to run on modern versions of Windows, or testing out a possibly virus laden program/website, or running a Windows program side-by-side with an OS X one, or even as a form of image backup.
There are four heavyweight players in this space and each has their pros & cons:
Remember that both host and guest operating systems will need a valid license to work properly; moving a guest to a different physical machine is possible but the hypervisors change the MAC address of the network card so reactivation is usually necessary. Also, you cannot have too much RAM for smooth running virtualisation.
Most email services limit the size of attachments to around 25 MB or less. But sometimes you want to send one-off larger files right ? Here are some options to consider; most free.
There are surely others, please let me know if you find another service or method of sending large files.
The perennial problem of how to maximise the possible broadband speed continues to cross my inbox.
First some ground rules:
However, the following issues are within your control and do affect the speed you receive
The above list will often provide the necessary pointer to the resolution of your problem. But not always - faults beyond your premises can occur. In that case here is what needs to be done
Run several speed tests at different times of the day to get average figures. The place to do this is
http://speedtest.btwholesale.com/ after the initial test completes click the 'further diagnostics' button. Now find out the speed that the BT Wholesale Availability Checker database thinks you should receive (this is only a best guess) from
Compare the DSL downstream line rate with your line speed as reported by your ISP or available in some top end routers. If there is a significant difference (>15%) and your line has been installed for more than 10 days then see if the phone line sounds crackly. If so, a phone fault is the cause of your broadband speed issues. Otherwise, replace the microfilter (and ideally the router) at the master socket and see whether the problem is resolved. Note that you should disable all internal equipment by connecting to the test socket behind the facia of the master socket. If the problem is resolved then internal house wiring and/or the old microfilter/router are at fault.
Your IP Profile speed should be just under the DSL line speed. The latter will always be higher by a small amount as housekeeping accounts for some speed loss. If there is much of a difference your ISP can be asked to reset the profile at the exchange. This causes an automated 10 day sequence where the fastest speed your line is capable of receiving whilst maintaining a stable connection is determined.
If the above two items check out but your download speed is low then either one of the eight items above are at fault or there is a fault at the exchange equipment.
Picture this: you receive messages from people asking you to stop sending them invitations to buy anatomy enhancing medications, or send them money as they have been stranded overseas, or maybe just a link to a website that discharges a virus when visited.
The problem is that a bad person has got hold of your email address and has spoofed it by placing it in the From: field of an email message. By using your address rather than their own they make themselves less identifiable and their poison pen messages less likely to be trapped by spam filters.
What's worse, these messages often get sent to people you know. The real sender tries to rely on your good name to convince the recipients to follow their evil plan based on your trusted character.
How did this happen ?
What can you do about it ?
If you use the same password in more than one place change them for unique complex (more than 10 characters including upper case, lower case and numbers) passwords. You don't have to remember them as long as you use a (possibly free) password manager as explained in my earlier blog post.
Change your email account password - this is just precautionary but it can't hurt. Remember to update any mail clients you use with the same password.
Forward this blog entry to anyone who contacts you. That way they will understand that this problem is most likely not of your making and there is absolutely nothing you can do about it once your credentials are in the hands of a criminal. Quite soon the bad people will not have any value in your email address as it has been used so this problem will naturally end.
Yes it is a pain but it is such a common part of life today that most people are aware of the issue and are in a position to empathise.
To avoid having your internet access restricted by protective mail servers and service providers, and also avoid the thieves and cyber scoundrels that are ever present but all the more difficult to handle when travelling, follow these suggestions.
Enable two factor authentication and test it on all web facing applications on all devices at least a week before you set out. See my earlier post on this.
Don't do anything on public Wi-Fi that you wouldn't want posted on a roadside billboard. Sometimes that's not an option though so install a virtual private network that will create an encrypted tunnel to your home provider. My favourite is http://www.cyberghostvpn.com but others such as https://www.privateinternetaccess.com are sound.
Assume your device (phone, tablet, laptop...) will be stolen. Encrypt the entire disk with BitLocker or https://diskcryptor.net if running Windows or FileVault for OS X or LUKS for Linux distros. Android and IOS have similar apps.
General good practices such as logging out of each service before closing the window and using unique strong passwords should be part of SOPs but are especially necessary when on the move.
Similarly, shelter your screen and keyboard from overlookers both in person and via CCTV. And it should go without saying that a paid for updated firewall and virus protection suite are essential.
If using Gmail consider installing the free offline extension as a Wi-fi signal may not always be present and anyway, the format is better in this author's opinion.
Finally, social networks are fun but if you post a picture from overseas you may as well broadcast to local villians that you are not at home. Be circumspect with the information you publish. Even photos without identifyable surroundings may contain Exif geolocation data to locate where they were taken.
I'm sometimes asked why a client's messages are rejected or bounced by one or two recipients.
We all have an address on the internet – that is how an email message knows where to go. The problem is that when a suspected spammer or other person with nefarious intent has been traced back to his address, that address gets blacklisted on several lists to prevent more spam being sent. A selection of these blacklists are checked my most email providers to ensure they are not responsible for propagating rubbish.
Because there are more potentially internet connectable devices in the world than available addresses stale connections are dropped and when a new connection is requested a new address gets allocated. You have been unfortunate to have picked up the address that the bad person used.
There are ways of having it removed from the various blacklists but the time and effort involved is far more than the alternative method of resolution. Visit http://www.whatsmyip.org/ and make a note of the IP address on the top line. Now power off your computer and any other internet connected devices including the router. Count to 10 then power up the router. After a minute power up your computer and any other devices you want. Now visit http://www.whatsmyip.org/ and see if your IP address has changed. If so, send you email again and expect it to arrive. If the address is the same, go through the above process again but wait much longer before powering up the router - overnight perhaps.
The above works for the 95% of people who have dynamic IP addresses allocated by their ISP. If you have a static IP address (usually bought if you are a business hosting a server) then the above won't work; in that case you need to either get a new IP address issued by contacting your provider, or go through the process of proving to all the blacklist owners that you are not a bad person.
:: Next >>
|<< <||> >>|