Monthly Archives: October 2008

Viruses

computer-viruses

Anti-Virus software gets a great deal of coverage in Click because ultimately it’s a very important component of any computer system and choosing the right program to protect your computer should be carefully considered.Whilst most understand its importance, not many understand the actual effects that a virus can have on your system.To demonstrate my point I need only think back to a phone call I fielded from a gentleman last week who was convinced that a virus had caused the power supply in his printer to malfunction.I thought it might be interesting to look over some of the more realistic and prolific viruses that I’ve seen over the last decade:

Melissa: Named after an exotic dancer from Florida, this virus tempts users to open an e-mail attachment with a subject line such as ‘Here is the document you asked for’.Once opened the virus replicates and forwards itself to the first Read the rest

OpenOffice 3.0

OpenOffice

This week OpenOffice 3.0 was released and once again I found myself questioning as to why we spend good money on Microsoft Office when there is a completely free alternative available that does the job just as well.After all, it’s not as if Office 2007 is cheap; the professional version comes in at an impressive £350 and it’s not as if I even like Office 2007.

Unlike previous versions which used a standard Windows interface, I find the latest incarnation completely out of keeping with other applications which all keep to roughly the same, familiar user interface.Perhaps old age it starting to catch up with me but even after a year of usage I still find myself spending what seems like an eternity looking in vein for even the most basic of functions. Software for the Windows Operating System has always adhered to a certain menu layout so that users Read the rest

Wireless Security #2

Wireless-security

Last week we spoke about the need for Wireless Network security and we follow on this week by covering the different standards available.To set up or alter your wireless security settings you will require the manual for your router as the configuration process varies from manufacturer to manufacturer.This should have been provided in the box in either paper format or on a CD-ROM but if you don’t have either to hand then a copy should be freely available from the manufacturers website.

WEP (Wired Equivalent Privacy) – Introduced back in 1999, WEP is still one of the most popular encryption protocols.Despite the fact it has several serious weaknesses and can be readily cracked in minutes with freely available software, it is the default choice presented to a user when setting up security on a wireless network which probably explains its continued popularity.

The standard is so weak because it relies Read the rest

Wireless Security Part 2

Wireless-Network

This week I was in a moral dilemma; we have just moved in to the new house and haven’t yet got a phone line or broadband connection.Writing and sending my Click article does require a certain amount of Internet access and so resigned myself to travelling back to the office at ten o’clock on this Tuesday evening unless someone out there was kind enough to be broadcasting a wireless signal that I could hitch on to.

Whilst I theoretically know how to crack a wireless network with minimal encryption, I decided that this could be considered a little un-neighbourly and so drew a line by saying I would only make a connection in the unlikely event that there was someone broadcasting with absolutely no security installed whatsoever.It turns out that what I assumed would be an unlikely possibility was actually surprisingly obtainable; as I sat in my conservatory I quickly Read the rest

iPhone Part 2

iphone

Whilst I dedicated an article to the iPhone when it was first announced I haven’t touched on the subject since.This was until my Sony handset broke a few weeks back and for what seems like an eternity whilst I wait for it to be repaired, I’ve been left using a four year old girly pink clamshell Samsung phone borrowed off my girlfriends sister.

The fact I’m now using a handset which I’m afraid to use in public for fear of ridicule has somehow made me appreciate how much of a statement your mobile phone makes about you; similar to the watch on your wrist or the shoes on your feet.Whilst I have never considered such things particularly important and would never advocate living your life by third party perspective, I doubt I would ever go out wearing a watch won from an arcade grab machine or a pair of plastic Read the rest

Top