CALL NOW: 1300 21 22 99

About admin

This author has not yet filled in any details.
So far admin has created 46 blog entries.

Log4Shell vulnerability

According to security researcher Sam Thomas, the log4sh shell vulnerability in Windows has been rated as critical, as it could potentially allow attackers to exploit this weakness and remotely execute malicious commands on targeted systems

By |2021-12-15T23:38:27+00:00December 15th, 2021|Blog|Comments Off on Log4Shell vulnerability

Non-Fungible Tokens

A lot of people have heard of ERC721 tokens (ERC-721 is the technical standard used to issue non-fungible tokens). But what are they, and how do they work?

By |2021-12-13T22:43:09+00:00December 13th, 2021|Blog|Comments Off on Non-Fungible Tokens

5 Ways to Send Large Files

Are you tired of sending emails with multiple attachments? Sending large files over the internet can be a pain, but it doesn’t have to be if you know how to take advantage of modern cloud storage and online collaboration tools

By |2021-12-06T23:55:51+00:00December 6th, 2021|Blog|Comments Off on 5 Ways to Send Large Files

3CX Phone System

One of the best and most popular cloud-based systems available today is 3CX (also known as the 3CX Phone System)

By |2021-12-03T01:00:37+00:00December 3rd, 2021|Blog|Comments Off on 3CX Phone System

Shadow IT

If you’re an IT manager, you’ve probably heard the term Shadow IT before. Shadow IT refers to technology that your company doesn’t officially use, but that employees are using anyway

By |2021-11-30T03:38:18+00:00November 30th, 2021|Blog|Comments Off on Shadow IT

Difference Between a Terminal Server and a Published App

So, you’ve decided that your organization needs to move to Citrix, but how do you know if you need to use published apps or terminal servers? What are the benefits of each, and what are the disadvantages?

By |2021-11-30T02:27:08+00:00November 30th, 2021|Blog|Comments Off on Difference Between a Terminal Server and a Published App

In-House vs Cloud Hosting

As a growing company, you have to decide whether to go with an in-house hosting solution or use a cloud-based solution

By |2021-11-30T01:20:16+00:00November 30th, 2021|Blog|Comments Off on In-House vs Cloud Hosting

Difference Between Docker and Kubernetes

Docker and Kubernetes are two of the most popular and powerful tools in the DevOps arsenal right now, and they both have their place in your organization’s infrastructure

By |2021-11-30T01:19:50+00:00November 30th, 2021|Blog|Comments Off on Difference Between Docker and Kubernetes

Avoid Online Scams

You’ve probably heard it said that if something seems too good to be true, it probably is. In the world of online sales, that statement couldn’t be more accurate

By |2021-11-25T05:38:21+00:00November 25th, 2021|Blog|Comments Off on Avoid Online Scams

Penetration Testing

Penetration testing can mean several different things, depending on who you ask and how they approach it. Generally speaking, penetration testing involves working with your team to see if there are any vulnerabilities

By |2021-11-25T04:19:06+00:00November 25th, 2021|Blog|Comments Off on Penetration Testing
Go to Top