The end of the road for XP. End of Life on 8th April 2014.

Microsoft is ending support for Windows XP and Office 2003 on the 8th April 2014. This means that there will be no more updates and any security holes found after this date will go unpatched and unprotected (though Microsoft’s Security Essentials will continue to receive updates until April 2015). According to netmarketshare.com however, XP still

Read more ›

Anatomy of a Phish

I received an email recently from a client, or at least, from his email account. The account had been hacked and was being used to send phishing emails. Phishing is when attackers spoof popular login pages to get their victims to enter their username and passwords. Instead of being logged in, their details are saved

Read more ›

Has Gwynedd overpaid for its superfast broadband?

Strange rumblings from the Public Accounts committee in Whitehall concerning BTs council contracts to bring faster internet connections to those in rural areas. BT has won all 26 contracts, including Gwynedd’s, to perform the infrastructure upgrades but has failed to provide information on which 10% of the population won’t be covered. In addition, BT has

Read more ›

Best programs for your Windows computer

Over the years I have developed a list of Windows programs that I feel perform especially well at their given tasks. Sometimes it’s because they run quicker or are more secure than the alternatives. It’s not a definitive list and it’s certainly subjective but here’s my list of preferred software and the programs which they

Read more ›

Sim unlock and jailbreak on iPhone 3G/3GS

I was recently given an iPhone 3G which was network locked to a major carrier. The owner was looking for a way to get the phone (which was well outside of its justifiable period of lock-in) to work with another network. The process is fairly straightforward but the instructions are scattered across a number of

Read more ›

Rooting a 10″ Android WM8850 tablet

Android, in common with other operating systems, has two basic modes of working: a user mode and a superuser mode. In normal use, android devices run in user mode, only invoking superuser mode to run restricted actions such as updating important parts of the system. In most cases the system works fine and helps keep

Read more ›

How to deal with a major cause of slow laptops – start-up services.

I recently worked on a fairly new laptop of a decent specification (Core i3 processor, 2GB RAM, 5400 RPM hard drive) which was slow, sluggish and close to being unusable. We get these cases fairly frequently and, excepting those with hardware faults, the causes are generally boil down to the same thing: excessive services running

Read more ›

The finicky Inspiron 1545 power button

A client recently brought in his laptop, an Inspiron 1545, which was exhibiting some strange behaviour.  The laptop would quite often refuse to start, though the charger was functioning correctly and the battery was in good condition. The power circuit on this model consists of a power button which presses on a switch which is

Read more ›