15 09, 2017

Domain name registration myths

By | September 15th, 2017|Uncategorized|

Domain name registration myths debunked The internet is generally the first place people look for information on just about everything. That’s why when you register a domain name, or several, it’s an important step for making sure businesses can be found — even without a website. To help eliminate some of the most frequently encountered [...]

26 07, 2017

Fibre Installations Explained

By | July 26th, 2017|News|

The excitement of your Fibre order being processed by an ISP can be met with frustration as you wait for the connection to be installed. To help users set realistic expectations following the placement of an order, below is a display of expected installation time frames based on which fibre infrastructure provider is selected. The estimates [...]

31 03, 2017

Charger Android Ransomware Reaches Google Play Store

By | March 31st, 2017|Uncategorized|

Charger Android Ransomware Reaches Google Play Store Google has removed an app from the Play Store that contained a new Android ransomware family named Charger. The app's name is EnergyRescue, an app that posed as a battery-saving application, but which secretly stole a user's SMS messages and contact list, uploaded the data to the crooks' [...]

31 03, 2017

8 Trends in Android Ransomware according to ESET

By | March 31st, 2017|Uncategorized|

8 Trends in Android Ransomware according to ESET Not everyone has the time of day to read an 18-page report on the state of Android ransomware, so that's why we read it for you and summarized its main findings below. The report, published by ESET this quarter titled Trends in Android Ransomware, provides a look at [...]

13 03, 2017

WHAT’S THE DIFFERENCE BETWEEN ADSL, VDSL AND FIBRE INTERNET?

By | March 13th, 2017|Uncategorized|

Broadband Internet providers offer different connection options to subscribers, with ADSL, VDSL and UFB or fibre being popular options in many parts of the world. Understanding the differences between these options will help you choose the coverage that best supports your Internet use. ADSL Short for Asymmetric Digital Subscriber Line, ADSL is a type of [...]

14 12, 2016

Outgoing SMTP List

By | December 14th, 2016|Uncategorized|

List of Outgoing Servers Your Outgoing (SMTP) Server is used for sending emails. Common Outgoing Servers - South Africa only All outgoing servers use Port 25 unless otherwise specified. For Telkom ADSL, outgoing server is smtp.dsl.telkomsa.net, smtp.saix.net or smtp.saix.co.za For Telkom Mobile (8TA), outgoing server is smtp.dsl.telkomsa.net, smtp.saix.net or smtp.saix.co.za For Telkom Analogue [...]

22 07, 2016

Domain in Grace Period, In Redemption or About to Expire

By | July 22nd, 2016|Uncategorized|

When a domain enters redemption it is a grace period that is allotted to renew a domain name after it has expired. ICANN has placed this “grace period” in place due to domain names inadvertently being deleted or expired. However, if a domain falls into redemption it can be quite costly to regain the domain. [...]

2 11, 2015

What is DNS Propagation and How Does it Work

By | November 2nd, 2015|Uncategorized|

DNS Propagation, you have probably heard the term before but aren't quite sure what it is. Don't worry I get his question a lot so you are not alone. DNS Propagation is a complicated subject, and to fully understand it you need to know how the Internet works which includes many topics. In this blog [...]

29 01, 2015

THE NEW LINUX FLAW THAT’S GETTING EVERYONE SPOOKED

By | January 29th, 2015|Uncategorized|

THE NEW LINUX FLAW THAT’S GETTING EVERYONE SPOOKED 29 Jan 2015 by Katherine Kelly There’s never a quiet moment, and – if the snow wasn’t enough excitement for you today – a new security vulnerability has been found in the GNU glibc library, dubbed GHOST (CVE-2015-0235). If this doesn’t mean anything to you, it’s a [...]

28 01, 2015

CLOUDY WITH A CHANCE OF DRONES

By | January 28th, 2015|Uncategorized|

If tech builds it, hackers will be exploit it, and whilst this isn’t a new thing for drones, the new malware that can cause a hacker to be able to take control of a drone mid-flight is a next level for the tech. Welcome to every Sci Fi film’s nightmare. As the shine starts to wear off, as with other new technologies, we’re realising that security in these new devices is more important than ever.

Do NOT follow this link or you will be banned from the site! css.php868e44c5133491f24d6a823a5dd0b768516fbbc03f87a80e6a752e2e03656114