Welcome to MAD Computer Solutions Ltd...

Win a Tablet Computer

Posted By on June 3, 2013

avatar

Win an @Tab 7″ Tablet Computer

Did you know that one in 10 people in the UK owns a tablet? If you’re not already one of them then you’re missing out.

Tablets offer an easy and convenient way to surf the web, play games, watch films and TV shows; and keep in touch with friends.

Running on Android’s Jellybean operating system, the @Tab has everything you want from a tablet.

Browse thousands of games, books, films and magazines on Google Play, take advantage of the Dual-core processor for fast, beautiful graphics, watch YouTube videos, connect to Facebook and a whole lot more.

You can enter into the competition numerous times, by liking or sharing on facebook or Twitter. Every time you enter your odds of winning increase


At-Tablet

The @Tab 7″ Tablet features Android 4.1 Jelly Bean and Flash 11 Support. Packed with technology including a Dual Core 1.6GHz processor, 16GB storage and a 5 point multi-touch display, it’s perfect for web browsing, playing the latest games or keeping up to date with work on the go. With its HDMI out port you can connect the tablet to your HDTV for watching films or playing the latest games on the big screen.

@Tab comes preloaded with lots of must-have apps with loads more to download on the Play Store. Bluetooth 2.1 enables you to connect multiple devices wirelessly, or you can connect and charge devices with the USB 2.0 and Mini USB port. Online access is easy thanks to the built-in Wi-Fi connection, and when you’ve located your nearest Wi-Fi hotspot you can stay up to date with your emails and social

Technical Specifications:

Operating System: Android 4.1 Jelly Bean with Flash 11 support
CPU: Dual Core 1.6GHz CPU
Memory: 1GB DDR3
Storage: 16GB
Display Resolution: 7″ 800 x 480 LCD display
Touch Panel: Capacative multi-touch 5 points
Camera: 0.3MP front and back cameras
Wi-Fi: IEEE 802.11 b/g/n
Gyro Sensor: Supported
Audio Output: Stereo
Video Output: Mini HDMI
Mic/Earphone: Mic and 3.5mm headphone jack
Battery: 3000mAh – upto 4 hours battery life
Micro SD Slot: Micro SD card supporting upto 32GB
USB Port: USB 2.0 and mini USB port
Bluetooth: Bluetooth 2.1
Power Adaptor: AC adaptor



How to make Windows 8 more User Friendly

Posted By on May 13, 2013

avatar

If you’ve upgraded your PC recently to Windows 8 you may find that you’re completely baffled with even some of the smallest tasks. Even to the point that shutting down the computer is a complex task compared to what users have been used to in previous versions of Windows.

The main reason why Windows 8 can be so confusing for new users is due to its lack of a start bar, which has been present in every version of Windows since Windows 95.

There is one simple step that you can take in order to make Windows 8 more user friendly and look more like the Windows of old, and that step is to install a start menu for Windows 8. There are several different sources and versions of start bars for Windows 8, however after testing a few different variations the best one we’ve found is provided by IObit. You can download and install the IObit start menu for Windows 8 for free from the link below.

IObit Windows 8 Start Menu

Once installed, you can also set Windows 8 to start in the Desktop view mode rather than in the metro theme, so every time you turn on the PC you will be in the familiar desktop mode.




Yahoo E-mail Accounts Hacked Multiple Times This Year

Posted By on April 16, 2013

avatar

Despite Yahoo’s best efforts, users of yahoo mail continue to be reporting incidents of email account hacking. Hackers continue to defy Yahoo’s efforts to boost security and fix vulnerabilities in its Yahoo Mail service. Yahoo Mail users first reported seeing their accounts compromised as far back as early January. We’re now in March, and it appears that Yahoo still has a big problem on its hands.

Behind Microsoft and Google, Yahoo is the third largest email provider in the world. Even if a small percentage of accounts are affected, this can account for millions of users having their personal information shared, stolen and exposed. The attacks typically involve users getting an email from a friend or colleague or even a completely unknown party containing a link. The link may lead to the account being hijacked and sending emails to the victim’s contacts.

Regardless of whether the flaws haven’t been patched properly or if these are new flaws, it’s simply unacceptable for Yahoo Mail users to have their accounts hijacked so easily and for Yahoo to stay passive for so long. Given the clear lack of a fix for the issue, despite Yahoo’s assurances that all is well, the company may see a large decline in users in the coming weeks.

On a side note, if you are a business and you’re using free email accounts such as Yahoo, Gmail and Hotmail, then for the future you should be thinking about and planning to switch your e-mail to a more professional account. As an example, if you own your own domain and have a website that is being hosted then you should think about an email address such as john@yourdomain.com. The main reasons why it is more advantageous to use this kind of account can be seen below.

Yahoo and other free e-mail accounts are fine for personal use, but for businesses there are potential issues. There are two main issues with free email addresses, the first being when you send e-mails out to people you are more likely to end up in their junk mail because free e-mail addresses have a lot higher ratio of spammers than any other. This issue is an especially critical one if you are using a free e-mail address for sales and marketing as this will limit your potential reach for any e-mail marketing campaigns.

The second problem is that, generally other businesses or customers, depending on your market, will not trust a free email account if they have never met you before, because perception plays a crucial role in the consumer purchase decision process. How will they perceive you and your products and services if they see that your email address is a free internet one? Probably cheap and untrustworthy.

If you have been affected by your yahoo or other free email account being hacked, or if you feel that you need a better and more professional e-mail provider, then please feel free to give us a call and we may be able to provide you with a better option going forward.




Official Support for Windows XP and Office 2003 to Cease in 2014

Posted By on March 22, 2013

avatar

In 2002 Microsoft introduced its Support Life-cycle policy based on customer feedback to have more transparency and predictability of support for Microsoft products. As per this policy, Microsoft Business and Developer products, including Windows and Office products, receive a minimum of 10 years of support. Support for Windows XP and Office 2003 will cease on April 8, 2014.

This means if your business is currently using Windows XP or Office 2003 then you should be planning on upgrading your systems before April 2014. After April 8, 2014, there will be no new windows updates for both XP and Office 2003, which means that there will be no new security patches or any kind of support for these products whatsoever. Running Windows XP SP3 and Office 2003 in your environment after April 2014 will mean that your system will be highly exposed to any new security threats that hackers can find and exploit in XP and Office 2003, below are just some of the issues you will likely experience:

  • Software: Just as is the case for Windows 98 and Windows 2000 now, driver releases for new hardware that comes out will start to become non-existent for XP around or slightly after the April 2014 timeline.
  • Hardware: Customers who purchase new hardware even for otherwise fully capable systems may start to run into compatibility issues.
  • Security & Compliance Risks: Unsupported and unpatched environments are vulnerable to security risks.

As a Microsoft Certified Partner Mad Computer Solutions can help you understand the best options to meet your personal and business needs. There are many options for small and medium businesses considering moving to a modern Operating System or PC with the latest productivity and collaboration tools.

If you are currently running Windows XP or Office 2003 in your business and you haven’t given any thought of upgrading your systems yet, I would suggest you start piecing together a plan as soon as possible, as whatever size business you are, you will need to ensure that you have budgeted for such an upgrade to your business infrastructure.

As always, if you require any advice, help or support in planning or implementing such an upgrade, please feel free to give us a call on 0845 272 2373 and see how we can help you and your business.




Safeguarding Your Business Data

Posted By on March 22, 2013

avatar

Data is at the heart of businesses, it’s crucial for you to protect it. To protect your organization’s data, you need to implement a data backup and recovery plan. Backing up files can protect against accidental loss of user data, database corruption and hardware failures.

Imagine that you are using your computer at work when suddenly all of the lights go out and the computer shuts down. After a few minutes the power is restored. You reboot your computer only to find that an error message appears. It tells you that a fatal error occurred, and that some important data, let’s say your accounts for example has been either lost or corrupted. Situations such as this happen all too often, the good news is that there are key safeguards, one of which is data backup which will protect from such circumstances.

The reasons of data loss can fall into these main categories;

  • Human error – deleting information from a PC by mistake, the misplacement of DVDs, CDs or media, and errors in administrating databases.
  • Intentional Crimes – acking, H  Hacking, viruses, data theft and espionage.
  • Natural Causes – Power failures, hardware failures, software failures, software bugs and also any kind of disaster such as a fire or flood.

With a little preparation, individuals and businesses can rest easy that if catastrophe strikes, they can be well prepared to recover and be back up and running in as little time as possible.

Mad Computer Solutions can provide you and your business with professional cloud online backup services in order to ensure that your company’s data is secure and can be recovered in the event of hardware failures, natural disasters or any other kind of problem.

Backup is just one part of ensuring the safety of your business when something goes wrong. If you want to ensure that your business is completely protected and capable of recovering from any kind of ‘disaster’ then why not have a look at our disaster recovery planning service.




Twitter: Hackers target 250,000 users

Posted By on February 4, 2013

avatar

A quarter of a million Twitter users have had their accounts compromised in the latest of a string of high-profile internet security breaches.

Twitter said in a blog post that the passwords were encrypted and that it had already reset them as a “precautionary measure,” and that it was in the process of notifying affected users.

The blog post noted recent revelations of large-scale cyber attacks against the New York Times and the Wall Street Journal, but unlike the two news organizations, Twitter did not provide any detail on the origin or methodology of the attacks.

“This attack was not the work of amateurs, and we do not believe it was an isolated incident,” Twitter said. “The attackers were extremely sophisticated, and we believe other companies and organizations have also been recently similarly attacked.”

Privately held Twitter, which has 200 million active monthly users, said it was working with government and federal law enforcement officials to track down the attackers.

The company did not specifically link the attacks to China in the blog post, in contrast to the New York Times and the Wall Street Journal, which both said the hackers originated in China.

Twitter, the social network known for its 140-character messages, could not speculate on the origin of the attacks as its investigation was ongoing, said spokesman Jim Prosser.

“There is no evidence right now that would indicate that passwords were compromised,” said Prosser.

The attack is not the first time that hackers have breached Twitter’s systems and gained access to Twitter user information. Twitter signed a consent decree with the Federal Trade Commission in 2010, subjecting the company to 10 years of independent privacy reviews, for failing to safeguard users’ personal information.

We highly recommend changing your password on a regular bases, and when such an event does occur that you change your password immediately.




Computer virus accuses victims of viewing child porn

Posted By on February 1, 2013

avatar

German federal police are warning about a computer virus that accuses victims of viewing “juvenile pornography”.

It also displays an image that it claims reveals images of child sexual abuse have been viewed on a computer.

The Windows virus locks a computer and only returns control to its owner on payment of a 100 euro (£86) fine.

It purports to be collecting cash on behalf of German copyright authorities and the country’s national computer security agency.

The virus amounted to “digital extortion” and victims should not pay up, said German police.

The warning about the novel strain of ransomware was issued by Germany’s Federal Criminal police office (the Bundeskriminalamt or BKA).

The ransomware version found by the BKA uses a pop-up window that says the machine has been locked down due to “unauthorised network activity”. The window is crafted to look like it has been put together by Germany’s Federal Office for Information Security (BKI) and its society for prosecution of copyright infringement (GVU).

ransomware

‘Emotional blackmail’

Text in the window claims that images of child sexual abuse as well as pirated content have been found on the machine. Also displayed is an picture of a child which it claims reveals illegal images have been viewed.

Rik Ferguson, director of security research at Trend Micro, said it was the first time he had heard of ransomware displaying images that users were accused of harbouring.

“It seems that they are attempting to increase the pressure of this kind of emotional blackmail,” he told the BBC.

Germany’s BKA said users should not pay the fine “under any circumstances” and added that neither the BKI or GVU collected cash in this way from those suspected of viewing illegal images or pirating content. Instead, users should use anti-virus and other security software to clean up their PC and deal with the virus.

“This is a form of digital extortion,” said the BKA in its alert about the virus.

Ransomware, which tries to make victims pay an on-the-spot fine, is becoming more prevalent but most strains simply accuse people of pirating movies or music. Others scramble data that is only unscrambled when a fee is paid.

Security firm Symantec said it was seeing more and more strains of ransomware and said it could be “highly profitable” for its creators. It estimated that ransomware makers were already making about $5m (£3m) a year from such malicious code.




Ubuntu operating system comes to Android smartphones

Posted By on January 3, 2013

avatar

The Ubuntu operating system has been adapted to run on smartphones.

Using a small piece of code which will easily replace the Android on a Samsung Galaxy or Nexus Phone. The Popular Linux-based software will allow users to run desktop apps on their handsets, allowing them to double for PCs when docked to monitors.

Ubuntu is amongst the most popular operating system to be based on the Linux kernel – the code that lets software and hardware work together. With an estimated figure of more than 20 million PCs already use it. In many cases these are older machines which benefit from the fact it is less demanding on computer power than Windows – and is virus-free.

The new version has been designed to work on last and current-generation Android handsets which share the Linux kernel. This means Ubuntu can re-use existing software drivers to control the hardware.There are already 45,000 native apps for the system – albeit with several notable omissions such as Adobe’s Photoshop and the Office suite, although alternatives do exist. In addition Ubuntu can run web apps written in the widely-adopted HTML5 language.

Ubuntu’s founder, Mark Shuttleworth, said he was in talks with manufacturers for devices to be sold with the system pre-installed within the year, despite questions from analyts wondering if consumers really want the power of a fully fledged computer on their phone.




Upcoming Gadgets of 2013

Posted By on December 18, 2012

avatar

iPhone 5S

It’s seeming to become a trend that Apple release a “S” update to their phones before moving up an integer.

Possible features? While not all of the features of this new mobile have been announced. It’s speculated by industry analysts that it should feature a new “super HD camera/screen, a better battery and NFC [near field communication – used in such things as contactless payment systems]”. Additionally it’s likely to be produced in a variety of colours.

When can I buy one? With the ever increasing speed of mobile phone advancement, it’s likely that it will be seen sometime around June.

Apple iTV

There has been speculation for some years that Apple would make a land grab for the TV market. Apple CEO Tim Cook recently remarked that turning on a TV is like going “backwards in time by 20 or 30 years”. That is, like the music and phone industry previously, it’s in need of an Apple update.

Possible features? Cult of Mac reported that the TV would feature both Siri and iSight to enable voice and face recognition – iPhones and iPads could also be used to control it.

When can I buy one? Gene Munster (industry analyst) has predicted that the Apple iTV will be launched in October 2013: “It should cost $1,500-$2,000 and come in sizes from 42 inches to 55 inches.” It is likely a UK version would only be released when licensing deals with British TV channels are finalised.

Xbox 720 / Infinity

Microsoft’s long-awaited follow-up to the Xbox 360, rumoured to be called the Infinity.

Possible features? Like the Kinect, the console will use motion detection technology and T3 recently revealed that Microsoft had filed a patent concerning projecting augmented reality 3D images on walls, which would require you to wear Wi-Fi-enabled 3D glasses. May also include a Blu-ray drive.

When can I buy one? A Microsoft executive did talk about a “new Xbox” but this statement was quickly withdrawn by the company; however, the company has placed job ads which mention the new console. A Bloomberg report says the XBox 720 is likely to be available from autumn 2013.

Amazon phone

The internet giant is said to be adding a phone to its range of Kindle readers.

Possible features? Don’t expect any revolutionary hardware, but the software will allow seamless integration between Amazon’s Appstore, Amazon MP3, Amazon Cloud Player and Kindle books. In short, it will be more of an multipurpose Amazon revenue-generating device than a phone. As PC Magazine has suggested, it’s likely to be cheap. This is because Amazon is expected to subsidise the cost of the handset and the monthly price plan using the revenue from the vast amount of Amazon media, electronics and whatnot you are inevitably going to purchase with it. It is also likely to come pre-loaded with a bar code scanner, which will point out how much cheaper everything is on Amazon. Yes, it does sound pretty Faustian.

When can I buy one? Your pact could start in mid-2013.

Augmented reality glasses

Google and a company called Vuzix are lining up futuristic specs for people who can’t bear not to be connected.

Possible features? More of a headset than a pair of spectacles, the Vuzix projects a small colour image in front of your eye, runs the Android operating system and connects via Bluetooth to your phone. The screen could show you text messages, emails or map directions.

What this device’s killer app will turn out to be is anyone’s guess. It could, for instance, use face recognition to remind you of fellow partygoers’ names, their CVs and their latest Facebook status updates and tweets – never be stuck for small talk again! A scary Charlie Brooker-scripted future is heading our way, basically.

When can I buy one? Summer 2013 for under £500. Google Glass isn’t expected until 2014.

Nest

A “learning thermostat” designed by two former Apple employees, it has already been described as the “iPhone of thermostats” by Wired.

Possible features? Via Wi-Fi, it connects with your smartphone, allowing you to control your heating whether you’re at home or not. Over time it learns your schedule and designs a heating or air-conditioning programme around it. It can detect when you’re not at home. And it looks pretty: it glows orange for heating, blue for cooling.

When can I buy one? They’re already available in the US for £250 – the manufacturer claims you will claw that back in utility bill savings in two years.




Facebook to improve privacy controls over public visibility

Posted By on December 14, 2012

avatar

Social networking site to make settings easier to manage, giving users the ability to review every publicly available picture

After repeated criticism that Facebook was making it hard to keep information private, they have begun to make a dramatic change to their privacy controls. You can now find and review any publicly available picture of yourself on the site.

The change is the biggest overhaul to its privacy settings in more than a year, and will begin appearing to the site’s 1 billion registered users over the next few weeks. The most visible change will be “privacy shortcuts” which will show up as a tiny lock at the right-hand side of the screen, at the top of the “news feed”, with a menu offering answers to questions such as “Who can see my stuff?” and “Who can contact me?”

Another tool will let people review every publicly available picture on Facebook that includes them, with suggestions on how to ask for them to be removed. “If you spot things you don’t want on Facebook, now it’s even easier to ask the people who posted them to remove them,” the company said in a blogpost.

Users will also get more precise control when they first use most apps (though not games apps) of how much it can do – such as reading their profile and friends list, but stopping it from posting into their public feed.

Facebook has come under repeated fire from privacy advocates because it kept shifting the boundaries of where privacy ended and publicly visible data began, and made it hard to understand how to change those back.

Critics also said that Facebook made the changes intentionally to expose more data about people publicly so that it could benefit from selling adverts to them.

Facebook’s move, which it said is unconnected with a poll that ended at the weekend over users’ right to vote on changes in the service, is in effect an acknowledgement that its privacy settings had been hard to understand and control. This includes “rogue apps” which would post unwanted content into users’ feeds to try to pull in their friends.

Being able to remove embarrassing or unpleasant photos has become increasingly important for users of the nine-year-old service, many of whom first started using it while they were still at university in the US – but who are now discovering that their digital history has followed them around.

For many younger users now, Facebook has become a record of who they are – but also a source of potential disruption in their first work interviews or careers. Getting rid, or hiding, photos that might show them in compromising or unpleasant situations may be a high priority.




Computer Support and Repair In Rubery : Frankley : Northfield : Longbridge : Bromsgrove : Quinton : Worcester : Selly Oak : Barnt Green : Kings Heath : Birmingham : Halesowen : Harborne : Kings Norton : Rednal : Solihull : Maypole : Lickey : Bournville : Stourbridge : Oldbury : Catshill : Droitwich : Edgbaston : Redditch : Kidderminster : Hagley : Dudley : Walsall : Wolverhampton : Sandwell : Sutton Coldfield : Stourport : Server Support : Virus Removal : Web Design : Privacy Policy : Contact Us