Rampant Technology

Phone: 07 3216 8357
Search

Contact Us for an upgrade plan for your network.

Help Desk

We have qualified friendly technicians on standby

Phone: 07 3216 8357

Click here for
Remote Support

Click Here to refer a friend

Testimonials

I would like to take the opportunity to thank Matthew Malcolm for his support on Tuesday in helping Harbourside Market resolve a major connectivity issue we were experiencing with the Motorola PDA’s and the commercial wireless installation. Please pass on my thanks to Matthew as his support was very much appreciated.

Merv Williams

Harbourside Market


More testimonials

microsoft_gold_certified

Latest News

5 Useful Tools in Windows 7


Windows 7 is the latest end-user operating system released by Microsoft. Whether you have just bought a new PC or have been using Win7 for some time, there are plenty of improvements and new features. The best part is not all of them are just for the administrators or technically minded.


Search Utility when you press the WinKey

Finding what you want within Windows can sometimes be a “Where’s Wally” moment. So for those who know what it is they are looking for, just type the name into the search utility. You can bring this up by either pressing the WinKey on your keyboard or clicking the Windows Button in the bottom left corner of your screen. Even if you only partially remember the name of the program you are looking for, auto complete will display all matches found. Try using the "search Utility" to find the below programs within Windows 7. For Example - type "snipping tool" (minus speak marks) into the search utility.


Snipping Tool

The Snipping Tool is advancement on the old “print screen” function. It allows you to capture a screen shot or snip any object on your screen ready to paste, save or share the image. You can snip full screens or windows but the added usefulness is being able to drag the cursor around an object to form a rectangle or draw a free-form shape. Other features include pens and highlighters to draw over the snipped object.


Read more...

Online Threats

Back in the year 2000 only a small portion of computer users had internet access. For those who did, you would remember the simplistic browsing experience consisting of basic text and images. Today it is more than just a library. It is a fully interactive social media experience, and it seems we can’t live without it. For many the internet is now only a touch away, with instant access via the smart phones in our pockets.

The internet is fantastic technology that is forever advancing in both its usefulness and functionality. However malicious software has also had steady growth, and it seems the two go hand in hand. Unfortunately, because the internet has made it so easy to transmit data to anywhere in the world, experts are now saying that on average it takes a computer (without protection) less than 20 minutes of surfing the web before it becomes infected with Malware.

Read more...

What is the Purpose of Malware?

An example of a scareware pop up. Clicking anything on this popup will install further malware on your machine.
Since the mid 1980’s personal computer users have been plagued with Malware. In the early days most (if not all) were viruses, which explains why modern day Malware are stereotypically labeled as viruses.

Early versions of Malware quite often originated from programming code written for a positive intention. However, eventually the “evil doers” (also known as ‘hackers’) manipulated this code and used it for darker purposes. Many of the early viruses were written as pranks, or as a means for programmers to showcase their abilities, much like graffiti on a wall. Periodically, creators were even naïve to the potential havoc their creation could or did impose.

Nowadays Malware has become so much more than just annoying programmers’ experiments. Since the explosive world wide use of broadband internet, the potential to make money with Malware is almost limitless. Many organisations (including crime syndicates) have realised this and are seizing the opportunity while the majority of end users are oblivious to the risk. The payloads that are executed by much of todays’ Malware can be quite sinister.

Read more...
<< Start < Prev 1 2 3 4 Next > End >>

Page 2 of 4
© copyright 2009 Rampant | All Rights Reserved | Web Design Brisbane by iFactory
footer_icon_symantecfooter_icon_channel_partnerfooter_icon_microsoftfooter_icon_rei_masterfooter_icon_microsoft_small_business