recycle_keyboard

Do you want to reuse IT equipment? There are good reasons to reuse old computers, servers and printers.  Here’s what you need to check before discarding old equipment.

With IT equipment having a recommended life cycle implied by vendors and manufacturers, many businesses wonder if its best to scrap IT equipment altogether or to put it to good use elsewhere.

Since throwing out computer equipment contributes to producing a surplus of waste, which has detrimental effects on both the environment and on life itself, we’ve decided to write this article for ideas on how to re-purpose computer equipment.

The first thing we suggest is to have a list of all the IT inventory, making sure the make, model and specifications are noted down. Then check our ideas below for reusing specific types of equipment.

Reusing desktops or laptops

Fun-Ways-You-Can-Recycle-Your-Old-Computer-10

Check to see what operating system (OS) is on the computer or laptop. For instance, if it runs on a recent OS, such as Windows 7 or 8, it’s still good enough to use.

Some laptops can be reused to provide colleagues with a way to work more flexibly, especially for those who move around a lot, work from home or work on the road.

It’s even worth checking to see if older machines can be re-purposed to be used in a test environment, as a dummy server or to host company files and information.

A computer could also be repurposed to be used as a locked-down guest machine that connects through a guest Wi-Fi network for clients or visitors to use.

Unless there’s already a backup of some sort in place, it’s even possible to set up backup services for a primary server by re-purposing an old computer. For instance, crucial network services such as DNS and DHCP are light to run. Say that a primary server with such services fails; it’ll bring down the network. This is one of many potential examples available.

Reusing a printer

Fun-Ways-You-Can-Recycle-Your-Old-Computer-2

Is your printer a modern one? If so, we suggest checking the ink toner, cartridge and drum prices, to see if how affordable it is. This could result in sparing expenses on a different printer that could cost more to run in the long term.

Even if the ink is expensive, it may be worth connecting the printer to a computer that often prints confidential documents to keep it close to the user.

Reusing networking equipment

It’s worth keeping networking equipment that’s capable of gigabit speeds and at least Wireless-N speeds. Anything slower could be repurposed on a test network or on a home network that doesn’t rely on high  speeds, if needed.  To determine if your networking equipment is capable of gigabit speeds, check for keywords such as GigE, Gigabit, 1000mbit, or cat 6.

A lost cause?

We understand that not everything will be fit for purpose once it’s been worn out or broken, for instance peripherals, mice, keyboards and cables. This is when a reputable recycling company should be contacted to responsibly recycle broken equipment. Now-a-days it’s possible for recycling plants to melt down plastics and metals into molds that can be reused in manufacturing other goods within, but not limited to, the electronics and computer industry. This helps to reduce the demand for mining raw materials in the earth and reducing the carbon foot print generated by such extraction methods and processes.

Be careful!

A final note, be sure to wipe all data from old hard drives/ disks and any removable media that may contain important data. Dumpster diving is still a risk that has the potential for a company’s data to leak, especially when gained from disposed office equipment. This applies to whether the equipment is given away, thrown out (not recommended) or repurposed.

By adopting the practice of reusing IT equipment, this will help make an impact on reducing waste on our landfills.

For more ways to repurpose your IT equipment, contact your local IT professionals.

Read More


teslacrypt1-680x400

A newly discovered ransomware called Teslacrypt is on the loose encrypting victim’s media files. Learn what it is and how to protect against it.

TeslaCrypt will lock up to 185 types of files comprising of data related to the most popular PC games played online. For instance, Assassin’s Creed, BioShock, Call of Duty, Diablo, World of Warcraft and many others are examples of games that have been affected.

The ransom

Once the files have been encrypted, the victims are prompted to pay either $1,000 through PayPal My Cash cards or $500 in Bitcoin to acquire the private encryption key to unlock their files. Criminals will prefer Bitcoin as the preferred method of payment to make them harder to track down. They’ll also use a scarcity tactic by giving those affected three days to pay the ransom.

Risk and vulnerability

According to Vadim Kotov from security firm Bromium, the vulnerability for this attack exists within Opera and Internet Explorer web browsers that visit compromised sites such as WordPress based websites. However it was Fabian Wosar from Emsisoft, an Austrian based security firm, who had discovered TeslaCrypt.

Reports show that a malicious video using Adobe Flash would play on the compromised website, which then redirects the user to a number of dodgy sites until it finally lands into its intended destination- a bundle of malware. This bundle is considered to be an exploit kit, dubbed “Angler”.

Angler plays a part towards helping computers become infected with TeslaCrypt Angler’s mission is to launch a relentless number of attacks whilst the user browses through the malicious sites with the hopes of one of them leading to its goal- to infect the system.

Once Angler gets onto a system it’ll check for two things:

  • One is to verify whether the machine is a physical or a virtual one. Virtual machines are likely to be used by security firms.
  • The second check detects the type of antivirus programs running alongside with the web browser.

adobe flash player hacked

After verifying the two checks, Angler executes attacks based on a recent Adobe Flash vulnerability (that has a patch available since last January) and a slightly older Internet Explorer exploit (security patch released in 2013).  Angler preys on those who do not regularly update and patch their software, therefore it’s crucial to stay on top of updates and patch management.

What files are affected

Teslacrypt will sweep through 185 types of computer files to encrypt them.  Files aren’t only limited to gaming files, it’ll also encrypt all iTunes music in .m4a format, as well as images, video, compressed files and office documents. Once those file are encrypted, they’ll change to  a “.ecc” file extension.

To make things worse for unsuspecting victims, TeslaCrypt then wipes out all of the Windows restore points from the target PC to prevent restoring the files that had just been encrypted from an earlier point in time.

The three most realistic options for victims are:

  • Pay the ransom, although file recovery is not guaranteed
  • Run a full scan with your antivirus to remove it and then restore the locked files from a protected backup drive.
  • A system reformat may be your only choice, counting your losses.

TeslaCrypt can also reach your PC through infected file attachments or a link sent through email. This includes the possibility of unsolicited private messages reaching users from social platforms such as gaming sites, which once executed, can also unravel the attack.

.update

How to stay protected from TeslaCrypt

Zero day vulnerabilities are an ongoing cat and mouse game making it important to have security measures in place. Unaffected backups, staying up to date, and running Anti-Malware can really help save the day with ransomware such as TeslaCrypt.

For more ways to protect your business systems, contact your local IT professionals.

Read More


fast-computer

Computer processor speed helps determine how fast your system performs. We’ll help you answer: does the speed of your computer really matter?

We’ll be providing you with a guide, along with example scenarios for the different processor speeds available today. However, let’s first look at what processor speed is.

What is Processor Speed?

The speed of a processor is measured in hertz, which relates to how many cycles they run per second.  Nowadays processors are measured in Ghz (gigahertz), which means billions of cycles are processed per second.

Not all computers are designed to respond to tasks as quickly as you may be led to believe when a store sales rep tries to sell you a computer. Even with a decent processor, such as a quad core, one needs to be wary of dwarfed speeds that will limit how fast a processor carries out tasks.

It’s no use having a multi core processor that responds to tasks slowly, when one can purchase a cheaper quad core with higher speed capacity. For instance, a 2 Ghz quad core is slower than a 3 Ghz dual core.

Processor Speed Scenarios

website-speed

Below 2.0 Ghz:

Processors with this speed will only manage to cope with basic email and web browsing activities. It’ll also be able to process light document writing. However any other types of demanding software, such as for graphic editing and video creation, will make it struggle and fall flat on its face. Here are some budget systems on Amazon.

2.0-3.0 Ghz:

This range of speed will cope well with web browsing, working with emails, running business programs such as patient management systems and general multi-tasking.  This category works well for the average office computer.

Above 3.0 Ghz:

If you need to run demanding graphic and video systems, then you’ll need to have a computer that comes with a processor of at least this speed. This range is also very good for heavy multi-tasking and creating multimedia such as high resolution graphics and videos.  This category also works well for running many programs, documents, and browser tabs at once.

Having considered all of the above scenarios, a higher speed processor will only work to its potential if it’s supported with enough computer memory. You’ll also need to consider purchasing at least a dual core processor to get speedier and decent PC performance.

For more ways to optimize your business systems systems, contact your local IT professionals.

Read More


WiFi vs Ethernet

Should a wired or wireless connection be used for peripherals? We’ll list the pros and cons of wired and wireless connections to help you decide.

Most peripheral devices, such as printers, scanners and cameras support Wi-Fi connections. While it’s easy to think that Wi-Fi can work in just about any place in the office or home, some considerations need to be noted beforehand to think this through carefully.

In this article we’re going to illustrate the pros and cons of having a device connected over Wi-Fi and over a wired Ethernet connection by comparing their connection speeds, integrity of connection, aesthetics and accessibility for both choices.

Connection speed

VirginMediaSpeedTest
Wireless speeds today are limited at 50-150 Mbps whereas wired ethernet connections can support speeds up to 1000 Mbps. If you’re looking for a speedy connection, a wired connection is your best bet.

Integrity of the connection

Wireless connectivity is subject to interference from other devices which can cause the connection to drop altogether. Even situating a wireless device near a kitchen that uses a microwave can cause interference with wireless connections.

Ethernet cables do not have many of these issues. A wired connection different is jacketed by the protective plastic tubing that envelops the naked wires. These wires assist to direct the connection through the cabling, helping it maintain integrity protecting the data which runs through it. This makes it less likely to lose connections and to be intercepted by wireless scanning tools which are rare but do exist. To get maximum speeds, a Category 5e or Category 6 cabling is highly recommended.

Aesthetics and accessibility

Ethernet-cables

However with wireless, a device can be placed in just about any area that is also in close proximity to a power socket. This gives more options as to where a device can be based around the office. Limiting the amount of wires is also much more visually appealing and is one of the biggest benefits to choosing Wi-Fi.

If you’re still undecided, ask yourself the following questions:

For instance, for a wireless printer, how much use will it get and for how many users? Does it need to be situated in a place without access to an Ethernet socket? Are speed and data integrity more important than a slower network speed connection?

By drawing up the pros and cons of both wireless and Ethernet connections mentioned above, and matching it up the most important requirements, it’ll help you choose a wired or wireless connection

For more ways to optimize network connectivity, contact your local IT professionals.

Read More


intelConfused as to which Intel processor to opt for? We’ll help explain the differences between the Intel Core i-series and give scenarios for their ideal use.

We have previously touched on processor cores and speeds, which will come in handy to have a rough understanding of as we discuss the differences between Intel’s Core-i processor series.  Intel has designed three different processor classes that are designed to cater for various purposes.

First, let’s understand the difference between the three processor classes.

i3 vs i5 vs i7

What may first sound a little misleading are the names of the processor types; the Core i3, Core i5 and Core i7.  It’s easy to think of these processors as having the number of cores reflected in their names i.e. Core i3 with 3 cores or three sets of cores. However in actual fact, the names of these processors do not represent the number of cores each processor carries.

When it comes to cores, the Core i3 is a dual core processor; the Core i5 and Core i7 are dual and quad core processors. Each one of these processors also differs by their cache size and their ability to multi thread.

Only the Core i5 and i7 both have Turbo Boost, which permits the processors to increase their clock speed when needed. This all depends on the availability of cores within the processor, processor temperature, estimated power consumption and current available power.

work2_1__1237470111 (1)

How multi-threading works as shown by Intel.

 

Therefore, the difference between a Core i5 and a Core i7 is mostly distinguished by hyperthreading. Hyperthreading is designed to allow each core in a processor serve more than one thread at a time. Therefore a core i7, with four cores, is able to run a total of 8 threads whereas a Core i5 and Core i7 have both the same threading capacity of 4.

However each Core-i series follows a progressive order with improved caching capabilities. Cache helps processors remember data to speed up data access requests. The Core i3 processors come with 3 MB cache, core i5 generally come with 6MB ( with the exception of the 661 model which only holds 4MB maximum cache), and the higher end Core i7 will comes with 8MB cache.

The general consensus regarding the Core-i series is the higher the series, the better its performance.

Now that we’ve outline the general differences between the three Core-i series of Intel processors, let’s outline a scenario for using each one.

4th generation Intel Core processors Haswell Enhanced graphics

Core-i processor class usage scenarios

Core i3 – this class of processor can be considered entry level, which is designed to cope with basic document work and to help carry out light browsing activities.

Core i5 -this type can be summed up as a mainstream processor that’ll perform well when multitasking with more memory intensive programs, such as with running accounting software, having many documents open and heavier web browsing activities such as having many browser tabs open.

Core i7 – this class of processor is considered high end, which will cost more but will give the best performance. For instance, it’s ideal for editing graphics and video with lots of multi-tasking.

For more ways to optimize your systems, contact your local IT professionals.

Read More