There may be any number of situations within which you would like to know whether or not someone has read an e-mail you have sent them.
We are often asked whether this is possible and the answer is “yes” but with certain common sense limitations. Read More
These days, many of our clients are becoming keener to reuse existing IT kit – especially the computers themselves. Whether this is due primarily to economic and cost cutting measures or to a more green and environmental approach to reducing the use of the planet’s resources is something that might vary from case to case. Read More
Sometimes that second-hand PC, tablet, laptop or server, can seem an irresistible bargain.
Let’s be clear, sometimes buying IT equipment second-hand can be extremely cost-effective. Of course, just as when you’re purchasing anything else that is pre-used, you need to be sure it is in great condition or you run the risk of buying yourself trouble. Read More
We are occasionally asked how we manage to keep our hosting service and related systems secure from outside attack.
We don’t only welcome this type of question but in fact we encourage it because everyone associated with Information Technology, both service providers and customers need to be constantly aware of the need to think about security. Read More
If you are running a PC or system with Windows on it, then usually by holding down CTRL-ALT-DEL at the same time you will be taken into something called the “Windows Task Manager”.
Here at Server Sentry we occasionally get calls asking questions about this piece of software due to the fact that the customer concerned has read that it’s something worth opening up if you are having problems with your PC. In practice though, the situation is rather more complicated and we’d advise against expecting to see immediate easy answers from the Task Manager unless you are relatively IT literate. Read More
“If you have reason to believe that you have an IT virus or that your system is being ‘hacked’, you need to take fast and effective action to protect your interests. A list of recommendations is given below but always contact an expert asap. “ Read More
Leaving aside the horrific thought of an electromagnetic pulse (EMP) from a nuclear explosion, your IT infrastructure probably isn’t massively at risk of total devastation due to electromagnetic radiation.
Even so, many IT system components can be very vulnerable to a number of different forms of what we can crudely here call ‘interference’. Read More
“Just like any other activity involving focusing on something close to your eyes for extended periods of time, working on a computer screen can in some cases lead to eye strain. Here are a few tips that may help to reduce the severity or avoid it altogether. “
One of the oldest and most debated topics in health and safety relating to Information Technology is that of eye strain. Read More