Discus Systems PLC - IT Support Company in Birmingham West midlands
0800 880 3360
 


Posted by Graham Keen on Mon 8th Aug 2011
Unionised HP staff working on the Department for Work and Pensions Adam 2 contract are today starting industrial action over proposals to offshore their jobs to India amid government pressure on IT suppliers to cut costs.
 
Support staff from India set to take over some of the functions next year are due to arrive in Blighty as part of the knowledge transfer before they replace the 200 HP workers from the north-east who will be hit by the shifting work practices.
 
The HPers, members of the Public and Commercial Services Union, recently voted in favour of industrial action short of a strike in response to the cuts from sites including Newcastle, Lytham and Sheffield.
 
"This is a key test of ministers' rhetoric on the economy. They can't simultaneously demand cuts from private contractors and put their faith in them to create jobs," said PCS general secretary Mark Serwotka.
 
"The government should put s stop to this plan to ensure that no jobs are lost and the security of millions of people's personal records is not put at risk," he added.
 
The records of around 25 million people from England and Wales are due to be transferred to Bangalore if the changes in their current form are ratified.
 
The initial plan by PCS members at HP is to disrupt the training process of the Indian staff, work to rule and show no goodwill.
 
The union is questioning the economic advantages of offshoring and commissioning research into the process.
 
Paul Kunert
 
corner spacer corner
 


Posted by Graham Keen on Wed 3rd Aug 2011
The Solicitors Regulation Authority has suspended two lawyers and fined them £20,000 each for sending out thousands of letters accusing people of illegally sharing files.
 
Davenport Lyons partner David Gore and Brian Miller, a former partner at the firm, faced six allegations of breaching the Solicitors' Code of Conduct and were found guilty of all six charges.
The Solicitors' Disciplinary Tribunal heard the two sent out 6,000 letters between 2006 and 2009. The letters demanded compensation and threatened further legal action if money was not paid. The lawyers represented copyright owners.
The SRA release said: "The SDT found, in effect, that Mr Miller and Mr Gore became too concerned about making the scheme profitable for themselves and their firm. Their judgment became distorted and they pursued the scheme regardless of the impact on the people receiving the letters and even of their own clients."
Happily along with a £20,000 fine the two lawyers must pay SRA legal fees of about £150,000 – that's an interim payment while the final bill is worked out.
An SRA spokesman said: "Some of those affected were vulnerable members of the public. There was significant distress ... Solicitors have a duty to act with integrity, independence and in the best interests of their clients. Solicitors who breach those duties can expect to face action by the SRA."
A previous hearing found Gore and Miller had knowingly targeted innocent people when sending out letters based on IP addresses alone. The regulator said the two men knew there were other explanations but went ahead with sending out the letters.
The six proven allegations were that:
• the men allowed their independence to be compromised;
• they failed to act in the best interests of their clients;
• their actions were likely to diminish the trust placed in them and the legal profession by the public;
• they broke the rules on contingency fee agreements; and
• that there was a risk of conflict of interest.
• Finally, the two men were found to have used their position as solicitors to take or attempt to take unfair advantage of other persons.
Davenport Lyons passed the work onto ACS:Law and Andrew Crossley in 2009 when it got sick of the bad publicity.
Crossley was declared bankrupt in June
 
John Oates
 
corner spacer corner
 


Posted by Graham Keen on Wed 3rd Aug 2011
The cries of a drowning woman were missed by headphone-sporting joggers, leaving her to be rescued by a Microsoft worker.
 
Matt Drury, a security guard at Microsoft's Kings Meadow HQ was cycling home along the towpath when heard a woman's gasp followed by a splash.
But the Microsoft man was beaten to the dive by a man called Chris who works for Yell, who leapt into the water first.
Drury also dived in, and with the help of a third man on a boat the woman was dragged to the bank The Reading Post reports.
Drury said: "I was going towards the lock when I heard a gasp and a splash. I turned around and saw it was a woman in the water in distress. She was lying on her back in the water but her head was under water and her legs were sticking up.
"I screamed for help and threw my bike down. Another man jumped straight in and, with the help of another man who was on a riverboat, we pulled her out."
Having thrown up some Thames, she was taken to Royal Berkshire Hospital and will, apparently, make a full recovery.
The joggers, sheathed within their headphones, wear the halo of distortion* so missed the entire thing. But at least they weren't hit by a crashing helicopter as happened to one chap in 2008 who must have had the volume up really loud.
If one's personal stereo is drowning out a helicopter, then the volume is probably up too high, but drowning out a gasp and a splash seems easy enough.
Drury said: “As usual there were joggers on the path. I saw a group of them run straight past her before I got there, but they had their headphones in and they couldn’t hear her.
“They should just keep their headphones in one ear so they can hear what’s happening around them.”
 
Bill Ray
 
corner spacer corner
 


Posted by Graham Keen on Tue 26th Jul 2011
The answer is to identify both current threats and those which are most likely to become the next big blot on the enterprise IT security landscape.
 
Knowledge is power, as they say, so IT Pro asked those on the frontline in the fight against the bad guys to help us compile a top 10 enterprise security threats from Targattacks to IPv6 and advise you on how best to mitigate the accompanying risks.
 
Here are entries one to five, with the second half of the list coming later this week:
 
1. Targattacks
Targattacks, also known as Advanced Persistent Threats (APTs), aren’t really new, but offer a new umbrella term for a group of operators that have a full spectrum of intelligence-gathering.
“These people have proper reconnaissance to determine the best attack vectors,” said Jeff Schmidt, BT global head of business continuity, security and governance. “Meanwhile persistence defines the specific nature of the attack. These are specific and continue until the goal is accomplished rather than being opportunistic”.
To mitigate the risk of falling victim to a Targattack, security evangelist with G Data, Eddy Willems, warns that enterprises need to be careful when choosing a security solution.
It is invaluable to educate users about the risks and how to spot these attacks.
“Due to the human element evident in these targeted attacks, businesses should select a solution that includes behaviour blocking, application control and heuristics," Willems says. "It is also invaluable to educate users about the risks and how to spot these attacks”.
Jay Huff from ArcSight recommended enterprises take a holistic view of what is going on across the network. “In military circles it's called situational awareness” Huff said.
“It’s only by seeing the overall pattern of behaviour that suspicious patterns emerge”.
 
2. Highly Sophisticated Malware
Malware isn’t new, but it remains one of the biggest threats to the enterprise as the bad guys continue to up the stakes and produce some really quite sophisticated exploits in order to gain access to your business data.
Ed Rowley from the M86 Security Labs told us it has seen a “marked increase in sophisticated malware,” which can be spread through Combined Embedded Files. These often go undetected by phishing protection, and one of the methods used is to attach HTML versions of cloned websites to emails rather than linking to those sites directly.
Combined attacks are on the increase, and in the first half of 2011 M86 Security Labs saw numerous targeted attacks using Microsoft Excel files with embedded Flash (.swf) files to exploit vulnerabilities.
This method, used in the targeted attack against RSA, is hard to detect by anti-virus and other security solutions because both components must be separated for analysis. Rowley advised that “enterprises without a proper patch management policy and outdated gateway protection will start to find they are fighting a losing battle” when it comes to blocking such attacks using sophisticated malware methodology.
 
3. SQL Injection
You might have thought that by now SQL code injection techniques as an attack methodology would be dead in the water. After all everyone knows about them and they are old hat, right?
Try telling that to the likes of Heartland Payment Services or the Sony PlayStation Network, both of which fell victim to SQL Injection led attacks.
A code injection technique simply exploits a security vulnerability occurring in the database layer of an application, with malicious code injected (or typed if you prefer) into any open slot such as where a user would enter their login details. That malicious code can then provide access to the administrative part of the enterprise’s website with all that entails.
Don Jackson from the Dell SecureWorks’ Counter Threat Unit Research Team said all enterprises should make use of “input validation for any form to ensure that only the type of input that is expected is accepted.”
Recent high-profile hacking attacks where customer information has been compromised have highlighted the vulnerabilities of today’s online infrastructure.
“It is important to protect the web server on which the web application is running, the database from which the web application is retrieving information, and the operating systems upon which the web servers, applications and database reside,” Jackson warned.
Meanwhile, Jacques Erasmus, director of technical engineering at Webroot said stricter analysis and standards is the way forward.
"The recent high-profile hacking attacks where customer information has been compromised have highlighted the vulnerabilities of today’s online and internet infrastructure," Erasmus told IT Pro.
"Assessing how such attacks have occurred and taking the necessary steps, such as stricter coding standards, would be the best start to mitigate these risks. From here, organisations must analyse which areas are most exposed and take a bespoke approach to rectify this.”
 
4. Distributed Denial of Service (DDoS)
Another old school attack vector is back in the media spotlight courtesy of high-profile politically motivated attacks against large online organisations.
DDoS attacks have never really gone away, but they have undergone something of a resurgence following the whole WikiLeaks affair that seems to have kicked hacktivism back into action.
"The rise in social networking communications and the widespread availability of easy to use hacking tools has attracted a new generation of young hactivists who see themselves as online warriors at liberty to attack those businesses or organisations they see as political enemies,” said Richard Archdeacon, chief technology officer (CTO) for information security in EMEA at HP.
The trouble is that a DDoS attack uses a brute force of network traffic to cause chaos, effectively leveraging legitimate application services, in what has become known as a non-vulnerability or ‘zero-minute’ attack methodology.
“Standard security solutions depend on static signature protection against known exploits and rate-based protection against high-volume attacks and unknown attacks,” warned Ron Meyram from Radware.
“Traditional perimeter security relies on periodic signature updates, leaving the business vulnerable to zero-minute attacks with no solution against non-vulnerability–based attacks. The solution then is to adopt a behavioural based real-time signatures technology including DoS protection, network behaviour analysis, information protection service and a reputation engine."
 
5. IPv6
It may seem odd to include Internet Protocol v6 (IPv6) in a list of enterprise security threats, but bear with us.
IPv6 Day, as 8 June became known, has come and gone with the likes of Google and Facebook now delivering much of their public services over IPv6 networks. The IP address space increases from 32 to 128 bits with IPv6, and random attacks should decrease courtesy of that wider address range making it difficult to assume devices will be associated with any given block of IP addresses.
But with every enterprise eventually having to implement IPv6, security problems will soon enter the equation, according to Sourcefire’s Leon Ward.
“IPv6 creates a whole host of new opportunities for hackers to take advantage of,” Ward warned.
"Much of the current network security infrastructure for IPv4 is not compatible with IPv6 and can sometimes leave a system completely open. As you purchase new devices and update operating systems you will likely find that IPv6 will be enabled by default.”
And the best way to mitigate these risks? “Identifying controls, security solutions and policies that support IPv6 alongside IPv4 is essential to maintaining your organisation’s security requirements” Ward explains.
 
Davey Winder
 
 
corner spacer corner
 


Posted by Graham Keen on Tue 26th Jul 2011
Research in Motion (RIM), the maker of BlackBerry handhelds, has announced a management reorganisation, and the loss of 2,000 jobs.
 
The move, described as a "cost optimisation programme," will bring RIM's worldwide headcount down to around 17,000. The company says that today's announcement follows on from the strategy the company outlined in its full-year results last month.
 
The management changes will see current chief operating officer, Don Morrison, retire. Thorsten Heins, currently COO for products, will expand his role to cover sales. Jim Rowan will become COO, for operations.
 
BlackBerry's chief information officer, Robin Bienfait, will see her remit expand to include the company's Enterprise Business Unit, which looks after the BlackBerry Enterprise Server product line.
 
According to a statement, the moves at RIM are "intended to create greater alignment of the organisation and to streamline RIM’s operations in order to better position the company for future growth and profitability."
 
Falling margins, and a loss of market share to companies including Apple and Samsung have put pressure on RIM.
 
Earlier this month the company was forced by shareholders to set up a committee to review senior management, including a possible split of the co-chair and co-CEO roles held by Jim Balsillie and Mike Lazaridis. The committee will report in January.
 
The company also saw both its turnover and profits squeezed in its last quarter's results and, although shipments of BlackBerry devices increased to 13.2 million units, this fell short of the company's own estimates.
 
In addition, financial analysts have calculated that the average selling price (ASP) for BlackBerry phones, a number RIM no longer releases, also fell.
 
RIM has said it will consult with employees in North America and overseas over job losses. However, the company did not respond to requests from IT Pro for details of any job cuts in Europe.
 
 
Stephen Pritchard
 
corner spacer corner
 


Posted by Graham Keen on Tue 19th Jul 2011
Only two out of five of England’s largest councils can track and report on user activity in real time, a log management firm has found.
 
LogLogic said the fact that only a further two kept related log data for over six months could also potentially compromise their ability to identify and tackle security breaches.
 
The information was solicited from Birmingham, Leeds, Sheffield, Liverpool and Bradford councils as part of Freedom of Information (FoI) Act requests submitted by LogLogic in May 2011.
 
The requests were designed to establish what data management capabilities a number of UK councils had in place to track and record user activity, as a key access requirement of the Government Connect Secure Extranet (GCSx) – a public sector secure private Wide Area Network (WAN) enabling local authorities to share data with central government.
 
“Managing IT data – from collection to storage and being able to report on it in real time – is key to addressing the cornerstones of GCSx,” stated Bill Roth, LogLogic vice president.
 
In England, three of the five largest councils were fully GCSx compliant and the other two said they were still at the implementation stage. Three had implemented log management solutions to help achieve compliance.
Two kept their log data for up to three months, while another kept it for up to six months, despite the fact the recommendation for GCSx compliance is six months plus.
 
On a more positive note, all five carried out annual compliance audits and three of the five councils reported they had received extra funding for GCSx.
 
By comparison, all five of Wales’s largest councils were GSCx compliant, and four out of five had implemented log management to assist with tracking and audit in real time, as well as carrying out annual audits. But four out of five received no funding to achieve compliance.
 
“They were let down (the English authorities particularly) on being able to track and record in real time, which is essential for monitoring and preventing sensitive data from leaking out of the Government Connect Secure Extranet,” Roth said.
 
“Storing logs for the recommended six months-plus time period is also critical for compliance and a surprising number fell short of that measure.”
 
Bob Tarzey, director of IT analyst Quocirca, agreed user activity logs were an important part of the insight needed to report on activity around IT usage.
 
“Much of that information is of little use if it cannot be linked to users,” he told IT Pro.
 
“It is encouraging that standards are in place and that some councils are adopting them. They are as likely a target for hacking as any other organisation, either for politically motivated reasons (but less so then central government) or commercial ones, as councils store potentially useful personal data on citizens.”
 
Several Scottish and Northern Irish councils refused to answer LogLogic’s FoI requests on the grounds of national security.
 
Miya Knights
 
 
corner spacer corner
 


Posted by Graham Keen on Tue 19th Jul 2011
Cisco Systems has announced it will cut about 14 per cent of its global workforce, or about 11,500 employees, as part of a widely expected reorganisation.
 
The network gear maker expects to save $1bn a year by eliminating 6,500 jobs, including 2,100 employees who opted to participate in an early retirement programme. The cuts, which were greater than the rumoured figure circulating last week, include a 15 per cent reduction in employees at the vice president level or higher, the company said.
 
The San Jose, California-based company also plans to eliminate about 5,000 jobs by selling its set-top box manufacturing facility in Juarez, Mexico to Foxconn. Cisco said employees at the Mexico plant would become Foxconn employees in the first quarter of 2012 and that no job cuts were expected at the facility as a result of the sale.
 
Steven Musil
 
corner spacer corner
 


Posted by Graham Keen on Wed 13th Jul 2011

 

 

 

The Discus Diviner

July 2011 

 

Welcome to the July edition of The Discus Diviner.

 

This month, we're giving you the chance to win a Kindle 3G. 

 

"Kindle is Amazon.com's No.1 bestselling item for two years running. It's the most-wished-for, most-gifted and has the most 5-star reviews of any product on Amazon.com."

All you have to do to be in with a chance of winning is to click here and complete a short survey.

 

The IT Support Guy finds himself at Villa Park (he's a Blues fan)  and David will answer a question we are often asked, 'Where are the Sage company files on Windows XP/2000/Vista/7?'   

 

 

 

The IT Support Guy

  

This is one call Victor doesn't fancy making, but he has no choice in the matter. Derek is off ill, his arm in plaster after armwrestling his twelve-year old daughter.

 

He looks up at the imposing brown brick facade of Villa Park and his sphincter twitches. This is it. The home of the enemy. He drags his feet up two flights of steps from Witton Road, turns right and climbs three more flights to where a security man waits, head like a block of granite on a body the size of Star City.  

'You the computer bloke?' growls The Hulk.

Victor nods.

'Follow me.' The Hulk turns and squeezes through the building's double doors.

This isn't the first time Victor has been here. The last time was four seasons ago, when Villa gave the Blues a right drubbing  (5-1). He won't ever forget that match. A minor disagreement with a Villa fan in a curry house ended with a rolled chapatti up Victor's nostril and a Lamb Tikka Shashlik Massalla inside his shirt.

'In 'ere.' The Hulk stops beside a door marked IT Department and scowls at him.

As Victor edges past him he feels the weight of a small boulder on his shoulder. 'You a Villa fan?'

Victor gulps, sweat bubbles on his forehead. 'Course.'

An overpowering smell of halitosis makes Victor's eyes water as the giant brings his face to within inches of his.

'Baggies man, meself.' He grins, teeth like  tombstones in a ghost town and then winks. 'Might meet you again sometime.'

 

It's the fastest migration to a Blackberry Enterprise server that Victor has ever done.

Head down, he scuttles down the steps and across Witton Road. Glancing up at Villa Park, he sees the security man watching him from the top of the steps.

The Hulk smiles, waggles his fingers in goodbye, and then blows him a kiss.

 

NEXT MONTH: Victor goes VOIP

 

 

 

 

Bigwood Merger 

  

Discus customer Bigwood, which has a 160-year Birmingham heritage, has merged with Curry & Partners, another Birmingham firm of chartered surveyors and property management consultants, to create what is believed to be the largest independent agency in the Midlands.

 

The new business will be known as CP Bigwood and the merger has created an £8 million fee income business with 125 staff.

 

 

 

 

Sage company files on Windows XP/2000/Vista/7

 

The default data paths have changed in Sage 2008 and 2009. They are now set depending on the OS.

In pre Sage 2008 versions, the Company file was in the Sage Program Folder. The actual data would be in a subfolder of the Program Folder i.e.

C:\Program Files\Sage 2007\Accounts

Post Sage 2008 locations;

Sage 2008 company file 

  • Windows XP Sage 2008 Company File Location > C:\Documents and Settings\All Users\Application Data\Sage\Accounts\2008\ (Note this folder is hidden (application data) by default in Windows... Go to Tools>Folder Options> View > Hidden Files & Folders > "Show hidden files and folders"
  • Windows Vista Sage 2008 Company File Location > C:\ProgramData\Sage\Accounts\2008 (Note this folder is hidden (application data) by default in Windows... Go to Tools>Folder Options> View > Hidden Files & Folders > "Show hidden files and folders"
  • Windows 7 Sage 2008 Company File Location > C:\ProgramData\Sage\Accounts\2008 (Note this folder is hidden (application data) by default in Windows... Go to Tools>Folder Options> View > Hidden Files & Folders > "Show hidden files and folders"  

Sage 2009 company file

  • Windows XP Sage 2009 Company File Location > C:\Documents and Settings\All Users\Application Data\Sage\Accounts\2009\ (Note this folder is hidden (application data) by default in Windows... Go to Tools>Folder Options> View > Hidden Files & Folders > "Show hidden files and folders"
  • Windows Vista Sage 2009 Company File Location > C:\ProgramData\Sage\Accounts\2009 (Note this folder is hidden (application data) by default in Windows... Go to Tools>Folder Options> View > Hidden Files & Folders > "Show hidden files and folders"
  • Windows 7 Sage 2009 Company File Location > C:\ProgramData\Sage\Accounts\2009 (Note this folder is hidden (application data) by default in Windows... Go to Tools>Folder Options> View > Hidden Files & Folders > "Show hidden files and folders" 

Sage 2010 company file

  • Windows XP Sage 2010 Company File Location > C:\Documents and Settings\All Users\Application Data\Sage\Accounts\2010\ (Note this folder is hidden (application data) by default in Windows... Go to Tools>Folder Options> View > Hidden Files & Folders > "Show hidden files and folders"
  • Windows Vista Sage 2010 Company File Location > C:\ProgramData\Sage\Accounts\2010 (Note this folder is hidden (application data) by default in Windows... Go to Tools>Folder Options> View > Hidden Files & Folders > "Show hidden files and folders"
  • Windows 7 Sage 2010 Company File Location > C:\ProgramData\Sage\Accounts\2010 (Note this folder is hidden (application data) by default in Windows... Go to Tools>Folder Options> View > Hidden Files & Folders > "Show hidden files and folders" 

Sage 2011 company file

  • Windows XP Sage 2011 Company File Location > C:\Documents and Settings\All Users\Application Data\Sage\Accounts\2011\ (Note this folder is hidden (application data) by default in Windows... Go to Tools>Folder Options> View > Hidden Files & Folders > "Show hidden files and folders" 
  • Windows Vista Sage 2011 Company File Location > C:\ProgramData\Sage\Accounts\2011 (Note this folder is hidden (application data) by default in Windows... Go to Tools>Folder Options> View > Hidden Files & Folders > "Show hidden files and folders"
  • Windows 7 Sage 2011 Company File Location > C:\ProgramData\Sage\Accounts\2011 (Note this folder is hidden (application data) by default in Windows... Go to Tools>Folder Options> View > Hidden Files & Folders > "Show hidden files and folders"

Sage uses a COMPANY file with no file extensions to reference data paths for your sage folders e.g. G:\COMPANY.001

 

 

 

6th October 2011: An Historic Date for the Legal Profession? 

On that date, the first alternative business structures (ABS) will be able to open for business in the legal services marketplace in England and Wales. For the first time, non-lawyers will be able to fully own and invest in law firms.

Consumers should benefit through increased competition, new services and the integration of the delivery of legal services with other related services.

But will solicitors?

In a profession where time has a direct relationship to income, consumers will look to scrutinize the costs they are being charged. Cost pressures will drive firms and, for the first time, many will need to market and promote themselves.

All very well. But what has this to do with Discus?

 

Discus has long had  relationships with solicitors in the Birmingham area and we thought about how we might assist our existing and potential legal customers to face their new challenges.

 Two things struck us:

1. How could solicitors easily prove time spent on the phone, if asked?

2. How could they dramatically reduce their annual telephony costs?

By utilising Discus System's hosted IP telephony that's how!

For further information email u2us@discus.co.uk  or for an informal discussion contact Terry or Martyn on 0800 880 3360

 

 

 

Discus Systems: 'Flying Start'  

  

Moving office? Newly incorporated? Expanding premises? Keen to minimise capital expenditure?

 

Why not take advantage of Flying  Start, another of Discus Systems' innovative service offerings?  Flying  Start can be delivered in a number of ways depending on customer requirements, ranging from an entirely hosted service to an entirely on-site installation.

 

Flying Start elements are:

 Communications:

Cabling

Cabinet

Ethernet switch

ADSL

Router

Firewall

 

Telephony:

VOIP phones

Mobiles

 

Hardware

Server

PCs

Printer

 

Software

MS Small Business Server

MS Office

Spam filter

Anti virus/malware

 

The customer only needs to select those elemets he requires and specify how he wants the service to be delivered. 

 

One stop shopping, one supplier to deal with.

 

For further information email u2us@discus.co.uk  or for an informal discussion contact Terry or Martyn on 0800 880 3360

  

 

 

 

 

Thank you for reading July's issue of The Discus Diviner.

 

Please do not hesitate to contact me should you have any comments or criticisms.

 

Sincerely,

 

   

 

 

Terry Biddulph

Managing Director

Discus Systems plc 

In This Issue

The IT Support Guy

Bigwood merges with Curry & Partners

Sage company files on Windows XP/2000/Vista/7

6th October 2011: An Historic Date for the Legal Profession

Moving office? Newly incorporated? Expanding premises?

Damien's Tips 'n Tricks

The Hampton Joker

 

 

 

Quick Links

  

Back Issues:

  

  

  

 

 

Damien's Tips 'n Tricks 

Keyboard Tricks in MS Word:  

1. Remove all those hyperlinks

Instead of removing hyperlinks one by one, you can try this method, which only consist of two steps, but will remove all hyper links in one go.

Press Ctrl+A, which will highlight the entire text

Then Press Ctrl+Shift+F9 (or Ctrl+6), and you will see all links disappearing within seconds!

*******************

2. Get back to where you were

 For the times when you don't remember exactly where you left off, the Shift+F5 combination will save you quite a bit of time. Hit both keys at the same time (as with all the combinations mentioned in these tips) and Word will automatically place your cursor where you last left off.

*******************

3. Switch between text case: Highlight a portion of text and use the Shift+F3 combination to switch between text case. Word will toggle through sentence case, upper case, and lower case.

*******************

4. Switch to small caps: Use Control+Shift+K to switch highlighted text to small caps.

*******************

 

The Hampton Joker 

The Joker: "I'm looking at the back of the system, and I don't know where to plug in the mouse. There are two holes that are the same size as the mouse."
Tech Support: "Ok, what color is the tip of the mouse plug?"
The Joker: "Orange."
Tech Support: "Do you see the orange 'hole' on the back of the computer?"

The Joker: "Yes."
Tech Support: "That is where the mouse plugs into."

The Joker: "Oh. How about the keyboard?"

Tech Support: "What color is the plug on the keyboard?" 

The Joker: "Purple."
Tech Support: "And do you see the purple 'hole' on the back of the computer?"

The Joker: "Yes."
Tech Support: "That is where the keyboard plugs in. The tips are color coded."
The Joker: "I see. How about the speakers?"

 

 ***************** 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Discus Systems -  solving computer problems throughout the West Midlands,

covering Birmingham, Coventry, Solihull, Sutton Coldfield, Lichfield, Tamworth,

Wolverhampton, Dudley, Bromsgrove and Redditch.

 

 

This email was sent to pchiswick@discus.co.uk by terry@discus.co.uk |  

Discus Systems plc | Patrick Farm Barns | Solihull | B92 0LT | United Kingdom



Discus Systems plc

Check out our new website! - http://www.discus.co.uk

Tel +44 (0)845 4 300 366 Fax +44 (0)845 4 300 368

This message contains confidential information and is intended only for the named recipient. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately if you have received this e-mail by mistake and delete this e-mail from your system. Finally, the recipient should check this email and any attachments for the presence of viruses. The company accepts no liability for any damage caused by any virus transmitted by this email.
Any views or opinions presented in this email are solely those of the author and do not necessarily represent those of the company. Employees of the company are expressly required not to make defamatory statements and not to infringe or authorize any infringement of copyright or any other legal right by email communications. Any such communication is contrary to company policy and outside the scope of the employment of the individual concerned. The company will not accept any liability in respect of such communication, and the employee responsible will be personally liable for any damages or other liability arising.

Discus Systems plc is a company registered in England and Wales with company number 3449736

Registered Office: 70 Upper St Johns Street - Lichfield - Staffs - WS14 9DS - VAT Reg No: GB 705 3695 32

 
corner spacer corner
 


Posted by Graham Keen on Wed 13th Jul 2011
This is one call Victor doesn't fancy making, but he has no choice in the matter. Derek is off ill, his arm in plaster after armwrestling his twelve-year old daughter.
 
He looks up at the imposing brown brick facade of Villa Park and his sphincter twitches. This is it. The home of the enemy. He drags his feet up two flights of steps from Witton Road, turns right and climbs three more flights to where a security man waits, head like a block of granite on a body the size of Star City.
'You the computer bloke?' growls The Hulk.
Victor nods.
'Follow me.' The Hulk turns and squeezes through the building's double doors.
This isn't the first time Victor has been here. The last time was four seasons ago, when Villa gave the Blues a right drubbing (5-1). He won't ever forget that match. A minor disagreement with a Villa fan in a curry house ended with a rolled chapatti up Victor's nostril and a Lamb Tikka Shashlik Massalla inside his shirt.
'In 'ere.' The Hulk stops beside a door marked IT Department and scowls at him.
As Victor edges past him he feels the weight of a small boulder on his shoulder. 'You a Villa fan?'
Victor gulps, sweat bubbles on his forehead. 'Course.'
An overpowering smell of halitosis makes Victor's eyes water as the giant brings his face to within inches of his.
'Baggies man, meself.' He grins, teeth like tombstones in a ghost town and then winks. 'Might meet you again sometime.'
 
It's the fastest migration to a Blackberry Enterprise server that Victor has ever done.
Head down, he scuttles down the steps and across Witton Road. Glancing up at Villa Park, he sees the security man watching him from the top of the steps.
The Hulk smiles, waggles his fingers in goodbye, and then blows him a kiss.
 
 
corner spacer corner
 


Posted by Graham Keen on Tue 12th Jul 2011
Three men have been jailed for luring British and Irish bank customers into a phishing scam that police believe netted more than £3m for a criminal gang.
 
Vincent Alonge, Babatunde Fafore and Ayodeji John Kareem received sentences at Snaresbrook Crown Court on Monday for masterminding and carrying out the phishing operation, after pleading guilty to conspiracy to defraud and other charges.
 
"It's the first prosecution in the UK of a very detailed, organised phishing operation," Charlie McMurdie, the head of the Metropolitan Police's Central eCrime Unit (PCeU), told ZDNet UK. "It was an end-to-end job."
 
Normally in the black internet economy, criminals specialise in a certain part of an operation. For example, they may focus on the harvesting of sensitive details, which they then sell on to other criminals, rather than using the data to directly commit fraud. However, Kareem, Fafore and Alonge were involved in an operation that included all stages of a fraud.
 
They were part of a criminal network that systematically harvested online bank account details, credit and debit card numbers, and other data. The gang sent out email spam to lure bank customers to fake bank websites, where the victims were tricked into handing over their personal information.
 
The gang then used this information to carry out financial fraud, such as unauthorised bank transfers and credit card transactions. Around 10,000 credit cards and 900 bank accounts were compromised, according to McMurdie.
 
"This was a sophisticated, concerted attack on UK and international banking systems," she said.
The three men successfully used over 1,400 compromised credit cards to steal money, and the police have traced over £570,000 in provable losses, the PCeU said in a statement on Monday. However, the PCeU estimates that total losses from the stolen credit cards add up to more than £3.1m.
 
The trial followed the arrest in August of six people in the UK and Ireland, as part of raids arising from Operation Dynamophone. The PCeU worked with the Irish Garda Síochána Fraud Investigation Bureau on the investigation. The other three people detained were released.
 
Police traced the three scammers through their bogus emails and websites, according to Crown Prosecution Service reviewing lawyer David Levy.
 
"These men profited enormously by taking advantage of the trust that many of us would place in an internet service that appeared genuine, but their enjoyment of their ill-gotten gains was short-lived," Levy said in the PCeU statement. "The bogus emails and websites that led victims into the scam also led the authorities to the scammers."
 
Kareem pleaded guilty on 12 May at Southwark Crown Court to one count of conspiracy to defraud, and one count of conspiracy to acquire and use criminal property. He was given one prison sentence of five years, five months, and another of three-and-a-half years, to run concurrently.
 
Farfore received concurrent prison terms of five years, seven months and four years, after pleading guilty to the same crimes as Kareem on 20 April at Southwark Crown Court.
 
Alonge pleaded guilty to having "articles for use in fraud", and was sentenced to two years in prison. Alonge received a concurrent sentence of six months for having false identity papers.
 
Tom Espiner
 
corner spacer corner

Veeam Specialist Microsoft Small Business Specialists Birmingham Microsoft Gold Certified Partner Birmingham Siemens Solution 1 Reseller Birmingham Sonicwall Specialists Birmingham Business Link Approved Birmingham Fujitsu Primergy Certified Partner Birmingham Facebook Follow us on Twitter ESET NOD32 VMWare
IT Support
IT Services
IT Solutions
Get Support Now
Sitemap
© 2019 Discus Systems plc. All rights reserved. Content Management by Verve Digital