Is my computer secure?
If you have to ask, it probably is not secure. In a study by ThreatFocus.com, an unprotected computer on a DSL or Cable network was attacked over 200 times in just 4 minutes. If your computer has a wireless connection to the Internet, it is even less secure.
What is spyware?
Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers. Also called adware.
What is a virus?
In computer security technology, a virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents (for a complete definition: see below). Thus, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells. Extending the analogy, the insertion of the virus into a program is termed infection, and the infected file (or executable code that is not part of a file) is called a host. In short, a virus is a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer; "a true virus cannot spread to another computer without human assistance"
What is spam?
Spam is unsolicited e-mail on the Internet. From the sender's point-of-view, it's a form of bulk mail, often to a list culled from subscribers to a Usenet discussion group or obtained by companies that specialize in creating e-mail distribution lists. To the receiver, it usually seems like junk e-mail. In general, it's not considered good etiquette to send spam. It's generally equivalent to unsolicited phone marketing calls except that the user pays for part of the message since everyone shares the cost of maintaining the Internet.
An inappropriate attempt to use a mailing list, or USENET or other networked communications facility as if it was a broadcast medium (which it is not) by sending the same message to a large number of people who didn't ask for it. The term probably comes from a famous Monty Python skit which featured the word spam repeated over and over. The term may also have come from someone's low opinion of the food product with the same name, which is generally perceived as a generic content-free waste of resources. (Spam is a registered trademark of Hormel Corporation)
What is the difference between DSL/Cable and T1 internet connections?
DSL (Digital Subscriber Line) is a technology for bringing high-bandwidth information to homes and small businesses over ordinary copper telephone lines. xDSL refers to different variations of DSL, such as ADSL, HDSL, and RADSL. Assuming your home or small business is close enough to a telephone company central office that offers DSL service, you may be able to receive data at rates up to 6.1 megabits (millions of bits) per second, enabling continuous transmission of motion video, audio, and even 3-D effects. More typically, individual connections will provide from 1.544 Mbps to 512 Kbps downstream and about 128
This broadband method uses the local cable TV line to receive (broadband) Internet content at about 1.5 Mbps. This data rate far exceeds that of the prevalent 28.8 and 56 Kbps telephone modems and the up to 128 Kbps of Integrated Services Digital Network (ISDN) and is about the data rate available to subscribers of Digital Subscriber Line (DSL) telephone service."
A dedicated phone connection supporting data rates of 1.544Mbits per second. A T-1 line actually consists of 24individual channels, each of which supports 64Kbits per second. Each 64Kbit/second channel can be configured to carry voice or data traffic. Most telephone companies allow you to buy just some of these individual channels, known as fractional T-1 access. The T1 carrier is the most commonly used digital line in the United States , Canada , and Japan . In these countries, it carries 24 pulse code modulation signals using Time-Division Multiplexing at an overall rate of 1.544 megabit per second. T1 lines use copper wire and span distances within and between major metropolitan areas. A T1 Outstate System has been developed for longer distances between cities.
What is a network?
the term refers to any network of computers which can be used for person to person communication. Included in this are public networks such as the Internet, members online networks such as AOL or CompuServe, and local networks such as the Santa Monica Public Electronic Network. Not included are computer networks whose primary purpose is not interpersonal communication such as bank ATM networks or computer processor power sharing networks.
Does my company need a network?
If you have four or more computers, you know how difficult file management can be. A server allows for a centralized location for files that multiple users can access. Many people can find a work around by setting up a Peer to Peer or P2P network and designating one of the computers as a file share. But as you begin to add printers and domain security, managing a P2P network can become very costly and create workflow issues that even a desktop running server software is unable to solve.
Why do I need a domain?
There is nothing more unprofessional than a business email address @yahoo.com. You can add professionalism to your company by registering a domain for as little as $9.99 a year. It will also allow you to begin to establish an online presence that will grow with your company and keep another company from directly competing with you by taking your company name.
Why do I need a web site?
A web site is the online component of your marketing portfolio. In many situations, an outdated website is worse than no website at all. Frequently, your website is the first impression your business makes with prospective cliental, and unfortunately, it can also be the last. Having a website with current information that is easily navigated will help your customers find you.
What is a database?
A database is a collection of computerized data information that has been systematically organized for easy access and analysis.
What is SQL?
Structured Query Language. An industry-standard language for creating, updating and, querying relational database management systems.
What is the difference between MySQL and MS SQL?
MS SQL Server originated from the enterprise level, Sybase SQL Server, developed for mainframe operating systems, and is scalable for all database needs. MS SQL Server includes all leading database features that collectively provide invaluable advantages over business systems based on inferior platforms. MS SQL Server provides the highest level of data protection and backup, data replication, and transaction processing. MS SQL server includes a Enterprise Manager, a graphical interface providing database and table support (managing triggers, foreign keys, and stored procedures), database security, database replication, database backup, and overall database server monitoring and management. MS SQL Server is backed by Microsoft, one of the world's largest providers of computer software. MS SQL Server is thoroughly documented with integrated Help, Online-Help, and Microsoft Developers Network (MSDN) support.
MySQL Server was designed from the start to work with medium size databases on small computer systems. MySQL Server has consistently lacked critical features needed to deliver a top-tier database development platform, including support for transaction processing, foreign keys, and stored procedures. MySQL does not include a graphical user interface, and is instead administered using a command-line interface.
What is a transaction?
A transaction is a group of logical operations that must all succeed or fail as a group.
What is transaction processing?
Systems dedicated to supporting transaction operations are known as transaction processing systems.
What is a stored procedure?
A stored procedure is a program (or procedure) which is physically stored within a database.
Why should I pay extra for MessageLabs virus protection when Yahoo, AOL, MSN all give free virus protection?
We use MessageLabs email scanning service to provide our customers with the best possible anti-virus and anti-spam protection.
"MessageLabs is the leading provider* of managed email security services for businesses. Operating at Internet level, we offer industry-leading protection for thousands of organizations worldwide, against threats such as spam, viruses and other unwanted content before they reach their networks."
What is FTP?
"FTP" is the acronym for "File Transfer Protocol." It refers to moving data (like a picture, music file (mp3), or any large document) from one computer or server to another. Because of disk space limits, many have trouble sending and receiving large files. Companies like You Send ItT are popularizing FTP solutions, but have time limits for files customers transfer. We provide a password secured FTP sites that are billed based on usage so the less you use, the less you pay!
Why can't I send files through email?
When you send a file as an attachment via email, the file is copied into your Outbox. Then the file is copied into the recipient's Inbox. If you send the file to a few people, multiple copies of the one file are made and replicated into each recipient's Inbox. If the recipient is in the same company as you are, you are then taking one file from your computer and making multiple copies. When this is done with a larger file, the mail server is slowed down by this process and hard disk space is wasted. An FTP site acts as a single central location for transferring and sharing files between different people. This way you don't tie up and slow down your mail server by sending large messages and you don't end up with multiple copies of the same file.
Is the software that the Core Group uses better that the software other people use? Is the hardware that the Core Group uses better that the software other people use?
We only provide accredited business grade solutions to our customers. More often than not, saving a few dollars on third party software or hardware will cost much more in the long run. Budget solutions have less documentation and less effective technical support available. This makes supporting these solutions more costly right from the beginning. We only use Microsoft professional software, HP servers, laptops and desktops, and Cisco routers and firewalls. The extra cost of this equipment saves you thousands of dollars in installation, support, quality and security.
What is Network Design?
Network Design is the process of organizing all the parts of a system of interconnected computers. This includes desktop computers (workstations,) laptop computers, printers, servers, cabling, routers, firewalls, wireless base stations, blackberry cell phones, pda's, and Bluetooth devices like a wireless keyboard or a wireless mouse. We do a fact finding analysis that identifies the client's computing needs. This is used as the basis for designing the client's individual network.
What are Network Services?
Network Services include cabling, adding new computers to a network, adding printers, email configuration, Domain Name services (puts a URL to an IP address), creating and managing domain policy to better control network resources and protect your environment, performance monitoring (usage. Network Services also includes our CORE Care Plan.
What is Network Security Strategy?
Network Security Strategy - We will implement a security strategy that will keep you safe from hackers, viruses and spyware. This includes firewall security, inbound and outbound network traffic from and to the internet, respectively. We lock down services, ports, usernames and passwords. Software solutions include Cisco, Norton Utilities,
What is Network Administration?
Network Administration includes creating users, creating email boxes and space quotas, and managing and creating domain group policy.
What is a Wireless Network?
Wireless Network, LAN (local area network), WAN ("wide area network" is connectivity between remote offices over the internet, dedicated circuits (phone lines leased to a single user by the phone company) or public phone lines), VPN (Virtual Private Network is the process of using hardware and software solutions to encrypt data flowing over the Internet or over dedicated circuits (lease lines) or dial-up so as to protect it from hackers or industrial espionage) and Internet Connectivity(properly connecting to the internet and assuring its security.)