Hello everyone, today i will be discussing Bit coins. Some of you may already know of Bit Coins but the large majority will never have heard of it. So I will be explaining to you what they are, how you obtain them and what you can use them for. What are Bitcoins? Bit Coins are an online currency (also know as e-cash) that was created in January 2009 by Satoshi Nakamoto. Satoshi is a cryptographer who came up with the Bit Coin Protocol. Bit coins are similar to that of local currency (such as that of town’s that have their own currency that you use in local shops) in the sense that the worth of the Bit Coin is decided by the online community. The worth of the Bit Coin will fluctuate depending on the amount and size of transactions though, unlike national currencies, the value of the bit coin can quickly recover. At the time of typing this, 1 Bitcoin (BTC) is equal to £8.239GBP or $13.32USD. Bit Coins come in 3 varieties: You have the Bitcoin (1), the Bitcent (0.01) and the Satoshi (0.00000001). All of these can be earned and traded over the internet like normal currency. These will be kept in your Bitcoin wallet on your computer. These wallets have their own, unique address (like a bank account number) that will be used to make transactions. The worth of the Bit Coin will fluctuate depending on the amount and size of transactions though, unlike national currencies, the value of the bit coin can quickly recover. How does it Work? Like all currencies, Bitcoin relies on the communities trust in the exchange for it to have value. By the community having trust in Bitcoin people will use, buy and sell Bitcoin. if no-one has trust in Bitcoin then no-one will use it. Unlike normal currencies, Bitcoin doesn’t have a centralized body that issues Bitcoins. Instead, Bitcoins are rewarded to “Miners” whom then sell their Bitcoins onto the community. The miners themselves are individual’s that are all connected to the Bitcoin network who either work by themselves or in groups (this will be discussed later). The number of bitcoins that can be “mined” is set at 21 million (at time of writing there are currently 11 million Bitcoins in circulation). Once 21 million Bitcoins have been mined no more will be created. This is outlined by the protocol that Satoshi came up with. By people abiding by the protocol and trusting in the currency is what gives Bitcoins their worth and makes the system work. In order to make counterfeiting impossible, all the transactions are stored on an online database called the block chain. The block chain is formed of blocks. Blocks are list of all the transactions that took place in the space of 10 minutes. Once that 10 minutes is up the block is added to the block chain and a new block is started. Once 6 blocks are put on top of each other the block chain the consensus solidifies so it becomes impractical to alter the transactions for your own gain. These blocks must meet constraints, dictated by the network, before they are added to the block chain. This mean that it is very hard for a person to cheat the system. How do you Obtain BitCoin’s? You can obtain BitCoins in 3 ways: exchanging for actual currency, trading and mining. Exchanging for actual money is used to get you started in the Bitcoin exchange. Once you have some bitcoins you can start trading with others in the community such in the same way city traders do. You can buy and sell Bitcoins and then exchange them for real currencies. If you own a business you can join the 1000 merchants signed up to Bitcoins and start trading your good’s for Bitcoins. The main method for obtaining Bitcoins is Mining. This is the process of finding a solution to a difficult Proof-Of-Work problem which confirms transactions and prevents double spending. This would be done by a node (a graphics card) on a dedicated server (it has to be dedicated as it requires a lot of electricity). These transactions are put into files called blocks every 10 minutes and then added to the block chain (an online public database that has contains a list of all the transactions). The block chain is only allowed to accept 1 block per 10 minutes. This block must meet stringent constraints dictated by the network. If the block hasn’t formed into the form it should then the block chain will reject it. The one block that gets accepted onto the Block chain will get it’s owner 50 Bitcoins as a reward for the work they’ve done. The downside to mining is the time, effort and resources it takes to get the reward. Mining uses a lot of electricity, data and takes place on Graphics Cards so it can be impractical cost money for the individual miner. For this reason, some miners pool their resources together and then split the reward they get depending on the work they’ve done. The only downside to this is you have to give up some of the reward you get but it can be beneficial in the long run. I hope this has given you a better understanding into the world of Bitcoins. Thank you for reading!

Sometimes with PC’s you will get a problem that only wiping the computer clean will fix. Traditionally you’d need your Windows (or whatever operating system you’re using) CD and do a CD boot along with a clean install. However, what if you don’t have the disk? Well with laptops they have the ability to reset to factory settings. So basically, what will happen is the laptop will wipe everything off of the hard drive that you are using and then will reinstall the operating system and applications it came with out of the box. To do a factory reset of your laptop, follow these steps: 1) Do a back up Before you do a factory reset remember to do a backup of all the document’s that you want to keep. Nothing will be spared from your clean wipe of the hard drive so back it up to and external hard drive. If you are doing a factory reset of your laptop due to a virus then be careful of the fact that the virus may be attached to your backed up documents and settings so make sure that you scan and destroy the virus before you restore your settings. 2) Find out which F key it is that you press during the computer boot to start the factory reset To do your factory reset you have to press a certain F key, when the laptop boot’s up, to start the factory reset. This varies from the different brand and model of laptop, an example being that for the Sony VAIO line of laptops you have to hold down alt+F10 during boot to start up the factory reset process. So before you start your factory reset, do some research on the make and model of the laptop to find out what you need to press. 3) Obtain the key for the Operating system that originally came with the Laptop All paid for operating systems require an activation code to activate your operating system. A number of times the operating system action code is on the laptop itself. This can be found off the bottom of the laptop. If it isn’t there then check the box or manual that came with it to see if it is there. 4) Start the Factory Reset Now that you know your activation code and the F key combination to start up the factory reset and that you’ve done a back up of your documents and setting then you are ready to do a factory reset. First things first, restart your laptop. When its booting up press the F key combination. This should bring up the system recovery console. Choose to do a full system wipe: this will wipe all the data from the hard drive you are using. Click next and it will start the process. Once it’s finished wiping the hard drive the laptop will then start to reinstall the operating system. Install the operating system and once you are finished with that then it will restart and ask to install the applications. Reinstall those as well. Once the OS and the applications are installed then you have successfully done a factory reset on your laptop! Now all that is left to do is update the operating system, install anti-virus software and then restore your backup. I hope this has helped you.

Hello, today I will taking you through the steps of how to setup a POP and IMAP email account on Outlook. When it comes to manually setting up an email account, you have 2 options (depending on where your exchange is). The first is to point outlook to a Microsoft exchange server or an equivalent. You would use this if you run your email off Office 365 or an exchange server provider. The other would be to point outlook to a SMTP and POP server. You would use this is you have your own email servers setup with POP and SMTP. Before you setup your POP email address you will need your email address, password and the Domain Name’s of the POP and SMTP servers.

  1. To add the email account go to Outlook and click File > Info >Add account. This will start up the account wizard immediately. Alternatively you can add an email address by going to start > control Panel > mail. Once you’re on Mail you can wither click on Email accounts which will take you to the account setting of default profile or, if you wish to add the email account into a different profile, click on “Show profiles” and then select to profile in which you wish to add the email account into. This will then take you in Account Setting panel as well. Once in the Accounts Settings panel click on the “New..” button in the top left hand corner to start the “Add New Account” wizard.
  2. Once you’re on the “Add new Account Wizard” click “Manually configure server settings or additional server types” and click next. Then choose “Internet Email” to and click next.
  3. Once in the “Internet Email Settings” panel you can start filling in the information. In the “server Information” section, choose whether the server is uses POP3 or IMAP and then enter the server Domain name. This would likely be along the lines on “mail.example.com”. Fill in your server login in details and click “Test Account Settings..” to make sure you have a connection to the server and that you can login into it.
  4. Once you’ve established a connection with the server click “More Settings”. In the General tab fill in the reply email section. This is usually the same as your email address. If you are using an internet service providers SMTP server go to the “Outgoing Server” and tick “My outgoing server (SMTP) requires authentication”. Click on the advanced tab to check the ports are set to 110 and 25. Once done click OK and then next. Your POP email address should now be setup.

Thank you for reading.

Printing is an age old technology that has revolutionized industry over the ages. From the old press printers that were used a couple of centurys ago, to the modern day laser printer: using such technology has allowed us to create and distribute books, newspapers, posters and photographs to the masses. However, the main limitation of printing is that it can only be done in 2D, which limits it to only printing images and text onto thin materials i.e. paper, card etc. This is where 3D printers come in. 3D printing is a relatively new technology that allows you to create 3D objects from the comfort of your desk chair. How It Works There are different techniques of creating an item using a 3D printer, but they all follow the same basic principle: using a liquid material, you build up layers into the created model. So what will happen is the 3D model that has been created on your computer will be broken down into different thickness layers. The printer, using the chosen material, will start from the bottom and will gradually build upon layer after layer until you get your model. This mean’s you can create a model, albeit a small one, of anything. Uses In Industry This technology is currently in use in the industry and is used in many areas. Architects, designers and engineers can use it to create scale models of products, from homes to toys, in very quick time. However the hope is to use 3D printers for mass production. The 3D printer could, theoretically, create components for products in quick time to be taken away for assembly. All you would need to do is create the schematics for the product on a computer, choose what material you wish to create it with and then click print. This can revolutionize any manufacturing, or even repairing, industry out there. For example, a customers car is broken due to a faulty part that needs replacing. Conventionally, you will have to either stock or order in the part that needs replacing. However, with a 3D printer you can easily create the part and have the car fixed in less time. Uses In The Home Even with its advances in technology, 3D printers are still rather expensive pieces of kit. However they are still available for people to buy and use at home. Currently they are used by hobbyists to create whatever they can think of but scientists are thinking of ways they can intergrate 3D printers in the home. Scientists are currently working on a 3D printer that can create food. What you do is put in the canisters of the ingredients to wish to use, like ink catridges in a printer, and then tell the printer what you want it to make. You can decide how hot the food is, how crispy it is and even the texture of the food. This could potentially change our health habits with what we eat. For example, today you buy a ready meal, put it in either the microwave or the oven and then eat it once its cooked, which involves minimal input to what the food contains nutrionally. However, with a 3D printer you can, potentially, decide on the the nutrient, salt and fat content the food has which could essentially affect our health for the better. What is so interesting about a 3D printer is the possibilities for creation. From a scientific point of view, everything is made of layers of particles. So in that sense, with the correct building materials in the printer you can create anything that can come to mind in less time than it would to create with your hands.

Hello everyone. Today I will be talking about how to turn off Add-Ins in Microsoft Office. Add-ins are software that is added into Microsoft Office applications to, usually, allow them to work in conjunction with other applications. An example of this would be a database application that contains customer details and has letter templates. When you click on the letter template the template will open up as a document in Word. This is due to the add-in that would have been automatically installed on Office when the application has been installed. This allows for better integration amongst numerous applications.

However, sometimes these add-ins from 3rd party software can cause issue’s with office. On occasion I have seen them have effects on Office applications that cause Office to either not work the way it should or not work at all. in these instances, you should disable the add-ins one at a time to determine if any of them are causing the issues. To do this you need to:

  1. In the affected Office application, go to File and then click on Options. This located on the left hand side between Help and Exit
  2. Once in the options control panel, click on the add-In’s tab. This is located on the lower left hand side of the control panel
  3. The Add-in’s Panel will display all the Add-ins that are active, inactive, document related and disabled. At the bottom is a drop down list of Add-ins to manage. Choose “COM Add-Ins” and then click “Go…”.
  4. You should now has a list of all the COM add-ins. If they have a tick next to them then they are active. If they don’t then they are inactive. To deactivate the ad-in just un-tick the box next to a particular add-ins and press ok. You can also remove or add add-ins in this panel.

If you can’t even do that (I have had an instance when an add-in had not allowed access to file tab to I couldn’t access the options) then you should start up the Office application in safe mode. To do this click on start and type in the search bar the name of the application followed by “/safe”. This will start up the application with all add-ins disabled and will allow to try try and (hopefully) find what is wrong with Office and fix it.

I hop ethis has helped you. Thanks for reading!

09 Feb 2015

Cloud Security

Cloud Security can be complex to understand. The best way to think about it is as you would about a safe. There are varying different products which range from something that will open if you drop it, up to a bank vault. There are many different types of cloud services. For example these range from consumer services such as Google Drive/Apps and Dropbox, to business solutions such as hosted desktops and infrastructure as a service. A large risk companies have at the moment is if staff starts to use the consumer services for businesses purposes as the company will then lose all control over the data held in these services and it will become a huge security risk. This is normally caused by companies failing to keep up with the new technologies available which allow members of staff to work in the most efficient way. In order to discuss Cloud security I will talk about the general areas which affect cloud services and some ways to mitigate the risk. The Wikipedia article on Cloud security (http://en.wikipedia.org/wiki/Cloud_computing_security) breaks down the risks of Cloud Security into the following sections which I will discuss. Identity management: The first issue that arises from cloud services is Identity management. This will normally entail how usernames and passwords are controlled. There are many options on how to implement this between your organization and a cloud service. A good cloud provider should work with you on implementing how this will work. However they should only ever implement something as secure, if not more secure than what is currently being used. A simple thing to look out for will be what their password requirements are. If they allow you to have password of password1 it is unlikely the rest of their system will be very secure. Physical and personnel security: The next issue of security is how secure their hardware is where your data will be stored. The best way to find this out is to ask for a visit to see the provider’s system where your data will be held. You should look for things like a secure fence around the building. Expect to have to go through security checkpoints provide ID and be escorted around the building at all times. Ask yourself the question how easy would it be for someone to break in and access the systems if they had malicious intent. On top of this the people who have access to the systems should be limited and documented so it is known who has access and when they have. It is also important to know where your data is being held to be compliant with things such as the data protection act. There are many companies which will store your data all over the world in order to reduce costs. Availability: Any cloud provider should be able to guarantee a certain level of availability to your systems in a secure way. The best way to ensure this is to make sure you have an approved SLA (Service Level Agreement) in your contract with the provider and ensure that if it is not met there are penalties for the provider. A service level agreement is a document used to define the level of uptime, how long support requests should take to be answered/completed and various other things which define the quality of service expected. Application security: Application security is very important in a cloud environment. A cloud provider should work with you on rolling out any software that is required to your environment. This should go through testing and be approved by the provider before being rolled out. A cloud provider should work with you on application deployment and should in some situations tell you no this application cannot be deployed. Of course they should then work with you on finding an alternative piece of software which is secure. Privacy: This involves how access to your private data is controlled. This can be credit card details or passwords. The best way I have found to test this is to say you have forgotten your password. If they are able to tell you what your password is then their system is not secure. A forgotten password should always be reset to a new one. This is because there should never be a way to find out what someone’s password is. Passwords should always be stored with one way encryption so should not be able to be found out. Another warning sign is if they ask you for your password when providing support. A good provider will never ask for your password, but reset it to something while they need access and get you to change it as soon as they are finished. Business continuity and data recovery: This is the process which a cloud provider should have in place in the event that a disaster happens. The process should be documented with times until the system is back up and running documented. It should be tested regularly, a minimum of once every 6 months or after any change to the infrastructure. Ask to see a provider’s disaster recovery plan and when it was last tested. Logs and audit trails: The final thing to check is to ensure there is adequate logging and audit trails of access are kept for as long as needed and secured properly. A cloud provider should work with you to define these. There are many different aspects of cloud security but hopefully this has given you some tips of what to look out for.