View RSS Feed

Technical

General Technical news and hints

  1. Kubuntu Files: Audio Woes Ahoy!

    by
    CAM
    , 4th November 2012 at 09:16 PM (100 Grades Per Minute)
    I've always had a soft spot for KDE, so when switching to Ubuntu on my primary home machine it was a no brainer to pick Kubuntu 12.10 over it's Unity-packing parent distro. So far the system has set itself up extremely quickly and given virtually no problems at all beyond a mouse cursor that refuses to stick to the style I tell it to, irritating but hardly a deal breaker. Given the last time I installed Ubuntu I was left seekign network drivers and spending hours getting a laptop to even start this ...
  2. BETT 2012

    by
    CAM
    , 16th January 2012 at 06:54 PM (100 Grades Per Minute)
    Recycling bins filling up, spam folders overflowing. Yes it's that time of year again when you come into work with a bag full of leaflets and find half of them make their way into the bin. BETT 2012 is finished and the dust is settling in the Olympia Exhibition Hall for the last time with BETT 2013 scheduled for the ExCeL Centre instead.

    Click here for pciturs on Google+.

    This year saw the return of the Edugeek stand to provide tech staff with an amusing diversion in ...

    Updated 16th January 2012 at 06:57 PM by CAM

    Categories
    Work , SIMS , Technical
  3. Using Dates in SIMS Reporting

    by
    CAM
    , 4th January 2012 at 06:12 PM (100 Grades Per Minute)
    When you output dates in SIMS with the Reporting tool, the results will come out as text and cannot be converted into a proper date with the number format window. This is a fix used in the SIMS Standard Portrait template to prevent Excel from throwing a fit and entering the data incorrectly. You can modify the template and remove the fix but that is best left to advanced users, there is a simpler option.

    Let's take a date in the format "1 March 2012" in cell C2. You can ...
    Categories
    Work , SIMS , Technical , Office
  4. EcoSplash / ShowerSaint

    by
    CAM
    , 5th November 2011 at 12:35 PM (100 Grades Per Minute)
    Just had this rubbish through the door in postcard format:

    Your request for an EcoSplash has been received. (No, We never sent a request!)

    If you don't require it contact us on... (Stop there. We didn't order one so no!)

    You will need to give us your address so that we can remove your details (And confirm I am an idiot? No thanks!)

    For more information visit... (Doesn't even appear in Google searches and the WHOIS points to a marketing
    ...

    Updated 9th December 2011 at 08:27 PM by CAM

    Categories
    Technical
  5. iHate Work? iFired!

    by
    CAM
    , 3rd November 2011 at 01:30 PM (100 Grades Per Minute)
    Well, no, I am not fired but this poor Apple employee was for making comments about his employer on Facebook.

    It shows that you need to be careful what you say these days. All too often I see comments on Twitter or Facebook about people hating their job and often they don't realise, if I can see the comment so can their boss. What makes this case more chilling is the post in question had privacy settings applied so the poster thought it was safe, but a colleague on the access list ...
  6. EduGeek Conference - A Quick Summary

    by
    CAM
    , 4th June 2011 at 09:23 AM (100 Grades Per Minute)
    Another year has been and gone for the EduGeek Conference. Set every year near Preston in the Summer Half-Term, education professionals from around the country came to mingle, share ideas and listen to the talks put on by suppliers and fellow professionals. Here is a quick recap:

    (Please note these are personal opinions of the talks!)

    Data Protection: Dos_Box's brother, known on here as Drummer Boy, gave a good talk about the data protection act regarding the myths ...
  7. Malware - How It Works

    by
    CAM
    , 20th May 2011 at 06:58 PM (100 Grades Per Minute)
    With the recent spotlight on malware and computer security I want to share some of the tricks I have discovered whilst reading up on it. And yes, some of these can affect multiple platforms (Windows/OSX/etc).

    Google Image Poisoning: The act of using Google Image Search to trick users into visiting infected pages. Images related to popular topics on Twitter or the news are pushed high up the ranks of searches relating to that topic. Victims search for said topic in their droves, click ...
  8. Breaking In - Literally

    by
    CAM
    , 10th April 2011 at 01:05 AM (100 Grades Per Minute)
    A program called Breaking In is being launched in America and it is the IT world's equivalent of CSI. the show follows a fictional IT team breaking into museums, nicking cars and doing other things that real security researchers likely don't do as part of their day to day affairs. The producers even created a Flash game for people to play around in and supposedly "hack" by guessing a password.

    Unfortunately for the show's marketing team, one user responded to the Naked Security blog post ...

    Updated 10th April 2011 at 01:30 AM by CAM

    Categories
    Technical , Amusement
  9. SMS: Scammers Messaging Service

    by
    CAM
    , 21st March 2011 at 06:20 PM (100 Grades Per Minute)
    Mobile devices are gradually becoming more popular targets for scammers and are crossing over into the realm of traditional Internet scams. Social engineering plays a big part in scamming mobile phones, with a popular tactic being to ring a number, hang up immediately and leave an entry in the missed calls list that will redirect a curious owner to a premium rate number and a hold jingle. They rely on the "Hmm who just rang me?" effect to trick consumers into dialling the number and don't ...

    Updated 21st March 2011 at 06:23 PM by CAM

    Categories
    Technical
  10. Facebook: Sure You Are Secure?

    by
    CAM
    , 18th March 2011 at 12:02 AM (100 Grades Per Minute)
    Facebook profiles have become a bit of a commodity these days for crooks looking to cash in on unsuspecting members of the public. From spam messages to social engineering scams, the holy grail for any attacker is open access to a person's profile. From here, they can capture details about a person's private life along with their family, friends, business contacts and everything they require to pull the perfect scam.

    On the same note I paid a visit to the Apple Store in London today ...

    Updated 18th March 2011 at 12:06 AM by CAM

    Categories
    Technical
Page 1 of 2 12 LastLast