Remote Support: Download the client for Client for Windows or for Client for MAC
Phone : (02) 800 777 29
Report your issue via: support@comp.net.au

Don’t let Google punish you for a Non Mobile-Friendly Site!

Posted by on May 13, 2015 in Blog | 0 comments

From April 21st, websites that look and perform better on websites are appearing higher on mobile search results. Google has even created a Mobile-Friendly test where you can see if your (and your competitor’s) website passes the list of criteria. Google changes will give the users relevant and high quality search results that are optimized for their devices. Why did my site not pass? The main reasons why your website wouldn’t pass the test is if the text can’t be read without zooming it, the content doesn’t fit the screen horizontally, you can’t click on links or buttons (too small) or your website is using Flash which is a non-mobile friendly software. My site didn’t pass the test, what should I do? We are here to help! Contact us to see how we can help to make your current website mobile-friendly or to develop a whole new and fresh website for...

Read More

Laws and Ethics Can’t Keep Pace with Technology

Posted by on Feb 2, 2015 in Blog | 0 comments

  Codes we live by, laws we follow, and computers that move too fast to care.   by Vivek Wadhwa Employers can get into legal trouble if they ask interviewees about their religion, sexual preference, or political affiliation. Yet they can use social media to filter out job applicants based on their beliefs, looks, and habits. Laws forbid lenders from discriminating on the basis of race, gender, and sexuality. Yet they can refuse to give a loan to people whose Facebook friends have bad payment histories, if their work histories on LinkedIn don’t match their bios on Facebook, or if a computer algorithm judges them to be socially undesirable. These regulatory gaps exist because laws have not kept up with advances in technology. The gaps are getting wider as technology advances ever more rapidly. And it’s not just in employment and lending—the same is happening in every domain that technology touches. “That is how it must be, because law is, at its best and most legitimate—in the words of Gandhi—‘codified ethics,’ ” says Preeta Bansal, a former general counsel in the White House. She explains that effective laws and standards of ethics are guidelines accepted by members of a society, and that these require the development of a social consensus. Take the development of copyright laws, which followed the creation of the printing press. When first introduced in the 1400s, the printing press was disruptive to political and religious elites because it allowed knowledge to spread and experiments to be shared. It helped spur the decline of the Holy Roman Empire, through the spread of Protestant writings; the rise of nationalism and nation-states, due to rising cultural self-awareness; and eventually the Renaissance. Debates about the ownership of ideas raged for about 300 years before the first statutes were enacted by Great Britain. Similarly, the steam engine, the mass production of steel, and the building of railroads in the 18th and 19th centuries led to the development of intangible property rights and contract law. These were based on cases involving property over track, tort liability for damage to cattle and employees, and eminent domain (the power of the state to forcibly acquire land for public utility). Our laws and ethical practices have evolved over centuries. Today, technology is on an exponential curve and is touching practically everyone—everywhere. Changes of a magnitude that once took centuries now happen in decades, sometimes in years. Not long ago, Facebook was a dorm-room dating site, mobile phones were for the ultra-rich, drones were multimillion-dollar war machines, and supercomputers were for secret government research. Today, hobbyists can build drones and poor villagers in India access Facebook accounts on smartphones that have more computing power than...

Read More

Mac OS X in the Crosshairs – 18 Malware Scanners Put to the Test

Posted by on Oct 3, 2014 in Blog | 0 comments

For a long time, Mac OS users believed they were safe, that there was no malware for their system. As recent as April 2012 and the flashback attack on over 700,000 Apple PCs, it is clear that attackers also have the Macintosh in their crosshairs. AV-TEST has tested 18 antivirus products for Mac and finds some of them truly superb – others are really horrible. Security Suites for Mac OS X: For on-demand detection, only four products achieved the 100-percent mark (AV-TEST August 2014). Security Suites for Mac OS X: A few of the products slow down the system when copying. The strong detection package from Bitdefender hardly slows down the system at all (AV-TEST August 2014). Bitdefender for Mac: The security package detected all the malware sought in the test and, in doing so, hardly strained the System. avast! Free Antivirus for Mac: The freeware for Mac users did a good job, though not a great job, at recognizing the intruders. The universe of known threats for the Mac OS is still not terribly large. This easily leads to the assumption that Mac users don’t have to worry about the topic of security software. What’s more, tests published on the Web with 1 to 20 known Mac intruders, all of which were naturally detected, don’t make the situation any better. In the meantime, however, there are already a few hundred current threats specially targeting the Mac that in particular seek to exploit the security gaps of software add-ons. Everyone says: Mac OS X can protect itself To be sure, since OS X 10.7 or 10.8 there are some good internal security systems such as Gatekeeper, Sandbox and Xprotect. Xprotect, for example, checks the mail and browser downloads. USB sticks, CDs or DVDs, however, are not inspected. The Flashback attack of 2012 caught many users flat-footed, and over 700,000 Macs were infected in a flash. Up to that time, there was a consensus that an antivirus application for a Mac was merely ballast. An opinion that persists to this day, except probably among the some 700,000 Flashback victims. 18 Security suites for Mac put to the test For the maximum protection under OS X 10.9, the AV-TEST lab inspected 18 currently available Internet security suites in terms of their protection function, system load and false positives. In addition, the features of the protection packages were listed. In the first part of the test, 117 specimens of malware targeting the Mac were inspected in the so-called on-demand test. This is the normal scanning routine of security tools for malware. In the second part, the on-access test, the quality of the background antivirus watchdog was inspected. In doing so, an additional...

Read More

The Rise Of Ransomware

Posted by on Jun 19, 2014 in Blog | 0 comments

Cryptolocker, Gameover Zeus, and the nasty new strains of computer viruses holding our machines hostage.               By   Victor Kotsev If you are running a PC with the Windows operating system on it, you may want to consider  another backup–security experts fear the return, perhaps as early as this week, of a vicious computer virus that locks people out of their computers and demands ransom. A massive international operation at the beginning of the month knocked out its main servers but, attesting to how government digital security policy has failed to prevent and in some cases has even encouraged cyber crime, that was able to guarantee only two weeks of respite from it. Attesting to the dark genius of their creators, the viruses turned the very tools that protect people’s privacy online against those very same users. Cryptolocker is a fascinating and terrifying code, the best-known example of a new generation of “ransomware” viruses that encrypt a computer’s entire data with a powerful algorithm and demand a payment in exchange for the password. Estimates say it has already raked in tens of millions of dollars–it was such a commercial success that its creators shamelessly set up a special customer service site that helped people pay the approximately $300 demanded from each affected user. It originally served as the less glamorous counterpart of another highly sophisticated virus, Gameover Zeus, which was used to steal financial information. “Where a computer infected with GOZeuS turns out not to offer a significant financial reward, it can ‘call in’ CryptoLocker, to give the criminal controllers a second opportunity to acquire funds from the victim,” wrote the U.K.’s National Crime Agency in a release. But it has since rivaled and even surpassed Gameover Zeus in its infamy and has spawned a number of imitations, some of them attacking other operating systems and even smartphones. The most common way the viruses have spread so far has been through fake emails containing infected attachments or links to hackers’ sites that exploit vulnerabilities in browsers to install the malware surreptitiously. The infected computers are then linked to form a criminal “botnet”–or a decentralized peer-to-peer network of zombie computers taking commands from remote operators. The scheme is so complex that even after authorities took over the command and control servers–and named one of the alleged perpetrators, the Russian hacker Evgeniy Bogachev–the threat didn’t disappear. Attesting to the dark genius of their creators, the viruses turned the very tools that protect people’s privacy online–such as powerful encryption and decentralized anonymous communications–against those very same users. “For some years now, attackers have been changing the techniques they use to manage their networks of infected computers to be resistant to take-down both from...

Read More

Mozy Helps Beth Lutz Recover From a House Fire

Posted by on Apr 23, 2014 in Blog | 0 comments

“We had a devastating fire that totally demolished our house. I tell all my friends, ‘You really need to make sure that your data is backed up.’ I can’t imagine not having all of those picture and files…. I absolutely recommend Mozy.” Beth Lutz had a lot to worry about when fire consumed her home in October 2010. Everyone got out safely, but her records, photos, documents and computers were a loss. Fortunately, as a MozyHome user since 2007, all her records and images were ready and waiting for her to restore, making it easier to recover from the tragedy and get on with life. “I just couldn’t take the risk that something might happen to client work I was doing,” Lutz says. Lutz had been maintaining regular backups for years but hadn’t needed to call on the service. For a time, she used a conventional, on-premise backup system, but the process was complicated and offered little peace of mind. “What is so fantastic about the Mozy product is that it is so easy to use — with just a few clicks I was able to set up an automatic backup of my important documents, files, music and photo. I could also quickly check online to see that my data was actually being backed up,” she says. “With an external hard drive, it was harder to verify that the files I wanted to back up were actually being saved. It didn’t give me the same kind of confidence.” Lutz actually got a hint about the unreliable nature of conventional, on-premise backup when a flood hit her home office the year before the fire. “It made me realize that if the external hard drive fried, I would have a problem.” After the fire, Mozy’s comprehensive backup ensured that Lutz had all of her vital documents intact. The cloud service also safeguarded and restored the family’s photo and music collection. The extensive photo backups proved invaluable for dealing with her insurance company, thoroughly documenting all her possessions and enabling her to push back against lowball estimates of replacement prices. More important, though, were the personal memories. “I can’t imagine not having photos of my kids growing up. It would have been horrible,” she says. Lutz has become an activist for cloud backup since her unfortunate fire. “I keep telling all my friends: you’ve got to do it, you’ve got to have backup you can rely on,” she says. “Hopefully you don’t need it—I never thought my house would burn down!—but if something does happen, you’re protected.”...

Read More

Queensland government signs Microsoft Office 365 deal to save $13.7 million

Posted by on Apr 14, 2014 in Blog | 0 comments

The Queensland government is hoping to pocket savings of $13.7 million over three years by deploying the latest Microsoft software to 149,000 public servants across the state. The $26.5 million whole-of-government deal covers Microsoft’s Office 365 suite of cloud applications including Yammer, the social enterprise tool often described as “Facebook for business”, which was acquired by the vendor in 2012. It will be available to all Queensland government agencies, bar the Department of Education, which has its own arrangements. While the state believes the move will reduce costs and transform service delivery, governments elsewhere are taking the opposite tack in a bid to achieve the same outcomes.                             <iframe id=”dcAd-4″ src=”http://ad-apac.doubleclick.net/N6411/adi/onl.bt.itpro/itpro/governmentit;cat=itpro;cat1=governmentit;ctype=article;pos=3;sz=300×250;tile=4;ord=6.9718882E7?” width=”300″ height=”250″ scrolling=”no” marginheight=”0″ marginwidth=”0″ allowtransparency=”true” frameborder=”0″></iframe>                         In February, the UK government revealed plans to save money by eschewing Microsoft Office in favour of cheaper open-source alternatives. Local reports suggested it had spent £200 million ($356 million) on Office since 2010. UK Cabinet Office Minister Francis Maude said the country wanted to move away from the small “oligopoly” of suppliers which had long dominated the market. Earlier this month, the UK government was forced to pay Microsoft £5.5 million to extend support for an additional year for thousands of government desktops using outmoded Windows XP software. IBRS analyst Sue Johnston said Queensland needed to ensure it exploited the full functionality of any software purchased. “One of the questions when you do a big deal is what else will the government do to leverage it?” Ms Johnston said. “What’s its capability to implement all the capability of this new Office? … You’d want to see a subsequent announcement on how they will apply it [given] there is not a lot of money in the market.” One highly placed source said the government would struggle to deploy new software quickly, given ICT services were decentralised. “Centrally you buy a lot of it because it’s a good buy but you’re at the mercy of the agencies to go and install it and make it work,” the source said. “That is the real challenge because agencies have a lot of other things on their plates.” Queensland IT Minister Ian Walker said it was not mandatory for agencies to adopt the software, nor did the government have a desired time frame in which they might do it. “We won’t be dictating to them,” he said. Some departments would struggle to run latest version software on their ageing PCs and were likely to hold off until new hardware was acquired, the source predicted. However, making a case to replace machines while they were still operational was challenging in the current climate of cost cutting, he added. Mr Walker said the deal represented a significant step forward for...

Read More