What is a virtual private network (VPN)?

A Virtual Private Network or VPN is a secure, encrypted connection between two computer networks or between an individual device and a network over the internet. VPNs help protect users’ sensitive data by creating a private tunnel through which data travels before reaching its intended destination, often referred to as a “tunneling protocol.” This ensures … Read more

What is the Takeown command and why do I need to use it?

The takeown command is a powerful tool available in the Windows operating system that allows users to take ownership of files and folders. It can be beneficial in various situations, such as when you have encountered problems accessing, modifying, or deleting specific files and folders due to permission issues. This introduction will cover an overview … Read more

What is the difference between a virus, malware, spyware, adware and ransomware?

You’ve got something funny on your computer but can’t work out how serious it might be. Do you know the difference between these computer terms (all of which are bad news). This guide aims to define key terms related to cybersecurity threats, including virus, malware, spyware, adware, and ransomware. Understanding the differences between these terms … Read more

What is ping in computer terms and is higher or lower better?

In this article, we will delve deeper into the concept of ping in computing. We will discuss its importance, what influences ping time, and different ways to measure it. You will be an expert on ping once you’ve read this article. Understanding Ping and Its Significance Ping, derived from the term “Packet Internet Groper,” is … Read more

What is VLAN tagging and why does New Zealand use VLAN 10 for fibre?

VLAN tagging, also known as 802.1Q tagging, is a method used in networking to separate different types of traffic on a single network infrastructure. This technique allows for better organisation, security, and management of network traffic, while ensuring quality of service (QoS) for high-priority applications. In this article, we will discuss the basics of VLAN … Read more

How to bypass Windows UAC prompts without admin account?

Are you getting a UAC prompt, or User Access Control prompt, on your Windows computer when trying to install an application or add a driver for your new printer or USB device? If you’re an administrator you just put your login details into the box. The problem lies if you’re not an administrator, or have … Read more