Items filtered by date: May 2014 - Computit


Iphone/Ipad and Ipod touch's battery problems have become particularly noticeable with IOS 7.1, in fact battery technology has not advanced as the other features, rather its overall performance is even worsened,.

So let’s have a look to a couple of tips to keep our battery running for as long as possible.Many of these tips are going to be common sense but still valid for the less technology savvy people.

  • Deselect Airdrop. The application allows you to share files and photos with other people in close proximity. Unfortunately this tool can suck a big part of your battery so is better to go to the CONTROL CENTER, Select AIRDROP and then OFF.
  • Restore your device as new. Is usually the best way to fix any battery issue, even though is a pain.. You will need to reinstall everything, and all your saved will be lost, but in most cases your battery life will be better than ever.
  • Keep you device out of sun. In fact the sun rays kill battery faster than any other factor.
  •  Disable location services.  When you don’t really need it, and you are running out of battery is better to disable this function.
  • Eliminate Push Notification. You can turn these off one-by-one, or turn off Push entirely by heading into Settings -> Notifications, and save a bit of extra battery life since your device won’t be pulling in data for those applications anymore.
  • Reduce the brightness.  Keepingthe screen constantly at maximum brightness consumes a lot of battery life, is better to keep the screen at 30% of their brightness most of time. 
Published in Apple


Since Satya Nadella took the reins of Microsoft in February, he is leaving his mark by demonstrating his ability to make the software giant as relevant today as it was back when it promised to put a personal computer on every desk and in every home.

Nadella effort now is focused on re-energizing the 40-year-old Microsoft's corporate culture that has missed the biggest waves in the industry including search and mobile.

After a hard work finally on Tuesday, Nadella brought his Skype team onto the stage and presented a terrific new technology that emulate the Start Trek universal communicator: Skype translation.

Essentially you can speak to someone who speaks a different language and be understood. Skype adds the other person's translations for you in subtitle format at the bottom of the screen. Although it's not an immediate translation as you need to wait until the other person is done speaking before the service starts whirring away.  

Microsoft isn't sure how many languages will be included initially. The company will release new languages as they meet the bar for translation quality.

This technology if well implemented has the potential to revolutionize the business world.

It will be made available for all Skype users apparently within the end of the year. 

Published in Microsoft

Yesterday morning a number of people across Australia woke up with an unpleasant message on their Iphones.

The typical message read like this: “Device hacked by Oleg Pliss. For unlock device, you need send voucher code by 100 usd/eur (Moneypack/Ukash/PaySafeCard) to email: This email address is being protected from spambots. You need JavaScript enabled to view it. for unlock.”

The hacker who calls himself "Oleg Pliss" systematically froze iPhone, iPad and Mac users out of their own devices, holding them hostage until payments of between $50 and $100 were received.

The hack was conducted by exploiting a weakness in Apple’s “Find My iPhone” feature. In fact the victims who had set a password on their device were able to unlock them without paying the ransom. However, most people without passwords set up prior to the attack were not able to regain access to their device.

As if that was not enough PayPal told the Sydney Morning Herald that the email address in the message is not linked to any account and so anyone who had paid the ransom can be refunded.

To keep your devices from being attacked is simple and involves two steps.

  • Step 1. Change you Apple ID password
  • Step 2. Make sure that you have a two factor authentication enabled.

In this way even if the hacker discovers you password he cannot do any changes without having in his hands your Apple device to access your account. 


Published in Apple


Large number of users switched to the latest versions of Windows since Microsoft officially ended to support Windows XP the 8th of April 2014.  

Despite there are still many users that rely on the old operating system, especially some companies and organizations that were unable to migrate to the new systems before the support phase ended, and that are paying Microsoft to get security patches and updates.

Now a registry hack that allows Windows XP to continue receiving update has emerged.  In fact the discovered hack will allow receiving security updates until April 2019 and… for FREE.

By making a few changes in the registry of XP, the hack basically tricks the automatic update servers at Microsoft into thinking the OS is Windows Embedded POSReady 2009. The OS is based on Windows XP Service Pack 3 and it will continue to get security updates from Microsoft until April 2019.

For 32-bit versions of Windows XP SP3, tweak the registry by opening Notepad, and pasting in:

Windows Registry Editor Version 5.00



Then Save As xp.reg. Note, the ".reg" file extension, not the default .txt.

For 64-bit versions of XP, there is a workaround on Sebijk.

However is worth to say that is still better to migrate from XP as this operative system is less secure than the other more modern versions. Moreover is likely that Microsoft will find the way to block any updates that use this hack.  

For the moment, we like to know that the good old Widows XP is not yet dead.

For more information on how to migrate your operating system Contact us or visit our Service Page.

Published in Microsoft

Ebay on Wednesday released a warning to all its users to change their passwords following a security hack that compromised a database containing encrypted passwords and other non financial data.

Simultaneously the Ecommerce giant reassured its consumers that for the moment there are no evidence of any unauthorized activity or access to financial or credit card information, which they say are kept separately in encrypted format.

Ebay does not seem to be too concerned about this stolen personal information like postal addresses and dates of birth, as they assert the stolen identities could not be used to access other companies owned by the auction site, including PayPal or GumTree.

But others have different thought saying that the repercussions of this data theft could be felt for a long time after the break-in since we are dealing with identity theft.

The fact is that someone in now claiming to have a copy of the Ebay’s stolen database and is selling that for 1.45 bitcoin (£447) via the website Pastebin.

Ebay took two months to discover it had been hacked as no unusual activities were detected until May.  Apparently a couple of employees company identities were stolen in February, after that the compromised database, which included eBay customers’ names, encrypted passwords, email addresses, mail addresses, phone numbers, and dates of birth, was hacked between late February and early March.

Ebay realized the attack just recently after the repeated attempts to access a database that was restricted for the two identities.

Now some customers are complaining on eBay Community forums saying that they didn’t receive much information about the breach from eBay and have yet to get notifications by email, which the company has promised to do.

The good part is that apparently Paypal doesn’t seem involved in the security attack.

Nevertheless this is another warning call for organizations that need to take an very careful approach to internet security, hacker are more and more capable and keen to get sensible data.

Published in IT Security


Cloud computing became a very popular term; everyone is now switching to the cloud.

When it first appeared as a concept, a lot of critics dismissed it as being the latest tech fad. However, cloud computing managed to cut through the hype shifted the paradigm of how IT is done nowadays

 But what exactly is “Cloud Computing”? The “cloud”refers to the internet, so when we refer to Cloud Computing we refer to the way data are stored and accessed through an internet connection, this means that people are allowed to access their data anytime and anyplace.

Why is so popular? It is a great and easy way to storage your data, but is it a reliable solution? The answer is no, not at 100%.

Like most things in life, benefits come with risks. Let’s try to understand which are the benefits and if they can outweigh the risks.


  • Flexibility. The most obvious one, you can access your data anywhere and not just in the office or at home. This means a freer work life. Moreover companies are moving to the cloud because it offers them the flexibility they need to adapt to the ever changing business climate.
  • Less cost More efficiency. Businesses used to manage all their IT on-site using in-house servers, computer rooms and specialized staff. Nowadays most businesses have access to broadband and other advanced connectivity solutions; therefore they can source their IT services online by third-party specialist providers, enabling programs, tools and applications to be accessible from almost any location.
  • This evolution of gives businesses of all sizes the opportunity to reduce the amount of money they spend on hardware, software and IT personnel, so they can focus efforts elsewhere and be more efficient.
  • Backup and Recovery.  The process of backing up is simplified and more secure. Keeping a copy of all files offsite is very important. Even if business files are backed up on a file server, a hurricane, flood, fire or theft could destroy the computers… and backups. Keeping backed up files in the cloud ensures data is safe no matter what is going on at your office.
  • Unlimited Storage Capacity. The cloud offers almost unlimited storage capacity. It eliminates worries about running out of storage space and at the same time it spares businesses the need to upgrade their computer hardware, further reducing the overall IT cost.


    • Internet downtime.You should remember that the whole setup is dependent on internet access, thus any network or connectivity problems will render the setup useless. That’s why it is crucial to have an alternative backup system on-site that ensure you to minimize any downtime periods an get you business back in track as soon as possible.
    • Security. Are data offsite data secure? No they’re not. Offsite data offer a greater chance for hacker to attack as travelling data are easier to intercept. Nevertheless with technology always improving, there are ways to make sure of better encryption. Good Cloud providers also provide the hardware and knowledge for the most current security measures.
    • Dependency on vendor. It is crucial to choose the right cloud provider as many offer lock in contracts that make difficult and expensive to change the size of the cloud when is needed. This is why is very important to carefully and thoroughly contemplate all options when picking a vendor.

In conclusion despite its disadvantages, cloud computing remains a great choice for businesses especially if well contemplated with the right provider. We certainly hope that the advantages will further grow and the disadvantages will be eliminated but the future certainly looks promising.

Published in Cloud Computing


Google finally released yesterday an update for Google Chrome after fixing the three critical security vulnerabilities of Adobe Flash, Reader and Acrobat that were affecting the Windows, Mac and Linux versions of the browser. In fact before of the update was seriously possible for malicious attacker to take control of user’s operating system.

After paying $ 4,500 to make the better update possible, Google in now encouraging users and administrators to make the necessary updates.

The update is not only available for PC but for Android devices as well, as Chrome is recognized as the most used browser for Androids with over five hundreds millions installs.  But although the update contains multiple security and stability update, there are still major issues, like YouTube support for casting videos and full screen video controls, that have not been addressed yet and that could lead in a future loss of popularity for the famous browser,  

You can read more about Microsoft Security Bulletin at this link: https://technet.microsoft.com/library/security/ms14-may

For more information please Contact Us or visit our Service Page

Published in Microsoft


More and more often small to large business choose to outsource their IT System. This trend is given to a series of reasons that eventually will bring the cost down and the reliability up.

Let’s have a more detailed look to each of these reasons:

  • Cost Reduction: this is the most obvious benefit. Outsourcing convert IT fixed cost into variable cost. In practice you pay what you use when you need it.
  • More room for improvement. An IT company will be able to advice you whenever you may be able to improve your business by installing new technology.
  • Trained, experienced, qualified and certified staff. Your IT employees will never be as experienced as an IT company employer that faces everyday new problems in different type of business. IT employee leads an isolated existence no matter how much they train.
  • Increase competitiveness. Higher IT cost and slower performing time leads to higher cost for buyers and so to less market competitiveness.
  • Predictable IT expenditure. Most IT company provide fixed prices so you know how much you are going to spend before of performing the service.
  • Flexibility. Your outsourced IT company is there 24/7 when for your needs. Doesn’t have sick days of day off. You never know when a disaster may happen.
  • Security and recovery plan. An IT outsourced company will backup your data system in a regular basis, so in case of disaster your business will be able to recover all vital data in minimum time and keep with its normal operations.

Visit our Service page for more informations or call us at: 07 3871 1222

Computit | IT Support Brisbane



Published in IT System


Cryptolocker is an evolution of non familiar ransomware schemes in which the malware encrypts all the files he finds in different network resources, including shared network drives, removable media such as USB sticks, external hard drives, network file shares and some cloud storage service, and ask for the description key that you should get after paying a fee. The goal of all ransomware variants is to extort money from victims in one way or another.

US-Cert sais the number of infections caused by Cryptolocker are rising and is important NOT TO PAY the demanded fee, but instead report it to the Cybercrime Federal Police.

If the red screen notice of Cryptolocker appear on the screen is very important to disconnect the computer from its wireless network immediately as all other computers of the network are then likely to be infected.

Normal antivirus software protection doesn’t provide a great level of security as the antivirus usually detect the malware after few hours, but meanwhile it is able to encrypt thousands of files on the local drive and present the user with the now-familiar bitmap image explaining the attacker’s demand for ransom.

Avoiding ransomware and minimizing its damage is much the same as avoiding other types of other malware.

A good Antivirus software is a must and is aldo important to and keep Windows and browser-related components (Java, Adobe, and the like) updated.  Always be wary of unexpected email attachments and spam. (CryptoLocker spreads via .zip files sent as email attachments, for example.)

And just to beat this dead horse one more time: Always have a good backup system in place, this is particularly true for business whose loss of data often mean loss of money and reputation.

If you want to know more about how to protect your data, visit our Service Page.

http://www.computit.com.au/disaster-recovery or call us at 1300 443 507

Computit, IT Company Brisbane 

Published in Disaster Recovery

Running a small to medium business can be daunting as you juggle staff, clients, products, suppliers, finances, and the list goes on.

While you’re busy doing all of the above and more, have you ever thought about your business security and the risks that can be posed by your ex-employees? Do you have an exit strategy for your business where staff are given an exit interview, keys handed in and then all computer access removed for them?

Published in IT Security

Feel free to contact us


If you are looking for a trustworthy Managed IT Service Provider, you have come to the right place.


Our Partners 

lenovo partner
autotask partner
avg partner
storagecraft partner
vmware partner
pacnet partner
office 365 partner
webroot partner
cisco partner
microsoft partner
malwarebytes partner
business partner hp
business partner hp
Go to top