20 Jan 2015
Google and SWGfL Internet Filtering Changes Google searches utilise encryption technologies for added security and where this has previously been optional, it will be made mandatory by them in early February 2015.…
4 Dec 2013
Please note Windows XP is no longer a supported operating system. If you are still using Windows XP you should upgrade or replace your computer. A new exploit has been found within…
20 Nov 2013
What is CryptoLocker? CryptoLocker is a malicious program that when installed will encrypt important files and documents on your computer making them unusable, and then demand payment to restore access to them.…
19 Nov 2013
Java 6 Vulnerability Scomis are being contacted by an increasing number of schools who have had their computers infected with malware. This coincides with the discovery of vulnerability within Java 6 which…
8 Aug 2012
Some managed networks require that your wireless device’s MAC Address ( a unique identifying code) be added to a list of devices that have permission to join the network. To obtain the…
7 Aug 2012
Some networks require you to use a proxy server to access the Internet. A proxy server is another computer or device that acts as an intermediary between you and the Internet by…