Search for anything.

Your search for: "" revealed the following:

Search...

Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Consider IT
0131 510 0110Contact Us For A Free Quote
[email protected]Consider IT Limited, Waterview House, Edinburgh, EH6 6QU
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us
Consider IT
Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Your search for: "" revealed the following:

Search...

Posted by stuart.gilbertson

HomeArticles Posted by stuart.gilbertsonPage 6
Recent Posts
  • Cyber Risks for Charities: How to Safeguard Your Organisation
    Oct 24 2024
  • Upcoming Cyber Essentials Changes in April 2025
    Sep 27 2024
  • Consider IT is now a certified B Corp Text on Blue and Orange background
    Celebrating a New Milestone: Consider IT Becomes a Certified B-Corp
    Jun 04 2024
  • Consider IT blog title: Over 19000 sensitive documents stolen in Volkswagen breach overlayed on orange and blue gradient background
    Volkswagen Group has over 19,000 sensitive documents stolen in Cyber Attack
    Apr 24 2024
  • Blog Title 7 strategies to combat malware and ransomware on a blue and orange gradient background
    Staying Ahead of the Game: 7 Strategies to Combat Malware and Ransomware
    Apr 19 2024
  • Blog title The cost of a cyber attack on a blue and orange gradient background
    Counting the Costs: Understanding the Financial Impact of Cyber Attacks on Businesses
    Mar 19 2024
  • Blog title The Importance of Cyber Security Awareness training on a blue and orange gradient background
    The Importance of Cyber Security Awareness Training
    Feb 28 2024
  • Blog title Why choosing and independent IT support provider trumps big corporations on a blue and orange gradient background
    The Personal Touch: Why Choosing a Local, Independently Owned IT Support Provider Trumps Big Corporations
    Jan 10 2024

Important Reminder: Support for Windows XP ends on 8th April 2014

The support for Windows XP with Service Pack 3 ends 8th April 2014. If you’re running Windows XP with Service Pack 3 (SP3) after support ends, to ensure that you will receive all important security updates for Windows, you need to upgrade to a later version, such as Windows 7 or 8.

stuart.gilbertson
May 16, 2013
0
Share:

Unlock any iPhone 5 running iOS 6.1

As if Apple weren’t embarrassed enough…

iPhone_5_34L_Black_PRINTSome smart person has found a bug in iOS 6.1 which effectively renders the lock screen entirely useless. By doing a bit of this and a bit of that, applying for iPhone repair in San Diego maybe, whilst the phone is in a locked state, any person that knows the simple process can make use of the bug in iOS to unlock the iPhone 5 in a matter of seconds.

As IT Consultants, we’re not going to give you the process for doing it. We want to make users of the iPhone 5 aware of this serious security flaw so that you can be extra vigilant with your iPhone until Apple get around to releasing a fix for this mess.

By sliding to unlock, doing a few other things, then pushing the sleep/wake button, the phone will unlock as if you’ve entered the pin code (and no, you don’t enter the pin code!).

Apple are currently working on 6.1.3 which is in Beta just now, this should hopefully fix this gaping hole in their security.

(Edit: that’s Unlock as in unlock the phone using the 4 digit pin code, as opposed to unlocking it from the specific network operator).

stuart.gilbertson
February 26, 2013
0
Share:

ICO fines Nursing and Midwifery Council £150,000

The Information Commissioner’s Office has urged organisations to review their policies on how personal data is handled, after the Nursing and Midwifery Council was issued a £150,000 civil monetary penalty for breaching the Data Protection Act.

The council arranged for the DVDs, which contained confidential video files relating to alleged offences by a nurse as well information about two vulnerable children, to be couriered to a hearing in October 2011. Upon arrival it was found that the package didn’t contain the DVDs.

The council lost three DVDs related to a nurse’s misconduct hearing, which contained confidential personal information and evidence from two vulnerable children. An ICO investigation found the information was not encrypted. The DVDs are yet to be found.

David Smith, Deputy Commissioner and Director of Data Protection, said:

“It would be nice to think that data breaches of this type are rare, but we’re seeing incidents of personal data being mishandled again and again.
While many organisations are aware of the need to keep sensitive paper records secure, they forget that personal data comes in many forms, including audio and video images, all of which must be adequately protected.”

Further details about today’s case can be found on the ICO’s civil monetary penalty notice page.

 

stuart.gilbertson
February 18, 2013
0
Share:

How we did the Christmas Lights with a Raspberry Pi

Please remember this is a work in progress and we’ve just created this page on the fly!

The Raspberry Pi

The Raspberry Pi just runs one of the stock images available from the RaspberryPi.org site (Raspbian “wheezy”). On top, we’ve chucked Nginx and PHP. We’ve not given instructions on how to do the Nginx and PHP as a quick Google search shows enough information to allow you to do this 🙂 (You’ll notice that a lot of the content here simply says “Go Google”. Sorry about that!).

At this point you should make yourself aware of the GPIO pins on the Pi. Print out the schema so that you have it to reference: http://elinux.org/RPi_Low-level_peripherals

You can see the GPIO pins on the top left of the Pi

The Relay and the Remote

The relay board connects to the Pi using the pin outs. You’ll need to connect GND to a Ground pin on the Pi, and the VCC pin to the 5v pin on the Pi. From there, you have IN1, IN2, etc. which are just Relay 1, Relay 2 etc. respectively. Don’t change the jumper on the relay board, it should be set to VCC JD-VCC.

The Relay board is pictured below (click on it to see the full size image):

It was bought from Ebay via this link: http://www.ebay.co.uk/itm/New-5V-8-Channel-Relay-Module-Board-for-Arduino-PIC-AVR-MCU-DSP-ARM-Electronic-/170745298865?pt=UK_BOI_Electrical_Components_Supplies_ET&hash=item27c1367fb1

To make life easier (we originally ripped apart a floppy ribbon and it got verrrry messy and verrrry confusing for the brain!) you should probably buy these individual jumper wires below. The colour coded nature of them makes life easier when connecting between the Pi and the Relay board.

We bought ours from Hobby Tronics in the UK: http://www.hobbytronics.co.uk/ribbon-jumper-female-40?keyword=40JUMPERF

Last thing you’ll need is the remote control set we used. These are just plugs you connect to a wall socket and then pair with the remote control. For safety reasons we decided this was a better way to go about things rather than splicing mains cables into the relay board. It actually worked out even better as it meant we could position lights anywhere in the room without having to trail loads of wiring to the relay board.

Here’s a crude image of the box. We bought a cheap one from a local retail shop for £20. Fair word of warning here: We actually bought a different set to begin with, but the remote control PCB itself was horrible for soldering the wiring from the relays. Rather than buttons it had rubber electrodes that made the connection between the tracks on the PCB itself. This second set actually used proper switches, so it was easy to solder the connection into the appropriate hole in the PCB.

Each channel (there’s four channels to choose from) needs two relays to control. One sends the ON signal, and one sends the OFF signal.

So for example, here’s the PHP script for turning ON channel 1, which happens to be connected to GPIO4.

if( isset($_POST[‘action’]) )
{

$a = $_POST[‘action’];
if($a==”on”) {
exec(‘echo “0” > /sys/class/gpio/gpio4/value’);
sleep(0.75);
exec(‘echo “1” > /sys/class/gpio/gpio4/value’);
}

The first three lines are just checking that we’ve got a POST request coming in. The second if statement is checking that we’re turning the device ON. And then we set the signal on the GPIO4 pin. We echo 0 (which for some reason sets the pin live… I don’t know why), we wait 0.75 seconds to give the remote control unit time to send the wireless signal, and then we switch the relay off by echoing 1 to the same GPIO pin. There! The device is on!

To switch it off, you do the exact same, but wire up another GPIO to another Relay Switch, and then from there to the Off button on the Remote 🙂

 

Video

The video is just an RTMP-enabled web cam (It’s an Axis M1011, get it here ). The stream is picked up by Wowza broadcast software on an Amazon EC2 box.

This is then played via the website using JWPlayer (http://www.longtailvideo.com/jw-player/). It really is that simple! By allowing an Amazon EC2 box to provide the stream, it lessens the load on the web server providing the main content.

Chat

Nothing exciting about the chat to be honest, it’s just a copy of PHPFreeChat (get this here: http://www.phpfreechat.net/) tweaked to look nice within the design of our page. We were prepared to look at alternative chat methods should the load become an issue. An IRC server could have been set up within 15 minutes to lessen the load of the chat script. But at the time of writing, this wasn’t necessary.

The Code (Raspberry Pi end)

For each GPIO output, you need to set it up. We Googled, we found this:

echo $pin > /sys/class/gpio/export

echo “out” > /sys/class/gpio/gpio$pin/direction

We then chmod the specific pin to 777 (so that php/nginx can happily go about changing values):

 chmod 777 /sys/class/gpio/gpio$pin/value

It’s important to remember that $pin equates to one of the valid GREEN GPIO numbers from the schema. 4, 17, 22, etc. so re-write this as appropriate!

To make life easy, we added this to our /etc/rc.local file so that on boot, the Raspberry Pi would set up all the GPIO pins we were going to use:

echo “4” > /sys/class/gpio/export
echo “out” > /sys/class/gpio/gpio4/direction
chmod 777 /sys/class/gpio/gpio4/value

echo “17” > /sys/class/gpio/export
echo “out” > /sys/class/gpio/gpio17/direction
chmod 777 /sys/class/gpio/gpio17/value

etc. etc. etc. for all pins

Once you’ve got the relay hooked up, you can then go about testing the GPIO output:

echo “0” > /sys/class/gpio/gpio4/value

echo “1” > /sys/class/gpio/gpio4/value

If all is correct, you should see the LED on the Relay Board and hear the click of the Relay. It’s in your hands which way 0 or 1 goes with the relay (either on or off)!

The Code (The Queue System)

This is coming soon! It’s horribly horribly hacked together with two tables in a database. One is the Auth table (you get entered into this table when you log in with a username/Facebook) and a Queue table (this is populated when you click Join The Queue!). Lots of page refreshes later, the magic happens. More to follow!

stuart.gilbertson
December 11, 2012
0
Share:

Control our office Christmas Lights

It’s almost Christmas! This year we’ve taken our decorations to the extreme. We’ve given YOU the ability to log on to our website and take control over Christmas lights!

Jump onto http://christmas.considerit.com and join in the fun!

If it’s busy, you’ll need to wait in a queue for a little bit, but be patient, it’s a great laugh!

Let us know what you think by leaving a message on our Facebook page or sending us an email: [email protected]!

Have a really great Christmas!
The Consider IT Team

stuart.gilbertson
December 10, 2012
0
Share:

Skype: lol is this your new profile pic? Virus

There is currently a massive increase in complaints from Skype users in relation to viruses. The newest and the one that seems to be infecting a lot of users at the moment is one that sends a message  to the users with the text:

lol is this your new profile pic?

The users are asked to then click a link and are taken to a downloadable .ZIP file which will infect your computer.

Skype advise that all users update their Skype application and make sure they have up to date anti virus running at all times. More importantly, we advise users to be cautious. When you see links from friends, always be careful and check that they are genuine.

stuart.gilbertson
November 8, 2012
0
Share:

URGENT Tax Rebate? – delete it immediately

Emails that claim to be “Urgent” are highly likely to contain malware as attachments a new report reveals. FireEye released a report (view it here) that details a list of top words used in phishing emails (those are emails that pertain to be from various legitimate sources with the intent of infecting the machine or conning the user to give out important information).

The attackers mainly use zip files to hide their malware, ultimately aimed at gaining access to valuable corporate and intellectual data. It appears very few corporate establishments block these kinds of executables, which FireEye’s research confirms.

The report also shows a decrease in the use of ZIP files from last year (2011), a decrease in the use of standalone EXE executables, but an increase in PDF files. Adobe Reader, FoxIT Reader and other widely available PDF readers come with the ability to enable a Safe Reading Mode, which in theory, should prevent malicious code within PDF files from executing. In Adobe, Edit -> Preferences -> JavaScript  -> uncheck Enable Acrobat JavaScript checkbox to do this today.

 

Now, .ZIP files represent the vast majority, 76.91%, of advanced malicious files. The complexity of
these attachments, which can contain many distinct files and file types, coupled with a lack of
user awareness of the danger of these file extensions, has made them a highly effective means for
distributing malware and effectively exploiting systems.
PDFs also pose a significant threat. These file types are ubiquitous and familiar to just about every
computer user. Further, many users are unaware of the fact that malware can be distributed through
PDF files, and malware embedded in these file types is proving to be difficult for conventional defenses
to detect. For all these reasons, PDFs provide cybercriminals with a very effective means of attack.

http://www.fireeye.com/resources/pdfs/fireeye-top-spear-phishing-words.pdf

stuart.gilbertson
September 26, 2012
0
Share:

Malware installed at the factory on new PCs!

Hackers have managed to install malware on to brand new factory built and sealed PCs. This brings a whole new meaning to the old term “All Your PCs are belong to us!”

Microsoft is warning that cybercriminal gangs have managed to get the Nitol bug and other dangerous malware software installed to one in five laptops and PCs checked by their investigators. To avoid any confusion, it should be noted that reputable vendors such as Dell, HP etc. are not affected by this.

The malware installed could give the criminals control of the computers, allowing them to watch every tap of the keyboard to steal personal information including your name, address, details of any holidays and credit card information – whether it’s going down an encrypted channel or not.

“We found malware capable of remotely turning on an infected computer’s microphone and video camera, potentially giving a criminal eyes and ears into a vicitm’s home or place of business,” reported Microsoft investigator Richard Dormingues Boscovich.

The Nitol bug has the potential for the most damage as it tries to link the PC to a botnet which criminals can use for hacking attacks, deliberately crashing servers or performing illegal activities under the IP Address of an unknowing user.

Microsoft discovered the bugs in laptop and desktop PCs purchased in cities around China. Four of the computers were infected with malware despite being new and factory sealed.

Investigations led them to a domain name which is alleged to have been involved in cybercrime since 2008. Microsoft have been granted permission to take over the domain name and close down the botnet.

“Cybercriminals have made it clear that anyone with a computer could become an unwitting mule for malware,” said Mr Boscovich.

So if you’re planning a trip to China then be safe and purchase your computer back home before travelling, and even then give it a good anti virus scan!

Article by Iain

stuart.gilbertson
September 14, 2012
0
Share:

Co-Founder of Pirate Bay Arrested

Local police in Cambodia have announced that one of the founders of the Pirate Bay, Gottfrid Svartholm Warg, has been arrested as a result of an international warrant issued against him last April by his homecountry Sweden.

The country reacted after Warg failed to turn up for the beginning of his 1 year jail sentence for multiple copyright violations.

“His arrest was made at the request of the Swedish government for a crime related to information technology,” Cambodia’s police spokesman Kirth Chantharith told the AFP news agency.

“We don’t have an extradition treaty with Sweden but we’ll look into our laws and see how we can handle this case,” the spokesman added.

Warg, Fredrik Neij, Peter Sunde, and their financier Carl Lundstroem were convicted by a Swedish court for encouraging copyright violations in 2009. Lundstroem, Sunde and Neij each had their 1 year jail sentences reduced following an appeal in 2010. The appeal allowed their sentences to be reduced to between four and ten months. In addition, they were also ordered to pay the music and movie companies almost £4m ($7m) in damages for their copyright violations.

Warg did not attend the appeal with his defence lawyer citing being too ill as his reason. The Swedish court decided to uphold his sentence.

Incidentally, no copyrighted material is actually hosted on the Pirate Bay’s website, it simply acts as a linking site to its users torrent servers where the users themselves store the data.

stuart.gilbertson
September 2, 2012
0
Share:

Police Website Hacked

A Hertfordshire police website has been hacked, leading to the publication of what appear to be login details and passwords for dozens of officers and part of the police force’s website has been taken down as a “precaution” while investigations continue. Hertfordshire Police said information stored on an externally hosted database had been published on the internet.

The information which includes phone numbers and IP addresses, relates to a number of officers in Safer Neighbourhood Teams.

The Police force said in a statement:

“Hertfordshire Constabulary is currently investigating following the publication on the internet of information stored on a database linked to the public Safer Neighbourhoods pages of the external Constabulary website.

“As a precaution these pages have been temporarily disabled whilst the circumstances as to how this information was obtained is investigated.

“There is absolutely no suggestion that any personal data relating to officers or members of the public has been, or could have been compromised.

“Nevertheless matters of IT security are extremely important to the Constabulary and an investigation is already under way.”

stuart.gilbertson
August 31, 2012
0
Share:
1 … 5 6 7 … 14
CONSIDER IT FACEBOOK CONSIDER IT Twitter CONSIDER IT Linkedin

Contact Us

0131 510 0110
[email protected]
Find Us

Customer Service

Contact Us
Our Locations
Case Studies

Information

About Consider IT
Domains
Privacy Policy
Terms & Conditions
Press Enquiries

© 2025 Consider IT Limited – All Rights Reserved
Registered office: Waterview House, 37 Shore, Edinburgh, EH6 6QU. Company Number: SC320341 | VAT number: GB 930 1862 42
Consider IT is a trading name of Consider IT Limited