Search for anything.

Your search for: "" revealed the following:

Search...

Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Consider IT
0131 510 0110Contact Us For A Free Quote
[email protected]Consider IT Limited, Waterview House, Edinburgh, EH6 6QU
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us
Consider IT
Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Your search for: "" revealed the following:

Search...

Category: IT News

HomeArchive by Category "IT News"Page 5
Recent Posts
  • Cyber Risks for Charities: How to Safeguard Your Organisation
    Oct 24 2024
  • Upcoming Cyber Essentials Changes in April 2025
    Sep 27 2024
  • Consider IT is now a certified B Corp Text on Blue and Orange background
    Celebrating a New Milestone: Consider IT Becomes a Certified B-Corp
    Jun 04 2024
  • Consider IT blog title: Over 19000 sensitive documents stolen in Volkswagen breach overlayed on orange and blue gradient background
    Volkswagen Group has over 19,000 sensitive documents stolen in Cyber Attack
    Apr 24 2024
  • Blog Title 7 strategies to combat malware and ransomware on a blue and orange gradient background
    Staying Ahead of the Game: 7 Strategies to Combat Malware and Ransomware
    Apr 19 2024
  • Blog title The cost of a cyber attack on a blue and orange gradient background
    Counting the Costs: Understanding the Financial Impact of Cyber Attacks on Businesses
    Mar 19 2024
  • Blog title The Importance of Cyber Security Awareness training on a blue and orange gradient background
    The Importance of Cyber Security Awareness Training
    Feb 28 2024
  • Blog title Why choosing and independent IT support provider trumps big corporations on a blue and orange gradient background
    The Personal Touch: Why Choosing a Local, Independently Owned IT Support Provider Trumps Big Corporations
    Jan 10 2024

Half of UK homes are turning to tablets

OfCom have published a report after conducting research on tablet usage in the UK.

The tablet computer has established itself as a must-have device in just five years with more than half of UK homes now owning one.

 

Apple’s iPad launched in the UK on 28 May 2010 and, alongside Android and other tablet devices, it is helping to shape the way we surf the internet, communicate and watch TV and video.

 

Tablets are proving very popular among people aged 35-54 with nearly two thirds of this age group (64%) having a tablet.

The rapid rise in popularity of tablets means that over half of UK households (54%) now have one1, up from just 2% in 2011.

The trend looks set to continue – 21% of households currently without a tablet told Ofcom they were likely to get one within the next 12 months.

 

According to the Ofcom report, seven in ten (71%) children aged 5-15 had access to a tablet at home by the end of 2014, up from just over half (51%) in 2013. And many kids do not even have to share a tablet with their parents. One in three children (34%) aged 5-15 have their own device – up from one in five (19%) in 2013.

Tablets are also proving popular with toddlers – one in ten (11%) of 3-4 year olds now have their own tablet to keep them entertained.

Using a tablet out and about

While more than one in three adults (37%) use a tablet to go online at home, only 15% appear to take their tablet with them when out and about – away from home, work or their place of study.

 

Ofcom’s report can be found here: http://consumers.ofcom.org.uk/news/five-years-tablets/

 

 

 

 

stuart.gilbertson
May 29, 2015
0
Share:

Grooveshark has been shut down

The online streaming website Grooveshark has been shut down after losing its battle with the music industry on Thursday.

sz_grooveshark-2

The company reached a settlement agreement after being sued by a number of different record companies. One such suit brought by Universal Music Group was for $15 billion.

The notice on the company’s website says they “…have agreed to cease operations immediately, wipe clean all of the record companies’ copyrighted works and hand over ownership of this website, our mobile apps and intellectual property, including our patents and copyrights.”

Founded 9 years ago by three students at the University of Florida, this sees the end of the company that claimed to 35 million users they could “Play any song in the world, for free!”.

Other legitimate music streaming sites are available such as Spotify, Google Play, Beats Music, etc.

stuart.gilbertson
May 1, 2015
0
Share:

Critical Security Advisory: Shell Shock

The Shell Shock security flaw could be bigger than Heartbleed.

A serious security flaw recently discovered in the Bash command-line shell application has been nicknamed “Shell Shock”.

Bash, an acronym for Bourne Again Shell, is a command-line shell application that allows users to issue commands to launch programs, features and make changes by typing text into a console. It’s typically used by programmers and server administrators when making changes to their servers. Bash usually isn’t open to the general public nor made available to access over the Internet by unauthorised users, but Shell Shock changes that.

This isn’t a new vulnerability (although it’s only just been discovered),  in fact it’s been around for 20-25 years. It allows the user to manipulate “environment variables” to influence how the software responds and ultimately exploit the machine it is running on.

According to the National Institute of Standards and Technology this bug is rated a 10/10 in terms of severity:

NU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.

 

Authentication: Not required to exploit

 

Impact Type: Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service

Ultimately, the message of this blog post is to get your systems updated and patched immediately. This is a critical flaw in the security of a lot of servers around the world and failing to act could leave you open to data breaches.

All Consider IT Clients can rest safe in the knowledge that, as ever, we have already taken actions to mitigate this huge risk.

stuart.gilbertson
September 26, 2014
0
Share:

Consider IT achieves ISO 9001

Edinburgh based IT Support company, Consider IT has achieved the internationally recognised ISO 9001 standard, establishing us as one of the leaders in our field.

This independent assessment was conducted by the leading Certification Body, the British Assessment Bureau and demonstrates Consider IT’s commitment to customer service and quality in delivery.

Consider IT has now earned the right to display the coveted British Assessment Bureau ISO 9001 certification mark to demonstrate its conformance to the standard.

ISO 9001 was first introduced in 1987 and requires organisations to demonstrate that they do what they say they do and that they have a quality management system in place to ensure consistency and improvement; leading to high levels of performance and customer satisfaction. Certified organisations are committed to continuous improvement and are assessed annually to ensure progress is being maintained.

Consider IT’s Director, Stuart Gilbertson, said:

I am so pleased that the team at Consider IT have been able to achieve ISO 9001 certification as it underlines our commitment to our customers and our focus on quality.

 

This certification demonstrates that Consider IT can and does provide a consistent quality solution from quotation to delivery of services. As far as I’m aware, no other IT Support company in Edinburgh currently has this certification.

 

 

ISO-9001

stuart.gilbertson
February 18, 2014
0
Share:

Google Apps Service Disruption

At about 3:25pm yesterday (Monday 23rd September 2013), Google Apps suffered some service issues. Clients were noticing issues sending or receiving emails.

Google estimated that this issue affected less than 0.024% of the GMail user base.

Their team provided updates constantly every hour and at 7PM they confirmed the issue was much more widespread than first thought, affecting 50% of GMail users.

At 3AM this morning (24th September), Google confirmed that the issue was resolved and provided this statement:

As of 1600 Pacific Time, Gmail message delivery and attachment download is functioning normally for all users. We apologize for the duration of today’s event; we’re aware that prompt email delivery is an important part of the Gmail experience, and today’s experience fell far short of our standards. We have analyzed the data on user impact and are providing a preliminary assessment of what occurred:

Between 0554 and 1530 Pacific Time today, 29.1% of messages received by Gmail users were delayed. The average (median) delay was just 2.6 seconds, but some mail was more severely delayed. However, this issue did not affect users’ access to the Gmail page or other functionality.

stuart.gilbertson
September 24, 2013
0
Share:

South Korea hit by cyber attack

A cyber alert was issued by South Korea after a hacking attack on government websites. Media sites and even the website of the presidential office were hit by an apparently co-ordinated attack on Tuesday morning. The identity of the hackers was not known, a government statement said.

Messages praising North Korean leader Kim Jong-un and claiming that hacking collective Anonymous was responsible were left on the hacked websites. However, Anonymous denied any involvement in the South Korean cyber-attacks on its official Twitter account, AFP news agency reported. In fact, the group Anonymous was said to have planned attacks against North Korean websites.

A number of North Korean websites went offline on Tuesday morning and appeared to have been targeted by hackers on Tuesday, South Korea’s Yonhap news agency reported, citing unnamed sources.

BBC Report: http://www.bbc.co.uk/news/world-asia-23042334

 

stuart.gilbertson
June 25, 2013
0
Share:

Important Reminder: Support for Windows XP ends on 8th April 2014

The support for Windows XP with Service Pack 3 ends 8th April 2014. If you’re running Windows XP with Service Pack 3 (SP3) after support ends, to ensure that you will receive all important security updates for Windows, you need to upgrade to a later version, such as Windows 7 or 8.

stuart.gilbertson
May 16, 2013
0
Share:

How we did the Christmas Lights with a Raspberry Pi

Please remember this is a work in progress and we’ve just created this page on the fly!

The Raspberry Pi

The Raspberry Pi just runs one of the stock images available from the RaspberryPi.org site (Raspbian “wheezy”). On top, we’ve chucked Nginx and PHP. We’ve not given instructions on how to do the Nginx and PHP as a quick Google search shows enough information to allow you to do this 🙂 (You’ll notice that a lot of the content here simply says “Go Google”. Sorry about that!).

At this point you should make yourself aware of the GPIO pins on the Pi. Print out the schema so that you have it to reference: http://elinux.org/RPi_Low-level_peripherals

You can see the GPIO pins on the top left of the Pi

The Relay and the Remote

The relay board connects to the Pi using the pin outs. You’ll need to connect GND to a Ground pin on the Pi, and the VCC pin to the 5v pin on the Pi. From there, you have IN1, IN2, etc. which are just Relay 1, Relay 2 etc. respectively. Don’t change the jumper on the relay board, it should be set to VCC JD-VCC.

The Relay board is pictured below (click on it to see the full size image):

It was bought from Ebay via this link: http://www.ebay.co.uk/itm/New-5V-8-Channel-Relay-Module-Board-for-Arduino-PIC-AVR-MCU-DSP-ARM-Electronic-/170745298865?pt=UK_BOI_Electrical_Components_Supplies_ET&hash=item27c1367fb1

To make life easier (we originally ripped apart a floppy ribbon and it got verrrry messy and verrrry confusing for the brain!) you should probably buy these individual jumper wires below. The colour coded nature of them makes life easier when connecting between the Pi and the Relay board.

We bought ours from Hobby Tronics in the UK: http://www.hobbytronics.co.uk/ribbon-jumper-female-40?keyword=40JUMPERF

Last thing you’ll need is the remote control set we used. These are just plugs you connect to a wall socket and then pair with the remote control. For safety reasons we decided this was a better way to go about things rather than splicing mains cables into the relay board. It actually worked out even better as it meant we could position lights anywhere in the room without having to trail loads of wiring to the relay board.

Here’s a crude image of the box. We bought a cheap one from a local retail shop for £20. Fair word of warning here: We actually bought a different set to begin with, but the remote control PCB itself was horrible for soldering the wiring from the relays. Rather than buttons it had rubber electrodes that made the connection between the tracks on the PCB itself. This second set actually used proper switches, so it was easy to solder the connection into the appropriate hole in the PCB.

Each channel (there’s four channels to choose from) needs two relays to control. One sends the ON signal, and one sends the OFF signal.

So for example, here’s the PHP script for turning ON channel 1, which happens to be connected to GPIO4.

if( isset($_POST[‘action’]) )
{

$a = $_POST[‘action’];
if($a==”on”) {
exec(‘echo “0” > /sys/class/gpio/gpio4/value’);
sleep(0.75);
exec(‘echo “1” > /sys/class/gpio/gpio4/value’);
}

The first three lines are just checking that we’ve got a POST request coming in. The second if statement is checking that we’re turning the device ON. And then we set the signal on the GPIO4 pin. We echo 0 (which for some reason sets the pin live… I don’t know why), we wait 0.75 seconds to give the remote control unit time to send the wireless signal, and then we switch the relay off by echoing 1 to the same GPIO pin. There! The device is on!

To switch it off, you do the exact same, but wire up another GPIO to another Relay Switch, and then from there to the Off button on the Remote 🙂

 

Video

The video is just an RTMP-enabled web cam (It’s an Axis M1011, get it here ). The stream is picked up by Wowza broadcast software on an Amazon EC2 box.

This is then played via the website using JWPlayer (http://www.longtailvideo.com/jw-player/). It really is that simple! By allowing an Amazon EC2 box to provide the stream, it lessens the load on the web server providing the main content.

Chat

Nothing exciting about the chat to be honest, it’s just a copy of PHPFreeChat (get this here: http://www.phpfreechat.net/) tweaked to look nice within the design of our page. We were prepared to look at alternative chat methods should the load become an issue. An IRC server could have been set up within 15 minutes to lessen the load of the chat script. But at the time of writing, this wasn’t necessary.

The Code (Raspberry Pi end)

For each GPIO output, you need to set it up. We Googled, we found this:

echo $pin > /sys/class/gpio/export

echo “out” > /sys/class/gpio/gpio$pin/direction

We then chmod the specific pin to 777 (so that php/nginx can happily go about changing values):

 chmod 777 /sys/class/gpio/gpio$pin/value

It’s important to remember that $pin equates to one of the valid GREEN GPIO numbers from the schema. 4, 17, 22, etc. so re-write this as appropriate!

To make life easy, we added this to our /etc/rc.local file so that on boot, the Raspberry Pi would set up all the GPIO pins we were going to use:

echo “4” > /sys/class/gpio/export
echo “out” > /sys/class/gpio/gpio4/direction
chmod 777 /sys/class/gpio/gpio4/value

echo “17” > /sys/class/gpio/export
echo “out” > /sys/class/gpio/gpio17/direction
chmod 777 /sys/class/gpio/gpio17/value

etc. etc. etc. for all pins

Once you’ve got the relay hooked up, you can then go about testing the GPIO output:

echo “0” > /sys/class/gpio/gpio4/value

echo “1” > /sys/class/gpio/gpio4/value

If all is correct, you should see the LED on the Relay Board and hear the click of the Relay. It’s in your hands which way 0 or 1 goes with the relay (either on or off)!

The Code (The Queue System)

This is coming soon! It’s horribly horribly hacked together with two tables in a database. One is the Auth table (you get entered into this table when you log in with a username/Facebook) and a Queue table (this is populated when you click Join The Queue!). Lots of page refreshes later, the magic happens. More to follow!

stuart.gilbertson
December 11, 2012
0
Share:

Control our office Christmas Lights

It’s almost Christmas! This year we’ve taken our decorations to the extreme. We’ve given YOU the ability to log on to our website and take control over Christmas lights!

Jump onto http://christmas.considerit.com and join in the fun!

If it’s busy, you’ll need to wait in a queue for a little bit, but be patient, it’s a great laugh!

Let us know what you think by leaving a message on our Facebook page or sending us an email: [email protected]!

Have a really great Christmas!
The Consider IT Team

stuart.gilbertson
December 10, 2012
0
Share:

Co-Founder of Pirate Bay Arrested

Local police in Cambodia have announced that one of the founders of the Pirate Bay, Gottfrid Svartholm Warg, has been arrested as a result of an international warrant issued against him last April by his homecountry Sweden.

The country reacted after Warg failed to turn up for the beginning of his 1 year jail sentence for multiple copyright violations.

“His arrest was made at the request of the Swedish government for a crime related to information technology,” Cambodia’s police spokesman Kirth Chantharith told the AFP news agency.

“We don’t have an extradition treaty with Sweden but we’ll look into our laws and see how we can handle this case,” the spokesman added.

Warg, Fredrik Neij, Peter Sunde, and their financier Carl Lundstroem were convicted by a Swedish court for encouraging copyright violations in 2009. Lundstroem, Sunde and Neij each had their 1 year jail sentences reduced following an appeal in 2010. The appeal allowed their sentences to be reduced to between four and ten months. In addition, they were also ordered to pay the music and movie companies almost £4m ($7m) in damages for their copyright violations.

Warg did not attend the appeal with his defence lawyer citing being too ill as his reason. The Swedish court decided to uphold his sentence.

Incidentally, no copyrighted material is actually hosted on the Pirate Bay’s website, it simply acts as a linking site to its users torrent servers where the users themselves store the data.

stuart.gilbertson
September 2, 2012
0
Share:
1 … 4 5 6 … 9
CONSIDER IT FACEBOOK CONSIDER IT Twitter CONSIDER IT Linkedin

Contact Us

0131 510 0110
[email protected]
Find Us

Customer Service

Contact Us
Our Locations
Case Studies

Information

About Consider IT
Domains
Privacy Policy
Terms & Conditions
Press Enquiries

© 2025 Consider IT Limited – All Rights Reserved
Registered office: Waterview House, 37 Shore, Edinburgh, EH6 6QU. Company Number: SC320341 | VAT number: GB 930 1862 42
Consider IT is a trading name of Consider IT Limited