What are Virtual Servers?

What are Virtual Servers? Server virtualization is the partitioning of a physical server into smaller virtual servers to help maximize your server resources. In server virtualization the resources of the server itself are hidden, or masked, from users, and software is used to divide the physical server into multiple virtual environments, called virtual or private servers. This is in contrast to...

Read More

Why are backups important?

Why are backups important? Computers fill our life and our work. They faithfully accumulate our wedding pictures, our company’s books, and the ceaseless emails we get and send. But, unless you back it up, all that data can be gone like a flash of lightning. Backups protect you from hardware failure Computers are more reliable than ever, so its easy to forget or put off backing up your...

Read More

Anti-spam law could mean headaches for small businesses

Anti-spam law could mean headaches for small businesses Small businesses that use e-mail for marketing and promotions are being urged to get ready for new anti-spam rules taking effect July 1. Canada’s Anti-Spam Legislation, or CASL, is believed to be the toughest law of its kind in the world. It is aimed at cracking down on phishers, identity thieves, and the sheer volume of unwanted e-mail...

Read More

A Private Cloud for your company?

A Private Cloud for your company? A Private cloud is the phrase used to describe a cloud computing platform that is implemented within the corporate firewall, under the control of the IT department. A private cloud is designed to offer the same features and benefits of public cloud systems, but removes a number of objections to the cloud computing model including control over enterprise and...

Read More

Why is it important to block Port 25 on your firewall?

I thought I’d write a post to explain why it is good procedure to block Port 25. Port 25 if you’re not aware is the SMTP port used by mail servers to send email. The popular trend with viruses now are to install “zombie processes” on infected machines. These zombies are then used as spam mail servers – sending continuous streams of spam out to random addresses. Not only is this going to slow...

Read More