ictronics
your partner in ict
Total Pageviews
Wednesday, July 13, 2011
Sunday, May 15, 2011
WELCOME ICTRONICS
We offer the following services:
Computer Maintenance
- New Computer Setup & Configuration
- Computer Clean Up
- Computer Upgrade - Hardware Installation
- Data Recovery
- Accidental Data Delete Recovery
- Damaged Drive Data Recovery (coming soon)
Software Services and Configuration
- Software Installation & Configuration
- Computer Restore CDs or DVDs (coming soon)
- Operating System Restore
- Operating System Installation & Upgrade
Computer Upgrade, Hardware Installation
- Internal & External Hard Drive Installation
- Video Card Installation & Replacement
- Network Card Installation & Replacement
- Processor replacement
Internet café and Secretarial Service
. Good speed internet service
. Typing
. Printing
. Scanning
Technical Support
. School
. Office
Contact:Tabata Chang’ombe Road
Opposite with VETA Staff Flats
Tel: +255 222 807 919
Mob: +255 717 430 980
E-mail:lewismtoi@yahoo.com
Saturday, April 9, 2011
Protecting Your Computer’s System from virus!
Today, more and more people are using their computers for everything from
communication to online banking and investing to shopping.
As we do these things on a more regular basis, we open ourselves up to potential
hackers, attackers and crackers. While some may be looking to phish your personal
information and identity for resale, others simply just want to use your computer as a
platform from which to attack other unknowing targets.
Below are a few easy, cost-effective steps you can take to make your computer more secure,
We can begin with:
communication to online banking and investing to shopping.
As we do these things on a more regular basis, we open ourselves up to potential
hackers, attackers and crackers. While some may be looking to phish your personal
information and identity for resale, others simply just want to use your computer as a
platform from which to attack other unknowing targets.
Below are a few easy, cost-effective steps you can take to make your computer more secure,
We can begin with:
1.Always make backups of important information and store in a safe place
separate from your computer.
2. Update and patch your operating system, web browser and software
frequently.
separate from your computer.
2. Update and patch your operating system, web browser and software
frequently.
3. Install a firewall. Without a good firewall, viruses, worms, Trojans, malware
and adware can all easily access your computer from the Internet.
Consideration should be given to the benefits and differences between
hardware and software based firewall programs.
and adware can all easily access your computer from the Internet.
Consideration should be given to the benefits and differences between
hardware and software based firewall programs.
should you do this? Active-X and JavaScript are often used by hackers to
plant malicious programs into your computers. While cookies are relatively
harmless in terms of security concerns, they do still track your movements on
the Internet to build a profile of you. At a minimum set your security setting for the “Internet zone” to High, and your “trusted sites zone” to Medium Low.
5. Install anti-virus software and set for automatic updates so that you
receive the most current versions.
6. Do not open unknown email attachments. It is simply not enough that you
may recognize the address from which it originates because many viruses
can spread from a familiar address.
7. Do not run programs from unknown origins. Also, do not send these
types of programs to friends and coworkers because they contain funny or
amusing stories or jokes. They may contain a Trojans horse waiting to infect
a computer.
8. Disable hidden filename extensions. By default, the Windows operating
system is set to “hide file extensions for known file types”. Disable this option
so that file extensions display in Windows. Some file extensions will, by
default, continue to remain hidden, but you are more likely to see any unusual
file extensions that do not belong.
9. Turn off your computer and disconnect from the network when not
using the computer. A hacker cannot attack your computer when you are
disconnected from the network or the computer is off.
10. Consider making a boot disk on a floppy disk in case your computer is
damaged or compromised by a malicious program. Obviously, you need
to take this step before you experience a hostile breach of your system.
Kwa maelezo zaidi na ushauri tuwasilane;
ictronics
Mobile :+255 717 430 980.
E-mail:mtoi.ictronic.lewis@gmail.com.
Friday, April 8, 2011
Sites na magazeti yanayotoa habari mbalimbali mpya za ict.
Zipo sites ambazo hutoa taarifa mbalimbali za technolojia mpya.
kuna Dailytech.com, Engadget.com, ArsTechna.com na Techncrunch.com tembela sites hizi ili uongezee maarifa zaidi,toa maoni na kama ikiwezekana ongezea unazozifahamu.
kuna Dailytech.com, Engadget.com, ArsTechna.com na Techncrunch.com tembela sites hizi ili uongezee maarifa zaidi,toa maoni na kama ikiwezekana ongezea unazozifahamu.
Thursday, April 7, 2011
JINSI YA KU DOWNLOAD UBUNTU!
http://www.ubuntu.com/desktop/get-ubuntu/download
Wednesday, April 6, 2011
PATA TAARIFA ZA LINUX!
Unaweza kupata taarifa mbalimbali za linux kupitia link hii;
http://www.linuxtopia.org/
http://www.linuxtopia.org/
Subscribe to:
Posts (Atom)