Frequently Asked Questions
- Is my computer secure?
- What is spyware?
- What is a virus?
- What is spam?
- What is the difference between DSL/Cable and T1 Internet connections?
- What is a network?
- Does my company need a network?
- Why do I need a domain?
- Why do I need a website?
- What is a database?
- What is SQL?
- What is the difference between MySQL and MS SQL?
- What is a transaction?
- What is transaction processing?
- What is a stored procedure?
- What is FTP?
- Why can’t I send files through email?
- Is the software that the CORE Group uses better that the software other people use?
- What is Network Design?
- What are Network Services?
- What is Network Security Strategy?
- What is Network Administration?
- What is a Wireless Network?
If you have to ask, probably not. In a study by ThreatFocus.com, an unprotected computer on a digital subscriber line (DSL) or Cable network was attacked over 200 times in just 4 minutes. If your computer has a wireless connection to the Internet, it is even less secure.
Any software that covertly gathers user information through the user’s Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about email addresses and even passwords and credit card numbers. Also called adware.
In computer security technology, a virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Thus, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells. Extending the analogy, the insertion of the virus into a program is termed infection, and the infected file (or executable code that is not part of a file) is called a host. In short, a virus is a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer; a true virus cannot spread to another computer without human assistance.
Spam is unsolicited email on the Internet. From the sender’s point of view, it’s a form of bulk mail, often to a list culled from subscribers to a Usenet discussion group or obtained by companies that specialize in creating email distribution lists. To the receiver, it usually seems like junk email. In general, it’s not considered good etiquette to send spam, and consistently sending unwanted email can be illegal. It’s generally equivalent to unsolicited phone marketing calls, except that the user pays for part of the message since everyone shares the cost of maintaining the Internet.
The term probably comes from a famous Monty Python skit that featured the word spam repeated over and over. The term may also have come from someone’s low opinion of the food product with the same name, which is generally perceived as a content-free waste of resources. (Spam is a registered trademark of Hormel Corporation.)
DSL (Digital Subscriber Line) is a technology for bringing high-bandwidth information to homes and small businesses over ordinary copper telephone lines. xDSL refers to different variations of DSL, such as ADSL, HDSL, and RADSL. Assuming your home or small business is close enough to a telephone company central office that offers DSL service, you may be able to receive data at rates up to 6.1 megabits (millions of bits) per second, enabling continuous transmission of motion video, audio, and even 3-D effects. More typically, individual connections will provide from 1.544 megabits per second (MBPS) to 512 kilobits per second (KBPS) downstream and about 128 KBPS upstream.
This broadband method uses the local cable television line to receive (broadband) Internet content at about 1.5 MBPS. This data rate far exceeds that of 28.8 and 56 KBPS telephone modems and the up to 128 KBPS of Integrated Services Digital Network (ISDN) and is about the data rate available to subscribers of DSL telephone service.
A T-1 line actually consists of 24 individual channels, each of which supports 64 KBPS. Each 64 KBPS channel can be configured to carry voice or data traffic. Most telephone companies allow you to buy some of these individual channels, known as fractional T-1 access. The T1 carrier is the most commonly used digital line in the United States, Canada, and Japan. In these countries, it carries 24 pulse code modulation signals using Time-Division Multiplexing at an overall rate of 1.544 megabit per second. T1 lines use copper wire and span distances within and between major metropolitan areas. A T1 Outstate System has been developed for longer distances between cities.
The term refers to any network of computers that can be used for person-to-person communication. Included in this are public networks such as the Internet, online membership networks such as America Online or CompuServe, and local networks such as the Santa Monica Public Electronic Network. Not included are computer networks whose primary purpose is not interpersonal communication, such as bank automated teller machine networks or computer processor power-sharing networks.
If you have four or more computers, you know how difficult file management can be. A server creates a centralized location for files that multiple users can access. Some people can manage a workaround by setting up a Peer to Peer or P2P network and designating one of the computers as a file share. But as you begin to add printers and domain security, managing a P2P network can become costly and create workflow issues that even a desktop running server software is unable to solve.
There is nothing more unprofessional than a business email address @yahoo.com. You can add professionalism to your company by registering a domain for as little as $9.99 per year. Doing so also allows you to begin to establish an online presence that will grow with your company and keep another company from taking your company name.
A website is the online component of your marketing portfolio. In many situations, an outdated website is worse than no website at all. Frequently, your website is the first impression your business makes with prospective clients; you don’t want it to be the last. Having a website with current information that is easily navigated will help your customers find you.
A database is a collection of computerized data information that has been systematically organized for easy access and analysis.
Structured Query Language. An industry-standard language for creating, updating and querying relational database management systems.
Microsoft Structured Query Language Server (MS SQL) originated from the enterprise level Sybase SQL Server, developed for mainframe operating systems, and is scalable for all database needs. MS SQL Server includes all leading database features that collectively provide invaluable advantages over business systems based on inferior platforms. MS SQL Server provides the highest level of data protection and backup, data replication, and transaction processing. MS SQL server includes an Enterprise Manager, a graphical interface providing database and table support (managing triggers, foreign keys, and stored procedures), database security, database replication, database backup, and overall database server monitoring and management. MS SQL Server is backed by Microsoft, one of the world’s largest providers of computer software. MS SQL Server is thoroughly documented with integrated Help, Online-Help, and Microsoft Developers Network (MSDN) support.
MySQL Server was designed from the start to work with medium-sized databases on small computer systems. MySQL Server has consistently lacked critical features needed to deliver a top-tier database development platform, including support for transaction processing, foreign keys and stored procedures. MySQL does not include a graphical user interface, and is instead administered using a command-line interface.
A transaction is a group of logical operations that must all succeed or fail as a group.
Systems dedicated to supporting transaction operations are known as transaction-processing systems.
A stored procedure is a program (or procedure) that is physically stored within a database.
Why should I pay extra for MessageLabs virus protection when Yahoo, America Online and Microsoft Network all give free virus protection?
We use MessageLabs email scanning service to provide our customers with the best possible anti-virus and anti-spam protection.
“MessageLabs is the leading provider* of managed email security services for businesses. Operating at Internet level, we offer industry-leading protection for thousands of organizations worldwide, against threats such as spam, viruses and other unwanted content before they reach their networks.”
“FTP” is the acronym for “File Transfer Protocol.” It refers to moving data (like a picture, music file (mp3), or any large document) from one computer or server to another. Because of disk space limits, many have trouble sending and receiving large files. Companies like YouSendIt are popularizing FTP solutions, but have time limits for files that customers transfer. We provide password-secured FTP sites that are billed based on usage, so the less you use, the less you pay!
When you send a file as an attachment via email, the file is copied into your Outbox. Then the file is copied into the recipient’s Inbox. If you send the file to a few people, multiple copies of the one file are made and replicated into each recipient’s Inbox. If the recipient is in the same company as you are, you are then taking one file from your computer and making multiple copies. When this is done with a larger file, the mail server is slowed down by this process and hard disk space is wasted. An FTP site acts as a single central location for transferring and sharing files between different people. This way you don’t tie up and slow down your mail server by sending large messages and you don’t end up with multiple copies of the same file.
We provide only accredited business-grade solutions to our customers. More often than not, saving a few dollars on third-party software or hardware will cost much more in the long run. Budget solutions have less documentation and less effective technical support available. This makes supporting these solutions more costly right from the beginning. We use only Microsoft professional software, HP servers, laptops and desktops, and Cisco routers and firewalls. Your investment in this equipment saves you thousands of dollars in installation, support, and security.
Network design is the process of organizing all the parts of a system of interconnected computers. This includes desktop computers (workstations), laptop computers, printers, servers, cabling, routers, firewalls, wireless base stations, smartphones, pda’s, and Bluetooth devices like a wireless keyboard or a wireless mouse. We do a fact-finding analysis that identifies the client’s computing needs. This is used as the basis for designing the client’s individual network.
Network services include cabling, adding new computers to a network, adding printers, email configuration, Domain Name Services (which puts a URL to an IP address), creating and managing domain policy to better control network resources and protect your environment, and performance monitoring. Network Services also includes our CORE Care Plan.
We will implement a security strategy that keeps you safe from hackers, viruses and spyware. This includes firewall security, and inbound and outbound network traffic from and to the Internet. We lock down services, ports, usernames and passwords. Software solutions include Cisco and Norton Utilities.
Network administration includes creating users, creating email boxes and space quotas, and managing and creating domain group policy.
A wireless network is any type of computer network that is not connected by cables.