Quick tips on securing your photos and data in the cloud

Unless you’ve been living under a rock you would have heard about the privacy-shattering scandal which saw personal photos of celebrities like Jennifer Lawrence and Victoria Justice released to the ogling masses. But what can we learn from it? At the time of writing,...

Facebook Lockdown 101 – Level 1

The necessity for locking down your Facebook profile is inarguable, the problem is the process is both complex and constantly evolving. Below you will find a few steps to follow that will help you to both control your profile privacy and seek to understand what many...

Stay Smart Online – Part 1

Stay Smart Online – Part 1 A recent study shows that Australians are among the most likely to fall into online traps such as fake alerts and phishing E-mails. Demonstrating an overall poor awareness of basic knowledge necessary to stay safe online. Unfortunately, this...

Tethering your iPad to your iPhone

Tethering your iPad to your iPhone via Wi-Fi The instructions below will guide you through connecting your iPhone and iPad together for the purpose of sharing your phone’s Internet connection with your iPad. This is especially useful to those who own a Wifi-only iPad...

Spring Clean your Facebook Profile

Spring Clean your FaceBook Profile This article has been inspired by the upcoming release of FaceBook’s ‘Graph Search’ function, a revolutionary new search concept that will allow users to find an amazing amount of information about things such as restaurants, holiday...

Protecting your Facebook Account

Protecting your FaceBook Account Ever had your FaceBook Account hijacked? Concerned about what people can discover about you through your online profile?

6 Steps to Secure Passwords

Six Simple Steps to Secure Passwords Time to change your password? Below I have compiled a procedure for taking a simple phrase and ending up with a secure passphrase that will keep would-be intruders guessing longer than their patience allows. The need for a secure...

Accessing your Webmail

Accessing your Webmail Our customers can easily enjoy the convenience of Webmail, freely included in all of our E-mail and Web Hosting packages. In order to make use of this feature, please review the How do I access my Webmail section below. What is Webmail? Webmail...

Configuring your E-mail Client

Configuring your E-mail Application to send and receive E-mails through your Shadow Connected I.T. Hosting System is relatively straight forward by following the steps below. What is an E-mail Application Quite simply, an E-mail Application (or MUA – Mail User Agent)...