Checking remote control batteries

Quick Tip: If you need to check the batteries on your remote control, you can do it easily with a smar phone camera.

Many households have 5 or 6 remote controls lying around the house. Sometimes, they stop working and you don’t know what happened.

Most remote controls use infrared light to transmit the signal. The human eye cannot see this light, however a camera can.


Remote Control Check


Simply open your smartphone camera and point it at the business end of the remote control.  Press a few buttons on the remote and you should see a light emitting from the remote control.

If you fail to see a light emitting from the remote, then swap the batteries and repeat the test.


Remote Control Checker

Human eyes can’t see infra-red colour, but our phone cameras can.

Data Servers

Netgear ReadyNAS duoLooking for an efficient way to share, backup and remotely access your data?  If so, you need a data server, otherwise known as Network Attached Storage (NAS) device.

The Netgear ReadyNAS Duo is one example of a network attached box that holds two hard drives.  It connects to your router by LAN cable, using 1000 Mbps ports.  It also includes 1x USB 2.0 on the front of the device, and 2x USB 3.0 ports at the rear.

Netgears setup software allows you to create shared and/or private folders on the data server.  The data server also allows remote access to the devices folders, using VPN.

I installed a Netgear ReadyNAS Duo for a small business client recently.  This would also be very useful in the home environment, where the data server holds your media collection, making it available to all PCs in your home, and also allows you to remotely access the data server from work to retrieve an important document – while your PC is safely turned off.


If you would like to discuss a data server, contact Tailormade IT Solutions.

Microsoft Surface Tablets

Microsoft Surface

The Microsoft Surface tablet is due for release later this year, and will come in a ‘lite’ ARM processor version that runs Windows RT, and an Intel i5 chip version that will run the full Windows 8 desktop OS.

Microsoft recently previewed Windows 8 (see our post) and the new Surface tablet device.

Surface Specs (PDF)


Disabling Browser Autocomplete

Browser Autocomplete is a feature in most modern web browsers.  It’s a handy feature which saves time by storing passwords for later use.


Firefox Browser Autocomplete

 Firefox Browser Autocomplete

In this short example, I’ll use Internet Explorer to log into a Google account.  As you can see, Internet Explorer asks if I want it to remember this password.

Should I remember this password ?

Internet Explorer Browser Autocomplete


While this feature can be handy, it does present a security issue as a freely available hackers tool will mine these stored passwords and display them.


Hacker tool mines stored passwords

Hacker tool displays stored passwords


Disabling Browser Autocomplete is a simple process, which is shown below.


Turning off the Auto-Complete feature:

The Internet Explorer Auto-Complete feature can be disabled by following these steps.

  1. Open Microsoft Internet Explorer.
  2. Click Tools and then Internet Options.
  3. In the Internet Options window click the Content tab.
  4. Click the Auto-Complete Settings button.
  5. Uncheck the option User names and passwords on forms.

The Firefox Auto-Complete feature can be disabled by following these steps.

  1. Open Mozilla Firefox.
  2.  Click Firefox/Tools and then Options.
  3.  In the Firefox Options window click the Security tab.
  4. Click Saved passwords to view and clear history.
  5.  Uncheck the Remember passwords for sites option.



Windows 8 Release Preview

There has been lots of buzz about the new Windows 8 – some good, some bad.

Windows 8 includes a new user interface (UI) called “Metro” which is primarily designed for touch-screen devices.

Windows 8 Metro Start menu

Windows 8 Metro Start menu – Clicking the Desktop tile will lead the user to the traditional desktop.

Windows 8 traditional desktop

Windows 8 Traditional Desktop

Users wanting to access Windows 8 Media Centre will need to purchase Windows 8 Professional edition.

Windows 8 is due to be released in June 2012.

Additional photos are available on the Tailormade IT Solutions Facebook page


Avoiding dodgy emails

Avoiding dodgy emails

Phishing is an attack used by hackers to gain access to private information such as credit card numbers and user passwords.

Phishing is a social engineering attack where targets are typically duped into providing this information directly to false versions of legitimate websites run by the hackers. Personal information can then be used for fraudulent purchases, resale to third parties and even identity theft.


Pictured is a screenshot from a phishing email I recently received from a client who was suspicious.


What would the natural reaction from an account holder be?

“I never sent Nickolas Sims $498 – I’d better click the link and put a stop to this” Of course that sense of emergency may mean you get flustered and click the link and fall for the fake PayPal site. Enter your details and the bad guys have it.


So let’s have a look at the warning signs:

Incorrect recipient address information

The email is addressed to multiple recipients, as if this payment was made by you AND all your friends (I’ve obscured the email addresses for privacy)

Impersonal greeting

The email says “Dear PayPal Customer” – Phishing scams rarely know the real names of its targets and tend to rely on general greetings like Dear user. PayPal know your name and use it when emailing you.

Convoluted hyperlink

Hyperlinks in email messages should be distrusted in general, but long and convoluted hyperlinks like the one below should cause heightened suspicion.

Normally PayPal resides at the URL If you hover over one of the links (as shown below) you will notice the link actually goes to a website in – that’s Argentina.

No offer of additional information

There is a “Help Centre” link but that link goes to the same website address based in Argentina. In fact ALL links go to exactly the same address!

Warnings from email client

A well-designed email client may detect many of the irregularities listed as well as check for suspicious points of origin (e.g. spoofed emails) and links to insecure servers.

Warnings from web browser

If for some reason you actually clicked on the URL, your web browser might give another warning, alerting you that the URL has already been reported as a forgery, or is not secure.



Most phishing email messages wont contain all of the above characteristics and probably will contain other defining characteristics not mentioned. Phishing is an evolving practice due to its lucrativeness and increased usage by organized crime.

If you receive an email that contains one of the above characteristics then be extremely cautious. If the email is threatening the termination of a service, simply let it happen. No company worth doing business with is going to maintain its records by firing off thousands of email messages to various Hotmail and Yahoo accounts in hopes of reconciling its financials.

How can I protect myself from a phishing attack?


There are several steps you can take to protect your computer from today’s cyber threats. Following the simple guidelines below will help minimise the risk of attack.


  • Be very wary of any email messages asking for personal information. It’s highly unlikely that your bank will request such information by email. If in doubt, call them to check!
  • Don’t complete a form in an email message asking for personal information. Only enter such information using a secure website. Check that the URL starts with ‘https://’, rather than just ‘http://’. Look for the lock symbol on the lower right-hand corner of the web browser and double-click it to check the validity of the digital certificate. Or, alternatively, use the telephone to conduct your banking and report anything suspicious to your bank immediately.
  • Don’t use links in an email message to load a web page. Instead, type the URL into your web browser.
  • Check if your anti-virus program blocks phishing sites, or consider installing Kaspersky Internet Security (links below) or other antivirus software that alerts you to known phishing attacks.
  • Check your bank accounts regularly (including debit and credit cards, bank statements, etc.), to make sure that listed transactions are legitimate.
  • Make sure that you use the latest version of your web browser and that any security patches have been applied.


Protect your identity from phishing attacks

Prevent cybercriminals from stealing your digital identity thanks to anti-phishing protection technologies inside Kaspersky Lab’s Internet security software which leverage lists of known phishing websites, proactive anti-phishing technologies and the latest information from the cloud.


Kaspersky Internet Security 2012


Kaspersky Anti-Virus 2011 for Mac


Kaspersky Mobile Security 9

Upgrading to faster USB

USB3.0 Logo


Are you tired of waiting around for data to finish copying to and from USB sticks ?

Wish your transfers and backups could be faster ? They probably can… You are most likely using an outdated USB 2.0 connection, and USB 3.0 offers speeds up to 10 times faster !

USB3.0 v USB2.0 speed graph


Tailormade I.T. Solutions can cheaply upgrade your current PC to USB 3.0 specifications, by adding a USB 3.0 expansion card to your computer system.

USB3.0 card

You can then enjoy the benefits of the new generation of USB 3.0 sticks/drives. USB 3.0 is also backwards compatible so all your old, slow USB 2.0 drives will work too.

More Info:


Digital Image data

Users of digital cameras and smartphones should be aware that when they snap a picture, personal data may be embedded inside the picture. It’s referred to as EXIF data, and can include the Camera Make/Model, Date taken, GPS co-ordinates, etc.


If that picture is then uploaded to the internet, another person may download the picture and inspect the image data, including your GPS location.


Digital Image Security


In fact, EXIF Image data was recently used by the FBI and Australian Federal Police to track down a member of the hacker group ”CabinCr3w”.

“According to the FBI, data taken from the picture showed it was taken by an iPhone. GPS co-ordinates taken from the photo also pinpointed the exact Wantirna South street and house where it was taken.”



You can edit/remove this data from your images using EXIF Data Viewer, available on our Downloads page. This allows you to upload pictures to the internet without giving away personal information. Another option is to convert your JPG picture in to PNG format (which does not support embedded EXIF data) and upload the PNG file instead.


EXIF Dataviewer

The dangers of password reuse

With so many passwords to remember now days, and increasing security about how long, how complex, and how often they must be changed – it’s no surprise many of us reuse the same password on multiple websites.

Many websites


Unfortunately a current trend of hackers is to publicize usernames/passwords obtained from hacking websites, by posting them online for all to see. People have taken the information and logged on to people’s personal sites: taking money from PayPal accounts, replacing dating site profile pictures with pornographic images, and engaging in chats using other people’s Facebook accounts.


Time to make technology work for you.

The following video shows two methods used and recommended by Tailormade IT Solutions to overcome this problem.


Fingerprint Scanner

By using a fingerprint scanner, you can store a variety of complex passwords and just logon to your PC and/or web sites with a swipe of your finger. A lot of new laptops come with fingerprint scanners, and for other users USB fingerprint scanners are available.

The big benefit of fingerprint scanners are:


Password File

Keeping a password file stored safely inside a TrueCrypt encrypted vault ensures that you have a backup/reference of them. TrueCrypt supports AES encryption (which is used by the US military to encrypt data up to the top secret level)

How safe is TrueCrypt: Lets look at a real world story.

The Brazilian National Institute of Criminology tried for five months to obtain access to the encrypted data of a Brazilian banker suspected of financial crimes without success, before turning over the job to code-breakers at the FBI in early 2009. US computer specialists also drew a blank even after 12 months of efforts to crack the code.



The big benefits of using TrueCrypt are:

  • All passwords are stored securely and can be accessed by remembering one password – the TrueCrypt password.
  • As the password file is located on a secure USB stick, it is transportable.

Available for Windows 7 / Vista / XP, Mac OSX, and Linux.


Protecting data on your USB sticks

Everyone using USB sticks to transport valuable information should be using encryption – just in case it is lost.


In the news recently, the Dept of Defence has lost a USB drive containing sensitive health information of military personnel and their families. The data was on an unprotected USB drive misplaced by a researcher flying from Brisbane to Canberra on 11 May 2012. Source: Sydney Morning Herald




Tailormade IT Solutions has created a video that demonstrates how to protect your data by creating an encrypted USB stick using TrueCrypt, and shows the error message encountered if someone finds and tries to access the USB.

USB + TrueCrypt = Protection


Tailormade IT Solutions uses TrueCrypt encrypted USB sticks whenever transporting sensitive information.

TrueCrypt is FREE, open-source, disk encryption software and can be used to encrypt USB drives/Memory sticks – protecting your information in the event that you lose it.

Be wiser than the Dept of Defence and use it !

Download TrueCrypt

Available for Windows 7 / Vista / XP, Mac OSX, and Linux.