Custom margins and backgrounds in Word

This tip will show you how to insert a bordered picture as a background into Microsoft Word and adjust the margins so you can compose text in Word for a poster or certificate etc. We’ll use an example picture created in the free Adobe Spark, downloaded A4 size, but similar pictures with wide borders can

Planning your website

Inspiration Look at a range of sites that perform a similar role. What doesn’t work, is distracting or is frustrating? What content do you see first? How are menus and pages organised? How many clicks to find things? How far did you need to scroll? How much text? How many images? Stages Lists and brief

Password best practice and Password Managers

Best practice for any important online account is to use a unique, complex random password and to update it periodically.  This can be an inconvenient demand if you have many passwords memorised but becomes easy with a Password Manager.   What is a Password Manager? An App or feature that records, stores then auto-fills usernames

Switching between Windows & Mac

Switching between Windows & Mac Keyboard differences Win10:Use the  Start button (Win Key) to the left of the spacebar to launch the main menu. Hold the Start key down in combination with other keys for shortcuts. OSX: Use the  Option button for similar functions as the Win button. ProTip: The Alt key on a Windows

Phishing email attacks and socially engineered messages

Both individuals and organisations are regularly targeted by criminals attempting to collect confidential information and accounts. Phishing attacks are a common method used by online scammers to fool you into giving out private information or tricking you into entering your information or passwords into fake websites. Phishing emails and messages try to look genuine, and

First steps in response to ransomware

How do I know I have been attacked by ransomware? The first sign may be a “ransom letter” appearing in a new text file, your browser or desktop created by the ransomware alerting you to on-going damage with instructions and threats. Your work files may appear corrupted or unusable. How did I get attacked? Ransomware

How to take precautions against ransomware

Ransomware is malicious software that encrypts files on a victim’s device or drives. The encrypted files are then unusable to anyone without the encryption key. Once the attack starts the ransomware warns the victim on how to pay a ransom in order to unlock their data. The cyber criminals may also threaten to expose or

Connection troubleshooting with the NL1901ACV modem

For broadband connection issues, first follow these troubleshooting steps. After each step test your internet connection. Please note: to restart the modem, use the round On/Off button in the side. A restart can 2 or 3 minutes. Are the Power and Broadband service lights green? Your service will be either DSL , WAN or LTE

Set Chrome spell check to English (Australia)

When you are composing text directly into a web application such as Online TLDS you will need to rely on the spell checker built into your browser. To improve your experience, you can set the spell checker to English (Australia) Click the  ellipses button in the top right corner of the Chrome browser toolbar. From

How to AutoArchive your IMAP email in Outlook 2016

When your inbox starts to receive full quota alerts you can turn on Auto-Archive.  This will free up space and move mail to a local personal folder. For POP and IMAP accounts, Outlook lets you create an Archive folder or choose an existing folder to use as an Archive. You can set AutoArchive by mail

Go to Top