Initial Consultation Is Free

+44 7483 285829

We Are Here To Help

Your Questions And Our Answers

We have answers to a variety of questions for you below

Helpful answers to important questions

Some Of The Questions You Have Asked

An SSL (secure sockets layer) certificate is a digital certificate that both authenticates the identity of a website, and encrypts sensitive information so that any passwords, addresses or credit card numbers, etc,  cannot be intercepted or read by anyone other than the intended recipient.

Phishing is a con game that scammers use to collect personal information from unsuspecting users. The false e-mails often look surprisingly legitimate, and even the Web pages where you are asked to enter your information may look real. They are normally received as e-mails that appear to come from legitimate websites such as eBay, PayPal, or other banking institutions. The e-mails state that your information needs to be updated or validated and ask that you enter your username and password, after clicking a link included in the e-mail. DON’T be tempted. If you receive an e-mail that asks that you update your information and you think it might be valid, go to the website by typing the URL in your browser’s address field instead of clicking the link in the e-mail.

We are not referring to Something Posing As Meat, in this instance the name refers to junk e-mail or irrelevant postings to a newsgroup, social media or bulletin board. The unsolicited e-mail messages you receive about refinancing your home, reversing aging, and cheap sunglasses are all considered to be spam. 

A Firewall acts as a barrier between a trusted system or network and outside connections, such as the Internet. However, a computer firewall is more of a filter than a wall, allowing trusted data to flow through it. Both Windows and OS X (for the Mac) include built-in firewalls, but more advanced firewall utilities can be installed with Internet security software. Most firewalls use a combination of rules to filter traffic, such as blocking known threats while allowing incoming traffic from trusted sources. A firewall can also restrict outgoing traffic to prevent spam or hacking attempts.

Trojan horses are software programs that masquerade as regular programs, such as games, disk utilities, and even antivirus programs. But if they are run, these programs can do malicious things to your computer. For example, a Trojan horse might appear to be a computer game, but once you double-click it, the program starts writing over certain parts of your hard drive, corrupting your data. While this is certainly something you want to avoid, it is good to know that these malicious programs are only dangerous if they are given a chance to run. Also, most antivirus programs can catch Trojan horses when scanning for viruses. Unlike viruses, however, Trojan horses don’t replicate themselves. Though it is possible for a Trojan horse to be attached to a virus file that spreads to multiple computers. So as a general rule, don’t open a program unless you know it is legitimate.

Like a biological virus, a computer virus is something you don’t want to get. Computer viruses are small programs or scripts that can negatively affect the health of your computer. These malicious little programs can create files, move files, erase files, consume your computer’s memory, and cause your computer not to function correctly. Some viruses can duplicate themselves, attach themselves to programs, and travel across networks. Opening an infected e-mail attachment is the most common way to get a virus.

We all know it’s hard enough to get a computer to work well when it is healthy, let alone when it has been attacked by a virus. Therefore, it is better to prevent an attack than to try and cure it. There are many antivirus programs available that scan incoming files for viruses before they can cause damage to your computer. Some of these programs include Norton AntiVirus, McAfee VirusScan, and Kaspersky as well as many other excellent examples. We recommend you have one of these programs on your computer to prevent a virus attack.

Short for “malicious software,” malware refers to software programs designed to damage or do other unwanted actions on a computer system. Common examples of malware include Viruses, Trojan Horses, and Spyware. Viruses, for example, can cause havoc on a computer’s hard drive by deleting files or directory information. Spyware can gather data from a user’s system without the user knowing it. This can include anything from the Web pages a user visits to personal information, such as credit card numbers.

As the name implies, this is software that “spies” on your computer. Nobody likes to be spied on, and your computer doesn’t like it either. Spyware can capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information. If left unchecked, the software can transmit this data to another person’s computer over the Internet. So how does spyware get on your computer? Just like viruses, spyware can be installed when you open an e-mail attachment containing the malicious software. It can also be installed when you install another program that has a spyware installer attached to it.

Adware is free software that is supported by advertisements. Common adware programs are toolbars that sit on your desktop or work in conjunction with your Web browser. They include features like advanced searching of the Web or your hard drive and better organisation of your bookmarks and shortcuts. Most adware is safe to use, but some can serve as spyware, gathering information about you from your hard drive, the Web sites you visit, or your keystrokes.

SEO or Search Engine Optimisation is not rocket science, despite what some so-called experts will try and tell you. At the most basic level, it is simply ensuring that the content you write for your website, is relevant to what the page or website is about. This in turn, will bring more visitors (often referred to as traffic) to your site. It’s a sort of quality control for websites.

By taking the time and effort to understand what kind of content potential customers or visitors to your site are looking for, and therefore how to phrase it in terms they can recognise, you are almost guaranteeing an increase in traffic. Clearly there is much more to it than that, and I am not going to go in to it in more detail here, however, just ensuring you follow this simple advice will get the results you are looking for.

Short for “Web Log,” this term refers to a list of journal entries posted on a Web page. Anybody who knows how to create and publish a Web page can publish their own blog. Some Web hosts have made it even easier by creating an interface where users can simply type a text entry and hit “publish” to publish their blog.

Because of the ease of creating a blog, many people (often young kids and adults) have found a new presence on the Web. People are now sharing their personal feelings and experiences with thousands of people around the world. Blogs are typically updated daily, monthly, or anywhere in between.

A Browser is the interface used to view pages on the internet or World Wide Web. The browsers in common use are Internet Explorer (Or the EDGE if you use Windows 10), Firefox, Google Chrome, Safari and Opera.

IT Professionals use terms such as “cross-browser compatible”  which means that your website works on the major internet browsers: Internet Explorer, The EDGE, Google Chrome, Firefox, Safari, and Opera.

At Busy Sheep Designs, all our web sites are designed to high standards and they are fully compatible with any of the internet browsers listed above.

ISP literally means Internet Service Provider. It is a service (most of the time paid for) which allows you to connect to the Internet.

Why use an ISP?

Unless you have a specialised line (other than a telephone line), you cannot connect directly to the internet using your telephone line. Indeed, the telephone line was not designed for this:

  • it was originally designed to transport “voice”, i.e. a frequency modulation in the range of the voice tone

  • telephone servers only know how to start a conversation from a telephone number

  • unless you resort to a special service, generally it is not possible to have communication between more than two points…

So, the internet service provider is an intermediary (connected to the internet by specialised lines) which gives you access to the Internet, using a number which you enter using your modem, and which enables a connection to be established.

How does the ISP connect you to the Internet?

When you are connected to the Internet through your service provider, communication between you and the ISP is established using a simple protocol: PPP (Point to Point Protocol), a protocol making it possible for two remote computers to communicate without having an IP address.
In fact your computer does not have an IP address. However an IP address is necessary to be able to go onto the Internet because the protocol used on the Internet is the TCP/IP protocol which makes it possible for a very large number of computers which are located by these addresses to communicate.

Put simply, A cookie is a small piece of data that a website asks your browser to store on your computer or mobile device. The cookie allows the website to “remember” your actions or preferences over time. Most browsers support cookies, but users can set their browsers to decline them and can delete them whenever they like.

For a small and medium size business (SMB), the benefits of cloud computing is currently being driven by adopting the technology. In the SMB sector there is more likely to be a lack of time and financial resources to purchase, deploy and maintain an infrastructure (e.g. the software, or the server and associated storage).

In cloud computing, small businesses can access these resources using an Internet connection and Web browser. They can expand (or shrink) services as their business needs change. The pay-as-you-go subscription model is designed to let SMBs easily add or remove services and you will typically only pay for what you use.

A good example of this would be the cloud facility known as Drop Box, which offers a subscription service for on-line (cloud based) data storage. Here at Busy Sheep, we make full use of Drop Box to maintain backups of all the web sites we administer.

Despite the term only recently appearing more and more in technical discussions, it is not new. As far back as 1989, the first domestic appliance to be connected to the internet, a toaster, was unveiled. In its’ simplest form, it is about connecting all manner of devices, and letting them talk to us, to applications, and to each other.

It is most commonly used (in the UK at least), in domestic heating and energy use, with the roll out of smart meters by energy companies. It is more than just smart homes and domestic appliances though, and can be scaled up to include smart cities – with, for example smart traffic lights that monitor traffic frequency, or what about smart rubbish bins that signal when they need to be emptied. Industry uses the system with connected sensors for everything from tracking and locating parts or stock (robotic warehouses) to monitoring crops or livestock (via wi-fi enabled ear tags) in a field.

A URL is, in non-technical terms, the address for a website. URL stands for Uniform Resource Locator. Web addresses usually start with the letters WWW (believe it or not that actually stands for World Wide Web), and end with a dot followed by letters that indicate the type of website it is. I have included a few examples below.

  • .com = commercial enterprise or business.
  • .org = non-profit organisation.
  • .gov = a government agency.
  • .mil = a military agency.
  • .net = another ending for a commercial enterprise or business.
  • .edu = an educational  establishment.

All countries that have access to the internet also have country codes associated with them, for example:

  • .co.uk = commercial enterprise or business in the UK.

On the Internet, in order to access a website, you need to type in the web address (or URL) into the address box on the browser (normally the top line of the browser). For example, to get to the website of the Busy Sheep Designs company, you would type www.busysheepdesigns.co.uk in the address box. Note how, by adding the www prefix and the .co.uk suffix to the address it automatically becomes formatted as a hyperlink, and the colour changes, when entered in to a page or document.

E-Commerce is an abbreviation for the term Electronic Commerce, and at the simplest level it refers to the buying and selling of anything online. In fact, any form of business transaction conducted electronically is E-Commerce.

Examples Of E-Commerce Include:

  • Online Shopping –            Amazon, Supermarkets etc
  • Electronic Payments –    Utility bills for example
  • Online Auctions –             Ebay is a prime example
  • Internet Banking –            Either directly via the bank website or via an approved app.
  • Online Ticketing –             Music events, sports events etc.

These are just some of the ways that E-Commerce is shaping the way we pay for goods and services.

Web hosting is a service that allows organisations and individuals to post a website or web page on to the Internet. A web host, or web hosting service provider, is a business that provides the technologies and services needed for the website or web page to be viewed in the Internet. Websites are hosted, or stored, on special computers called servers.

When Internet users want to view your website, all they need to do is type your website address into their browser. Their computer will then connect to your server and your webpages will be delivered to them through the browser.

Most hosting companies require that you own your domain name in order to host with them. If you do not have a domain name, the hosting companies will help you purchase one. Here at Busy Sheep, we tend to stick with just a couple of hosting companies, and have no hesitation in recommending GoDaddy ,123-Reg or Viking Hosting You can find out more about anyone of our recommendations by clicking on the name of the service. 

This is a question that is often asked, and in all honesty there is no real answer. However, after doing some research on your behalf, we have decided to put Google’s G-Mail at the top of our list of ‘free’ e-mail systems.

PROS / Gmail offers integrated video chat.

CONS / It has inbox ads.

Our research shows Gmail is the most secure and user-friendly email service (in our opinion), and it includes many extras to make your email experience the best. One of the earliest ways that Google attempted to take over the internet was by releasing Gmail to the public in 2007. Since then, Gmail has become the new standard as the best free email program. This service provides a free email account that is always upgrading to stay ahead of its competition. It includes spam filtering, free cloud storage, POP3 and IMAP support. Gmail’s incredible service combines video chat, social media and account protection. These characteristics make Gmail the winner for free email services, (again this is only in our opinion).

If you are interested in setting up a Gmail account for yourself, simply follow these instructions:

  1. Go to www.gmail.com.
  2. Click Create account.
  3. The signup form will appear.
  4. Enter the requested details and choose your Gmail id and password.
  5. Review Google’s Terms of Service and Privacy Policy, click the check box, then click Next step.
  6. Here, you’ll have an opportunity to set up recovery options. 
  7. Your account will be created, and the Google welcome page will appear.

got a question to ask? we can help

Let's get knowledgeable together