<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Your IT Local &#124; Problems Solved &#124; Local IT Services</title>
	<atom:link href="http://youritlocal.com.au/feed/" rel="self" type="application/rss+xml" />
	<link>http://youritlocal.com.au</link>
	<description></description>
	<lastBuildDate>Thu, 09 Apr 2015 03:33:37 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.25</generator>
	<item>
		<title>Wireless Networking</title>
		<link>http://youritlocal.com.au/wireless-networking/</link>
		<comments>http://youritlocal.com.au/wireless-networking/#comments</comments>
		<pubDate>Thu, 05 Mar 2015 04:22:48 +0000</pubDate>
		<dc:creator><![CDATA[yourit]]></dc:creator>
				<category><![CDATA[Your IT Local]]></category>

		<guid isPermaLink="false">http://youritlocal.com.au/?p=2245</guid>
		<description><![CDATA[Is your wireless connection constantly dropping out? Are you sick of not being able to access the internet or network in various parts of your house? These days wireless networks are extremely common amongst home and business users, however too often these wireless networks have not been [&#8230;]]]></description>
				<content:encoded><![CDATA[
<p style="text-align: center;"><a href="http://youritlocal.com.au/wp-content/uploads/2015/03/WiFi.jpg" rel="wp-prettyPhoto[2245]"><img class="aligncenter size-full wp-image-2268" src="http://youritlocal.com.au/wp-content/uploads/2015/03/WiFi.jpg" alt="Wireless Networks" width="960" height="204" /></a></p>
<p style="text-align: center;"></p>
<p style="text-align: center;"><em>Is your wireless connection constantly dropping out? </em></p>
<p style="text-align: center;"><em>Are you sick of not being able to access the internet or network in various parts of your house?</em></p>
<p style="text-align: center;"></p>
<p>These days wireless networks are extremely common amongst home and business users, however too often these wireless networks have not been set up properly and often cause the end user more frustration than previously anticipated.  Fortunately there are some common reasons that wireless networks perform badly that can be addressed with a little bit of research or by involving a Your IT Local professional.  If you are looking to have your wireless network installed or reconfigured properly by a professional, please don&#8217;t hesitate to call us on <span style="color: #ff0000;"><strong>(02) 9211 2706</strong></span> or email us at <strong><span style="color: #ff0000;">helpme@youritlocal.com.au</span></strong>.</p>
<div class="callToAction"><a title="Send us an email!" href="mailto:helpme@youritlocal.com.au"><img class="leftCA" src="/wp-includes/images/emailNowButton.png" alt="Email Now" /></a> <img class="centerCA" src="/wp-includes/images/or.png" alt="" /> <a title="Call us!" href="tel:0292112706"><img class="rightCA" src="/wp-includes/images/callNowButton.png" alt="Email Now" /></a>
<div class="clearfix"></div>
</div>
<p>So why is your wireless network performing badly?  There are countless reasons that could be leading to a poor performing wireless network and allthough we can&#8217;t cover them all in a short article we will try and touch on the most common reasons.</p>
<ol>
	<li><strong>Physical Obstruction</strong>
<ul>
	<li>This might seem obvious, but often this is not taken into consideration in the installations that we frequently come out to fix.  Obstructions can include, buildings, walls and ceilings.  The more obstructions between the transmitter and the receive the more likely it is that the signal will be effected.  The idea, if possible is to try and keep line of sight between the transmitter and receiver, if this is not possible then other methods are used to overcome physical obstructions.  These can include repeaters, additional access points, lower frequencies and powerline adapters.</li>
</ul>
</li>
	<li><strong>Distance between devices</strong>
<ul>
	<li>This again might seem obvious, however the further apart 2 network devices the more the signal drops.  As a signal travels further it also covers a wider area and the signal strength drops and becomes weaker.  Roughly as a distance is doubled a signal will come 8 times weaker.  This is over come using additional access points, repeaters, strategically locating the transmitting device and powerline adapters.</li>
</ul>
</li>
	<li><strong>Interference</strong>
<ul>
	<li>Wireless networks are becoming more and more common and because of this there is more wireless data traveling through the air waves.  When similar frequencies are operating in the same area they can cause interference with each other.  This means that the more popular the frequency the worse the network can operate.  Often times frequency bands in the 2.4GHz band can be severely effected by overcrowding to the point where devices will not operate at an acceptable levels.  Other wireless technologies can also effect wireless performance, this can include mobile phones, microwaves ovens and an array of other devices.  To overcome this issue it is important to be aware of other which frequencies are being used in the area and then choose the right settings for your wireless to perform with minimal interference from your surroundings.</li>
</ul>
</li>
	<li><strong>Signal Sharing</strong>
<ol>
	<li>When many users operate on the same wireless network, the wireless access point has to communicate with all of the users at the same time.  Often networking equipment may not be built to handle the volume of users using the network and because of this the wireless network may perform poorly. To overcome this, it is important to choose quality hardware that is capable of providing a service suited to your environment and requirements.</li>
</ol>
</li>
</ol>
<p>These are the most common and obvious reasons a wireless network can perform poorly and cause dropouts and inconsistent connections, however there are many more reasons that could be effecting your network. If you would like some common troubleshooting tips for wireless networks click <a title="Wireless Networking - Troubleshooting and Optimising" href="http://youritlocal.com.au/wireless-networks-troubleshooting-and-optimising/http://">here</a>.</p>
<p>If you are experiencing wireless dropouts, slow wireless or you would just like to have a wireless connection installed, please do not hesitate to contact us on <strong><span style="color: #ff0000;">(02) 9211 2706</span></strong> or email us at <span style="color: #ff0000;"><strong>helpme@youritlocal.com.au</strong></span></p>
<p>&nbsp;</p>
<div class="callToAction"><a title="Send us an email!" href="mailto:helpme@youritlocal.com.au"><img class="leftCA" src="/wp-includes/images/emailNowButton.png" alt="Email Now" /></a> <img class="centerCA" src="/wp-includes/images/or.png" alt="" /> <a title="Call us!" href="tel:0292112706"><img class="rightCA" src="/wp-includes/images/callNowButton.png" alt="Email Now" /></a>
<div class="clearfix"></div>
</div>
]]></content:encoded>
			<wfw:commentRss>http://youritlocal.com.au/wireless-networking/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Computer Peformance</title>
		<link>http://youritlocal.com.au/computer-peformance/</link>
		<comments>http://youritlocal.com.au/computer-peformance/#comments</comments>
		<pubDate>Thu, 05 Mar 2015 04:18:19 +0000</pubDate>
		<dc:creator><![CDATA[yourit]]></dc:creator>
				<category><![CDATA[Your IT Local]]></category>

		<guid isPermaLink="false">http://youritlocal.com.au/?p=2248</guid>
		<description><![CDATA[Computer running slow? Taking a long time to load? Are you worried about viruses and malware? As computers become more complex and powerful, we begin to rely on them more and more to complete tasks that were usually designated for other systems.  This reliance on computers means that [&#8230;]]]></description>
				<content:encoded><![CDATA[
<p style="text-align: center;"><a href="http://youritlocal.com.au/wp-content/uploads/2015/03/Computer-Performance.jpg" rel="wp-prettyPhoto[2248]"><img class="aligncenter size-full wp-image-2265" src="http://youritlocal.com.au/wp-content/uploads/2015/03/Computer-Performance.jpg" alt="Computer Performance" width="960" height="204" /></a></p>
<p style="text-align: center;"><em>Computer running slow?</em></p>
<p style="text-align: center;"><em>Taking a long time to load?</em></p>
<p style="text-align: center;"><em>Are you worried about viruses and malware?</em></p>
<p>As computers become more complex and powerful, we begin to rely on them more and more to complete tasks that were usually designated for other systems.  This reliance on computers means that we start to use more applications than ever before that can start to put load on the computer causing it to run slowly.  Additionally, with the abundance of applications and our reliance on computers to perform personal tasks (such as banking and shopping) computers have become targets for hackers and malicious software developers in order to try and gain access to your data for their owner personal gain (for more information on malicious software click <a title="Malware Article" href="http://youritlocal.com.au/viruses-malicious-software-everything-you-need-to-know/http://">here</a>.  Fortunately there are many precautions that can be taken in order to speed your computer up and protect it from malicious software and viruses.</p>
<p>&nbsp;</p>
<div class="callToAction"><a title="Send us an email!" href="mailto:helpme@youritlocal.com.au"><img class="leftCA" src="/wp-includes/images/emailNowButton.png" alt="Email Now" /></a> <img class="centerCA" src="/wp-includes/images/or.png" alt="" /> <a title="Call us!" href="tel:0292112706"><img class="rightCA" src="/wp-includes/images/callNowButton.png" alt="Email Now" /></a>
<div class="clearfix"></div>
</div>
<p>&nbsp;</p>
<p>Contrary to the belief of many, it doesn&#8217;t matter whether your computer is a mac based computer or a windows based computer, all computer share in their vulnerability to performance and security related issues.   Below we will outline some of the common causes for slow computers as well as some common ways to protect your computers from security vulnerabilities.</p>
<ol>
	<li><strong>Old Hardware</strong>
<ul>
	<li>These days technology and software develops at an extremely fast rate which causes computers to become outdated rather quickly.  As new software is developed, it&#8217;s demand for faster hardware increases.  A computer 2-3 years old now is most likely due for an upgrade and could be causing a great deal of frustration to it&#8217;s end user.  Various new components can increase the speed of an older computer a great deal, things such as an increase in RAM or an upgrade to a solid state harddrive could have a hugely positive effect on the performance of your computer.</li>
</ul>
</li>
	<li><strong>Old software</strong>
<ul>
	<li>As technology has developed so has the software, but what we have seen in recent years is software being developed for the use on tablets.  What this has meant is that it has been developed to run on lower specification hardware, so often new operating systems can perform better on older hardware.  Many people have experienced huge speed increases by updating their operating system or completely upgrading to the newest operating system.  The same goes with applications and firmware for devices (most of the time).  If your computer or device is starting to slow down, it may be time to update your old software.</li>
</ul>
</li>
	<li><strong>Hard drive maintenance</strong>
<ul>
	<li>Often times we go on using computers without worrying about taking care of them properly.  Due to this, it is not uncommon for us to see a very small amount of available space on computer&#8217;s hard drives.  This can lead to there not being enough space for the computer operate to it&#8217;s maximum performance.  Additionally, hard drives can often be fragmented or corrupted which could lead to the computer having a hard time finding the right information when it is needed.  To overcome this, it is important to ensure that there is plenty of free space, especially on your primary drive and additionally, be sure to run a de-fragmenting utility as well as a hard drive diagnostics utility as often as possible.</li>
</ul>
</li>
	<li><strong>Applications running in the background</strong>
<ul>
	<li>Our computers often start up and before we are even able to start using them there can be 10+ unnecessary applications running in the background.  It is important to go through your start up items and make sure that only the necessary applications are running.  This will increase the performance of your computer immediately after a restart.</li>
</ul>
</li>
	<li><strong>Viruses, Spyware and Malware</strong>
<ul>
	<li>In the article posted <a title="Malware Article" href="http://youritlocal.com.au/viruses-malicious-software-everything-you-need-to-know/">here</a> we describe all the different threats out there in the digital world.  The truth is, when spyware, malware or viruses are present on a computer, the computer is being used secretly to perform tasks that benefit the writer of the malicious software.  This can include logging data, changing files and using system resources for reasons other than serving the computer user.  It is very important to ensure that your computer is clean of malicious software and viruses.  The best way to overcome this is to ensure you have the latest anti-spyware and anti-malware software installed and configured on your computer.  Additionally, it doesn&#8217;t hurt to go through the list of your installed programs and if you locate any that you didn&#8217;t install or that you have never used it cant hurt to get rid of them for your safety.  There are plenty of free applications out there, but be sure you don&#8217;t accidentally download and install the spyware yourself.</li>
	<li>For a good free anti virus try <a title="AVG Anti-Virus" href="http://free.avg.com/au-en/homepage">AVG </a>and for a good free anti-malware try <a title="Spybot Search and Destroy" href="http://www.safer-networking.org/">Spybot &#8211; Search and Destroy</a>.</li>
</ul>
</li>
</ol>
<p>Above we have gone over some of the many reasons that a computer could be running slowly.  If you are concerned about your computer performance and want the input of a professional, please dont hesitate to contact us on<span style="color: #ff0000;"><strong> (02) 9211 2706</strong></span> or email us @ <strong><span style="color: #ff0000;">helpme@youritlocal.com.au</span></strong> .</p>
<p>&nbsp;</p>
<div class="callToAction"><a title="Send us an email!" href="mailto:helpme@youritlocal.com.au"><img class="leftCA" src="/wp-includes/images/emailNowButton.png" alt="Email Now" /></a> <img class="centerCA" src="/wp-includes/images/or.png" alt="" /> <a title="Call us!" href="tel:0292112706"><img class="rightCA" src="/wp-includes/images/callNowButton.png" alt="Email Now" /></a>
<div class="clearfix"></div>
</div>
]]></content:encoded>
			<wfw:commentRss>http://youritlocal.com.au/computer-peformance/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Data Backups &amp; Security</title>
		<link>http://youritlocal.com.au/data-backups-security/</link>
		<comments>http://youritlocal.com.au/data-backups-security/#comments</comments>
		<pubDate>Thu, 05 Mar 2015 04:11:14 +0000</pubDate>
		<dc:creator><![CDATA[yourit]]></dc:creator>
				<category><![CDATA[Your IT Local]]></category>

		<guid isPermaLink="false">http://youritlocal.com.au/?p=2243</guid>
		<description><![CDATA[Worried about losing your photos, documents and important data? Haven&#8217;t taken precautions against hardware failure &#38; user error? These days we rely on our technology for almost every facet of our daily lives.  We use our computers and phones to store our work documents, study material, emails [&#8230;]]]></description>
				<content:encoded><![CDATA[
<p style="text-align: center;"><a href="http://youritlocal.com.au/wp-content/uploads/2015/03/BackupAndSecurity.jpg" rel="wp-prettyPhoto[2243]"><img class="aligncenter size-full wp-image-2252" src="http://youritlocal.com.au/wp-content/uploads/2015/03/BackupAndSecurity.jpg" alt="Backup &amp; Security" width="960" height="204" /></a></p>
<p style="text-align: center;"><em>Worried about losing your photos, documents and important data?</em></p>
<p style="text-align: center;"><em>Haven&#8217;t taken precautions against hardware failure &amp; user error?</em></p>
<p style="text-align: center;"></p>
<p>These days we rely on our technology for almost every facet of our daily lives.  We use our computers and phones to store our work documents, study material, emails and precious photos. Too often we find that technology users haven&#8217;t taken precautions to ensure that their important files remain available should anything happen to their hardware.  When that unfortunate day comes along where a hard drive fails, computer gets stolen or a user accidentally deletes some files, important data is often lost forever.</p>
<p>Fortunately these days there are plenty of methods for keeping your files safe!  Your IT Local offers various solutions to cater to a variety of different levels of computer users ranging from the home user to the mission critical business user.</p>
<p>Below is some information about different types of backups, if you would like any more information or would like to arrange a technician to implement a backup solution for your technological environment, please dont hesitate to contact us on <span style="color: #ff0000;"><strong>(02) 9211-2706</strong></span> or email us at <span style="color: #ff0000;"><strong>helpme@youritlocal.com.au</strong></span></p>
<div class="callToAction"><a title="Send us an email!" href="mailto:helpme@youritlocal.com.au"><img class="leftCA" src="/wp-includes/images/emailNowButton.png" alt="Email Now" /></a> <img class="centerCA" src="/wp-includes/images/or.png" alt="" /> <a title="Call us!" href="tel:0292112706"><img class="rightCA" src="/wp-includes/images/callNowButton.png" alt="Email Now" /></a>
<div class="clearfix"></div>
</div>
<p><strong>External Media Backup:</strong></p>
<p>An external media backup, involved an external hard drive, connected directly to your computer.  Your computer is then configured to automatically synchronise specific files and folders to your external media.  This means that if anything happens to your computer a copy of the data is readily available for you on your external media that can be plugged in to another computer immediately.</p>
<p><strong>Cloud Backup:</strong></p>
<p>Before we delve too far into how a cloud backup works, it is important to not what a this magical &#8220;cloud&#8221; actually is.  The &#8220;cloud&#8221; refers to storage that is replicate across many servers in remote locations.  What this means is that your files aren&#8217;t just stored on a single server located in one location, but rather the data is replicated across various servers all around the world, this means that regardless of what happens to one server your files will always be available to you when you need them.</p>
<p>A cloud backup uses a cloud backup service to automatically sync specific files and folders to a cloud storage that can then be securely accessed by you anywhere.  So no matter what happens to any one computer that you use, your files will always be available to you!</p>
<p><strong>NAS Backup:</strong></p>
<p>A NAS backup is similar to an external media backup but it has some added advantages.  Firstly, a NAS stands for Network Attached Storage.  This external media is connected to your computer via a network, this allows many devices to access and backup to the device simultaneously.  Secondly,  a NAS usually comes with RAID capabilities.  RAID refers to a technology that uses multiple hard drives for redundancy, meaning that within the NAS there is usually more than one drive &amp; should anything happen to one of the drives, the second drive retains a full working copy of the data ready to be replicated back to the secondary drive when replaced.</p>
<p>Often times a NAS can be configured to replicate the backup to a cloud backup solution, which allows a second level data safety.</p>
<p><strong>Offsite Backup:</strong></p>
<p>For mission critical environments it is often recommended that all backed up data be replicated in to an offsite storage location.   This type of system involves one of the above as well as a duplicate copy being transferred to a piece of external media and stored in a data safe at a secure location.  This ensures that if anything happens to a complete site such as a fire or a burglary an offsite copy of all information is retained for restore immediately.</p>
<p>&nbsp;</p>
<p>When it comes to backups, the more important the information the greater need there is for a secure backup of that data.  If you couldn&#8217;t bare losing your files, documents and important data then you need to implement a backup solution before it is too late.  So  if you would like any more information or would like to arrange a technician to implement a backup solution for your technological environment, please dont hesitate to contact us on <span style="color: #ff0000;"><strong>(02) 9211-2706</strong></span> or email us at <span style="color: #ff0000;"><strong>helpme@youritlocal.com.au</strong></span></p>
<p>&nbsp;</p>
<div class="callToAction"><a title="Send us an email!" href="mailto:helpme@youritlocal.com.au"><img class="leftCA" src="/wp-includes/images/emailNowButton.png" alt="Email Now" /></a> <img class="centerCA" src="/wp-includes/images/or.png" alt="" /> <a title="Call us!" href="tel:0292112706"><img class="rightCA" src="/wp-includes/images/callNowButton.png" alt="Email Now" /></a>
<div class="clearfix"></div>
</div>
]]></content:encoded>
			<wfw:commentRss>http://youritlocal.com.au/data-backups-security/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Wireless Networks  &#8211; Troubleshooting and Optimising</title>
		<link>http://youritlocal.com.au/wireless-networks-troubleshooting-and-optimising/</link>
		<comments>http://youritlocal.com.au/wireless-networks-troubleshooting-and-optimising/#comments</comments>
		<pubDate>Wed, 04 Feb 2015 02:57:35 +0000</pubDate>
		<dc:creator><![CDATA[yourit]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://youritlocal.com.au/?p=2231</guid>
		<description><![CDATA[Wireless network not working? Wireless network dropping out? Sick of intermittent wireless network problems?   You&#8217;ve come to the right place! Today, we are talking about wireless networks, the most common problems and how to address them your selves.  Of course if you don&#8217;t feel up to [&#8230;]]]></description>
				<content:encoded><![CDATA[<p style="text-align: center;"><em><a href="http://youritlocal.com.au/wp-content/uploads/2015/02/wifi1.jpg" rel="wp-prettyPhoto[2231]"><img class="aligncenter size-full wp-image-2239" src="http://youritlocal.com.au/wp-content/uploads/2015/02/wifi1.jpg" alt="WiFi Problems 960" width="960" height="204" /></a></em></p>
<p style="text-align: center;"><em>Wireless network not working?</em></p>
<p style="text-align: center;"><em>Wireless network dropping out?</em></p>
<p style="text-align: center;"><em>Sick of intermittent wireless network problems?</em></p>
 <a href="http://youritlocal.com.au/wp-content/uploads/2015/02/wifi.jpg" rel="wp-prettyPhoto[2231]">
</a>

You&#8217;ve come to the right place!

Today, we are talking about wireless networks, the most common problems and how to address them your selves.  Of course if you don&#8217;t feel up to the task, don&#8217;t hesitate to call us on <strong>02 9211 2706</strong> or email us at <strong>helpme@youritlocal.com.au.</strong>

We wont go in to specific instructions on how to do each of these tasks, as due to the vast array of hardware, computers and operating systems, the exact methods will vary from setup to setup, so for detailed directions to complete each task consult your device or operating system manual or of course do a quick google search.

We get calls on a weekly basis from home and small business users who have wireless networks that are constantly dropping out and/or losing internet connectivity.  Today we are going to run through the basic steps we take to configure your wireless network to perform the best it possibly can.

First of all you need to determine whether it is your internet that is dropping out or your wireless network dropping out.  If it is your internet dropping out, you may need to contact your ISP to determine whether there are problems with your line or your service.  There are other factors that could be effecting your internet connection, but this is a subject matter for a different article.  If you have deemed that it is a wireless drop out problem, do the following:
<ol>
	<li>Download a WiFi analyser on your phone and determine which channels have the most interference.  Locate the best performing channel and ensure that your wireless router or access point is setup to use the channel with the strongest signal.</li>
	<li>Upgrade the firmware on your router.  Too often networking hardware is released with buggy software and within the first few months updates are released to address problems you are likely to face.  To upgrade the firmware, log on to your device, locate the upgrade firmware (or similar) link and let your hardware update itself.</li>
	<li>Give yourself a static IP and add a IP reservation in your router or access point.</li>
	<li>Change wireless mode to a single option that is supported by all your devices.  We have found that often having mixed modes of a/b/g/n can sometimes cause issues with some devices.  Select the fastest mode supported by all your devices, as an example choose &#8220;G Only&#8221;</li>
	<li>Try a different channel width, depending on your router.  Often times there can be differing amounts of interference on different channels.  See if changing from 20MHz to 40MHz helps.  This may reduce your range but increase your connectivity.</li>
	<li>If distance is causing you an issue, you may like to invest in a WiFi range extender, powerline adapter or  secondary access point.</li>
	<li>If after all of this you are still having troubles, issues could be related to the hardware itself.  Either your router/access point or your computer&#8217;s network card.  Always be sure to invest in quality hardware.  Hardware vendors change their models all the time, do a bit of research for the top performing models before purchase.  The hardware may come at a slightly higher price but will save you a lot of headaches in the future.</li>
</ol>
Wireless connections don&#8217;t need to be a headache.  If you are having trouble getting yours working properly, don&#8217;t hesitate to give us a call  on<strong> (02) 9211 2706</strong> or email us at <strong>helpme@youritlocal.com.au</strong> to come out and fix your wireless net work once and for all!]]></content:encoded>
			<wfw:commentRss>http://youritlocal.com.au/wireless-networks-troubleshooting-and-optimising/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Your IT Local &#8211; Hospitality POS Systems</title>
		<link>http://youritlocal.com.au/your-it-local-hospitality-pos-systems/</link>
		<comments>http://youritlocal.com.au/your-it-local-hospitality-pos-systems/#comments</comments>
		<pubDate>Mon, 15 Dec 2014 06:28:37 +0000</pubDate>
		<dc:creator><![CDATA[yourit]]></dc:creator>
				<category><![CDATA[Your IT Local]]></category>

		<guid isPermaLink="false">http://youritlocal.com.au/?p=2190</guid>
		<description><![CDATA[Having a POS System allows café’s and restaurant owners to take full control of their businesses by providing vital information to save money, keep track of cash flow and allow wait staff to stay out of the way by taking orders directly at the tables. The advantages [&#8230;]]]></description>
				<content:encoded><![CDATA[<a href="http://youritlocal.com.au/wp-content/uploads/2014/12/POS.jpg" rel="wp-prettyPhoto[2190]"><img class="alignleft size-full wp-image-2195" src="http://youritlocal.com.au/wp-content/uploads/2014/12/POS.jpg" alt="Your IT Local - POS System for Hospitality" width="914" height="200" /></a>
Having a POS System allows café’s and restaurant owners to take full control of their businesses by providing vital information to save money, keep track of cash flow and allow wait staff to stay out of the way by taking orders directly at the tables.

The advantages of a POS System are numerous but can be summed up in to 4 main categories:
<ul>
	<li>Security</li>
	<li>Inventory Management</li>
	<li>Reporting and Analysis</li>
	<li>Mobility and Workflow</li>
</ul>
Your IT Local provides POS Systems for businesses in the Hospitality industry which allows business owners to take full control of their business, let’s look at how:

<strong>Security:</strong>

Your IT Local’s POS System allows business owners to track money coming in and where it is going. Business owners are able to look up old tickets that would show potentially spurious cancelled or voided items. Additionally, the POS home screen is locked only allowing access to employees with specific codes and only allowing designated managers access to reporting data and administrative controls. Cash drawers are connected to the POS System via Ethernet and can only be opened by authorised people or the manager with their private keys.

<strong>Inventory Management:</strong>

Your IT Local’s POS System allows business owners to keep track of inventory and locate losses, waste or thefts. By entering in purchased stock and assigning recipes to products, a business owner is able to forecast ordering, low stock levels and locate inconsistencies between actual stock on hand vs expected stock on hand. Additionally inventory can be reported on over historical periods allowing business owners to make important purchasing decisions for the future.

<strong>Reporting and Analysis: </strong>

Your IT Local’s POS System allows café and restaurant owners to report and analyse purchases, sales, and inventory over any period. This functionality allows business owners to gain important insight into bestselling products, products sold during different time periods, wasted stock, employee performance etc. These tools give a business owner crucial information in order to have full control over their business ensure everything is running as smoothly and efficiently as possible.

<strong>Mobility and Workflow:</strong>

Your IT Local’s POS system allows waiters and waitresses to take orders directly from tables and have the orders print directly to the kitchen or bar for actioning. This allows café’s and resteraunts to operate smoothly, less chaotically and more direct and concise. Gone are the days of handwritten orders and kitchen staff confusing orders!

<strong>Key Features of Your IT Local’s POS System</strong>
<ul>
	<li>No ongoing costs
<ul>
	<li>Unlike the majority of other POS Systems, there are no monthly fees in order to keep the POS System running. You own the software and you own the hardware!</li>
</ul>
</li>
	<li>Local Support
<ul>
	<li>Should anything ever go wrong with your system Your IT Local has local technicians all around NSW ready to get everything up and running within hours of any potential problems.</li>
</ul>
</li>
	<li>Low setup costs
<ul>
	<li>Your IT Local’s POS System comes in at nearly 30% cheapers than most other systems!</li>
</ul>
</li>
	<li>Reliable and Secure POS System</li>
	<li>Great features and benefits!</li>
	<li>POS System customised to suit your needs!</li>
</ul>
Our POS systems use the latest technologies from only reputable vendors, so if you are looking to get a POS System, look no further! Call us today on (02) 9211-2706 or email us at <a href="mailto:pos@youritlocal.com.au">pos@youritlocal.com.au</a>

&nbsp;]]></content:encoded>
			<wfw:commentRss>http://youritlocal.com.au/your-it-local-hospitality-pos-systems/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Viruses &amp; Malicious Software – Everything you need to know.</title>
		<link>http://youritlocal.com.au/viruses-malicious-software-everything-you-need-to-know/</link>
		<comments>http://youritlocal.com.au/viruses-malicious-software-everything-you-need-to-know/#comments</comments>
		<pubDate>Wed, 12 Nov 2014 02:16:25 +0000</pubDate>
		<dc:creator><![CDATA[yourit]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://youritlocal.com.au/?p=2157</guid>
		<description><![CDATA[&#160; These days the amounts of malicious software in existence are far more than ever before.  As people become more and more dependent on their technology the opportunity becomes even greater for hackers to create malicious software for various reasons, namely to cause great inconvenience and steal [&#8230;]]]></description>
				<content:encoded><![CDATA[<a href="http://youritlocal.com.au/wp-content/uploads/2014/11/Malicious-Software.jpg" rel="wp-prettyPhoto[2157]"><img class="alignleft size-full wp-image-2180" src="http://youritlocal.com.au/wp-content/uploads/2014/11/Malicious-Software.jpg" alt="Malicious-Software" width="914" height="200" /></a>

&nbsp;

These days the amounts of malicious software in existence are far more than ever before.  As people become more and more dependent on their technology the opportunity becomes even greater for hackers to create malicious software for various reasons, namely to cause great inconvenience and steal personal and private information and use it to their advantage.

No technological device is safe!  This includes mobile phones, tablets, laptops and home computers.  All of these devices can potentially be compromised leaving your banking details, emails and passwords as well as your personal photos and videos vulnerable to the intentions of cyber criminals.

If you think that your computer or phone may have been compromised by malicious software, do not hesitate to contact us immediately or book directly from <a title="https://youritlocal.com.au/makeabooking/" href="https://youritlocal.com.au/makeabooking/">https://youritlocal.com.au/makeabooking/</a>

For your information below are some of the most common forms of malicious software.  Each has its own agenda and purpose but are all equally dangerous to your phone and computer security.

&nbsp;

<hr />

<h3><strong>What is Malware?</strong></h3>
<img class="alignleft wp-image-2160 " src="http://youritlocal.com.au/wp-content/uploads/2014/11/Malware-150x150.jpg" alt="Malware" width="98" height="88" />Malware is short for <strong>mal</strong>icious soft<strong>ware </strong>meaning software used to compromise your computers functions, steal data, bypass access controls or otherwise cause harm to the host computer.  Malware is a general term that is used to describe a wide range of malicious software including viruses, spyware, adware, Trojan horse, Worms, rootkits, bots and bugs.

&nbsp;

&nbsp;

<hr />

<h3><strong>Virus:</strong></h3>
<h3><strong><img class="alignright wp-image-2164 size-medium" src="http://youritlocal.com.au/wp-content/uploads/2014/11/Virus-300x153.jpg" alt="Virus" width="300" height="153" /></strong></h3>
A virus is a form of malware that is often used to steal information, harm host computers and networks, create botnets, steal money, render advertisements and many more horrible functions.  A virus is a form of malware that is capable of copying itself and spreading to other computers.  Viruses often spread to other computers by attaching themselves to various programs and executing code when a user launches one of those infected programs.  Viruses can also
spread through script files, documents, and cross-site scripting vulnerabilities in web apps.
<h3></h3>

<hr />

<h3> <strong>Spyware:</strong></h3>
<strong><a href="http://youritlocal.com.au/wp-content/uploads/2014/11/Spyware.jpg" rel="wp-prettyPhoto[2157]"><img class="alignleft size-thumbnail wp-image-2162" src="http://youritlocal.com.au/wp-content/uploads/2014/11/Spyware-150x150.jpg" alt="Spyware" width="150" height="150" /></a></strong>

Spyware is a type of malware that is used to spy on users without their knowledge.  Often their functions include activity monitoring, recording keystrokes, data harvesting (harvesting personal information, logins and financial data) and more.  Spyware also often modifies computer security settings or web browsers in order to interfere with network connections.  Spyware tends to spread by exploiting software vulnerabilities, bundling itself with legitimate software or in Trojans.

&nbsp;

&nbsp;

&nbsp;

<hr />

<h3><strong>Adware:</strong></h3>
<h3><strong><img class="alignright size-thumbnail wp-image-2166" src="http://youritlocal.com.au/wp-content/uploads/2014/11/Adware-150x150.jpg" alt="Adware" width="150" height="150" /></strong></h3>
Adware (short for advertising-supported software) is a type of malware that automatically delivers advertisements. Common examples of adware include pop-up ads on websites and advertisements that are displayed by software. Often times software and applications offer “free” versions that come bundled with adware. Most adware is sponsored or authored by advertisers and serves as a revenue generating tool.

While some adware is solely designed to deliver advertisements, it is not uncommon for adware to come bundled with spyware (see below) that is capable of tracking user activity and stealing information. Due to the added capabilities of spyware, adware/spyware bundles are significantly more dangerous than adware on its own.

&nbsp;

<hr />

<h3><strong>Trojan Horse</strong></h3>
<h3><strong><img class="alignleft size-thumbnail wp-image-2163" src="http://youritlocal.com.au/wp-content/uploads/2014/11/Trojan-Horse-150x150.gif" alt="Trojan Horse" width="150" height="150" /></strong></h3>
A Trojan horse, commonly known as a “Trojan,” is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware. A Trojan can give a malicious party remote access to an infected computer. Once an attacker has access to an infected computer, it is possible for the attacker to steal data (logins, financial data, even electronic money), install more malware, modify files, monitor user activity (screen watching, keylogging, etc), use the computer in botnets, and anonymize internet activity by the attacker.

&nbsp;

&nbsp;

&nbsp;

<hr />

<h3><strong> Worm</strong></h3>
<img class="alignright size-thumbnail wp-image-2165" src="http://youritlocal.com.au/wp-content/uploads/2014/11/Worm-Virus-150x150.jpg" alt="Worm Virus" width="150" height="150" />Computer Worms are among the most common types of malware. They spread over computer networks by exploiting operating system vulnerabilities. Worms typically cause harm to their host networks by consuming bandwidth and overloading web servers. Computer worms can also contain “payloads” that damage host computers. Payloads are pieces of code written to perform actions on affected computers beyond simply spreading the worm. Payloads are commonly designed to steal data, delete files, or create botnets.

Computer worms can be classified as a type of com
puter virus, but there are several characteristics that distinguish computer worms from regular viruses. A major difference is that computer worms have the ability to self-replicate and spread independently while viruses rely on human activity to spread (running a program, opening a file, etc). Worms often spread by sending mass emails with infected attachments to users’ contacts.

<strong> </strong>

<hr />

<h3><strong>Rootkit:</strong></h3>
<strong><img class="alignleft size-thumbnail wp-image-2161" src="http://youritlocal.com.au/wp-content/uploads/2014/11/Rootkit-150x150.jpg" alt="Rootkit" width="150" height="150" /></strong>

A rootkit is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs. Once a rootkit has been installed it is possible for the malicious party behind the rootkit to remotely execute files, access/steal information, modify system configurations, alter software (especially any security software that could detect the rootkit), install concealed malware, or control the computer as part of a botnet.

Rootkit prevention, detection, and removal can be difficult due to their stealthy operation. Because a rootkit continually hides its presence, typical security products are not effective in detecting and removing rootkits. As a result, rootkit detection relies on manual methods such as monitoring computer behavior for irregular activity, signature scanning, and storage dump analysis. Organizations and users can protect themselves from rootkits by regularly patching vulnerabilities in software, applications, and operating systems, updating virus definitions, avoiding suspicious downloads, and performing static analysis scans.

<hr />

<h3><strong>Bot<img class="alignright  wp-image-2167" src="http://youritlocal.com.au/wp-content/uploads/2014/11/bot-150x150.jpg" alt="bot" width="121" height="122" />
</strong></h3>
Bots are software programs created to automatically perform specific operations. While some bots are created for relatively harmless purposes (video gaming, internet auctions, online contests, etc), it is becoming increasingly common to see bots being used maliciously. Bots can be used in botnets (collections of computers to be controlled by third parties) for DDoS attacks, as spambots that render advertisements on websites, as web spiders that scrape server data, and for distributing malware disguised as popular search items on download sites. Websites can guard against bots with CAPTCHA tests that verify users as human.

<hr />

<h3> <strong>Bug</strong></h3>
<strong><img class="alignleft size-thumbnail wp-image-2159" src="http://youritlocal.com.au/wp-content/uploads/2014/11/Bug-150x150.jpg" alt="Microbe" width="150" height="150" /></strong>

In the context of software, a bug is a flaw produces an undesired outcome. These flaws are usually the result of human error and typically exist in the source code or compilers of a program. Minor bugs only slightly affect a program’s behavior and as a result can go for long periods of time before being discovered. More significant bugs can cause crashing or freezing. Security bugs are the most severe type of bugs and can allow attackers to bypass user authentication, override access privileges, or steal data. Bugs can be prevented with developer education, quality control, and code analysis tools.]]></content:encoded>
			<wfw:commentRss>http://youritlocal.com.au/viruses-malicious-software-everything-you-need-to-know/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Your IT Local &#8211; Launching Promotion</title>
		<link>http://youritlocal.com.au/your-it-local-launching-promotion/</link>
		<comments>http://youritlocal.com.au/your-it-local-launching-promotion/#comments</comments>
		<pubDate>Tue, 11 Nov 2014 06:10:05 +0000</pubDate>
		<dc:creator><![CDATA[yourit]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://youritlocal.com.au/?p=2152</guid>
		<description><![CDATA[As our launching promotion we are offering our Sydney customers the opportunity to receive $600.00 worth of value for a mere $150.00. Our launching computer service coupon will allow customers to get: Any computer problem fixed for $150.00 Virus software installed and a full scan to remove [&#8230;]]]></description>
				<content:encoded><![CDATA[As our launching promotion we are offering our Sydney customers the opportunity to receive $600.00 worth of value for a mere $150.00.

<a href="http://youritlocal.com.au/wp-content/uploads/2014/11/Coupon.jpg" rel="wp-prettyPhoto[2152]"><img class="aligncenter size-large wp-image-2068" src="http://youritlocal.com.au/wp-content/uploads/2014/11/Coupon-1024x721.jpg" alt="Your IT Local - Computer Service Coupon" width="1024" height="721" /></a>

Our launching computer service coupon will allow customers to get:
<ul>
	<li>Any computer problem fixed for $150.00</li>
	<li>Virus software installed and a full scan to remove all viruses, malware and spyware.</li>
	<li>Secure private backup service to keep up to 10GB of your data safe and secure while being backed up to the cloud</li>
	<li>Free 16GB USB Key</li>
	<li>And the chance to win an iPhone 6.</li>
</ul>
*Promotion available to a single computer only and does not include additional costs incurred by hardware and software requests and faults.

*Promotion available to a single computer only.

To purchase online, please follow the following link:  <a title="Your IT Local - IT Service Coupon" href="https://youritlocal.com.au/it-service-coupon/" target="_blank">https://youritlocal.com.au/it-service-coupon/</a>]]></content:encoded>
			<wfw:commentRss>http://youritlocal.com.au/your-it-local-launching-promotion/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Your IT Local – Launch</title>
		<link>http://youritlocal.com.au/your-it-local-launch/</link>
		<comments>http://youritlocal.com.au/your-it-local-launch/#comments</comments>
		<pubDate>Mon, 10 Nov 2014 03:21:44 +0000</pubDate>
		<dc:creator><![CDATA[yourit]]></dc:creator>
				<category><![CDATA[Your IT Local]]></category>

		<guid isPermaLink="false">http://youritlocal.com.au/?p=2141</guid>
		<description><![CDATA[Your IT Local is finally launching!  Over the course of our operation we hope to change the way people think about getting their computers maintained and upgraded.  For too long, a small number of companies have monopolized the market, charging way too much for computer maintenance and [&#8230;]]]></description>
				<content:encoded><![CDATA[<span style="font-size: 14pt;"><strong>Your IT Local is finally launching! </strong> </span>

<a href="http://youritlocal.com.au/wp-content/uploads/2014/11/Summer-happiness-photo.jpg" rel="wp-prettyPhoto[2141]"><img class="aligncenter wp-image-2142 size-full" src="http://youritlocal.com.au/wp-content/uploads/2014/11/Summer-happiness-photo.jpg" alt="Summer-happiness-photo" width="900" height="508" /></a>

Over the course of our operation we hope to change the way people think about getting their computers maintained and upgraded.  For too long, a small number of companies have monopolized the market, charging way too much for computer maintenance and upgrades.  Your IT Local aims to bring computer maintenance back to an affordable level while providing an equally professional, prompt and personalised service.

As our launching promotion we are offering our Sydney customers the opportunity to receive $600.00 worth of value for a mere $150.00.

<a href="http://youritlocal.com.au/wp-content/uploads/2014/11/Coupon.jpg" rel="wp-prettyPhoto[2141]"><img class="aligncenter wp-image-2068" src="http://youritlocal.com.au/wp-content/uploads/2014/11/Coupon-1024x721.jpg" alt="Your IT Local - Computer Service Coupon" width="900" height="634" /></a>

Our launching computer service coupon will allow customers to get:
<ul>
	<li>Any computer problem fixed for $150.00</li>
	<li>Virus software installed and a full scan to remove all viruses, malware and spyware.</li>
	<li>Secure private backup service to keep up to 10GB of your data safe and secure while being backed up to the cloud</li>
	<li>Free 16GB USB Key</li>
	<li>And the chance to win an iPhone 6.</li>
</ul>
<span style="font-size: 8pt;">*Promotion available to a single computer only and does not include additional costs incurred by hardware and software requests and faults.</span>

<span style="font-size: 8pt;">*Promotion available to a single computer only.</span>

To purchase online, please follow the following link:  <a title="Your IT Local - IT Service Coupon" href="https://youritlocal.com.au/it-service-coupon/" target="_blank">https://youritlocal.com.au/it-service-coupon/</a>

Additionally, we will be updating our facebook page and blog with useful computer tips, guides, promotions and general information related to IT, so be sure to like us on facebook at <a title="Your IT Local - Facebook page" href="https://www.facebook.com/youritlocal" target="_blank">https://www.facebook.com/youritlocal</a> or check out our blog at <a title="Blog" href="https://youritlocal.com.au/news-blog/">https://youritlocal.com.au/news-blog/</a>

So if you have any computer problems, questions or queries please do not hesitate to get in touch with us on (02) 9211 2706 or helpme@youritlocal.com.au.

If you would like to book a timeslot with one of our technicians jump on over to <a title="Your IT Local - Make a booking" href="https://youritlocal.com.au/makeabooking/" target="_blank">https://youritlocal.com.au/makeabooking/</a> and make a booking!

We hope to hear from you soon!]]></content:encoded>
			<wfw:commentRss>http://youritlocal.com.au/your-it-local-launch/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>
