Our Vision

To give customers the most compelling IT Support experience possible.

Our Mission

Our mission is simple: make technology an asset for your business not a problem.

Our Values

We strive to make technology integrate seamlessly with your business so your business can grow. As your technology partner, when your business grows ours will grow with you, therefore, we will work hand in hand with you to support your growth.

Our Values

We develop relationship that makes a positive difference in our customers Business.

Our Values

We exibit a strong will to win in the marketplace and in every aspect of our Business

Job interview - Questions to Ask




It's important to ask questions in an interview. These should be questions to clarify job specifics through to key points of interest which will enable you to determine whether this is the right job, employer and culture fit for you.


  • What are the most important skills and characteristics your
  • What made you decide to join the company? (providing they don't own the business!)
  • What has been the pattern of growth for the company over the past 5 years
  • What is the future growth plan of the company?
  • Why is this job open?
  • How many people held this position over the recent years?
  • How does this position fit into the overall organisation?
  • Who will I be reporting to
  • Where is the job located by way of company structure?
  • What type of training is required for this position? How long is the training period?
  • What other training opportunities are provided?
  • Where are the greatest opportunities for growth within the company?
  • Who are the company's major competitors?
  • Who are your major customers? Are they mostly local, regional or global
  • What will my priorities be? What will be my first assignment?
  • What issues/challenges am I likely to face when I first take on the role?


Remember: write some questions down before interview and during the interview. Don't try to leave everything to memory. It's also down to you to have the confidence to ask the questions, and to ask question that you feel will be relevant in helping you make your decision. It's a two way process where both you and the interviewer need to know more.

ATO Scam Alert

 🚨 SCAM ALERT 🚨 Be on the lookout for a new phone #scam claiming your #tax file number (TFN) has been suspended!


Recorded phone calls claiming to be from the #ATO and other government agencies are trying to trick people into providing personal information. These scammers will tell you there’s a legal case against you, and if you don’t follow instructions and provide the information requested, you’ll be arrested.

⚠️ Don’t follow the prompts, and don’t provide the information requested. We will never send unsolicited pre-recorded messages to your phone, or threaten you with immediate arrest. If you’re ever unsure whether an #ATO interaction is genuine, hang up and phone our scam hotline on 1800 008 540. Warn your family and friends to stay alert and visit scam alerts page to learn more:



Phishing and spear-phishing method of stealing confidential information

 In the recent Stay Smart Online, Alert email advise that there is a significant increase in the past few months of COVID themed phishing scams, using all sorts of lures to try and trick people into handing over personal details.


#Phishing and spear-phishing is a method of stealing confidential information by sending fraudulent messages to a victim, through email or message platforms. They remain among the MOST common method used by malicious #cyber actors to target Australians.

Since the #pandemic's outbreak, the Government’s #Scamwatch has received over 3,060 coronaviruses themed scam reports with over $1,371,000 in reported losses.

#Phishing campaigns can be sent via email, SMS, social media, instant messenger or a phone call. They can look extremely convincing, often imitating legitimate messages from trusted senders in government or business.

See attached are an example of #scam #email that I usually get in my (test) mailbox. Look at the subjects all trying to attract you in a way to click a link or provide details. Especially now Corona and Tax return season they are more active than before.

Hope this helps to Stay safe and on alert don't lose your money or info to the scammers.

Beware of COVID style scam

 Beware of COVID style scam. This is phone scam but COVID email, app, and web scam also present which I have shared previously


It goes like this
Scammer: Good morning, According to our system, you are likely to have been in close proximity to someone who has tested positive for COVID-19. This means that you now need to self-isolate for 14 days and take a COVID-19 test.

'OK. Can you tell me who that person was?'

Scam : 'I'm not able to tell you that. That is confidential information.

Right. Um... so ....

Scam : But you do need to be tested within the next 72 hours. So can I just get the best mailing address so that we can send a kit to you?'

Ok (gives address)

Scam : Thank you - and I just need to take a payment card so that we can finalize this and send the kit to you.'

Sorry - a payment card? I thought this was all free?' - RED ALART here people

Scam : No - I'm afraid not. There is a one-off fee of $50 for the kit and test results. Could you read off the long card number for me, please, when you're ready.'

No - that's not right

Scam: I'm afraid it is. Can you give me the card number please - this is very important, and there are penalties for not complying.'

You should Put the phone down.

This is how #scammers work. And vulnerable people will fall for it.

Group Policy Interview Questions and Answers for Windows Administrator

What are group policies?
Group policies specify how programs, network resources, and the operating system work for users and computers in an organization. They are collections of user and computer configuration settings that are applied on the users and computers (not on groups). For better administration of group policies in the Windows environment, the group policy objects (GPOs) are used.

What is GPO?
Group policy object (GPO) is a collection of group policy settings. It can be created using a Windows utility known as the Group Policy snap-in. GPO affects the user and computer accounts located in sites, domains, and organizational units (OUs). The Windows 2000/2003 operating systems support two types of GPOs, local and non-local (Active Directory-based) GPOs.

What is Local GPOs/policy?
Local GPOs are used to control policies on a local server running Windows 2000/2003 Server. On each Windows  server, a local GPO is stored. The local GPO affects only the computer on which it is stored. By default, only Security Settings nodes are configured. The rest of the settings are either disabled or not enabled. The local GPO is stored in the %systemroot%SYSTEM32GROUPPOLICY folder.

What is Non-local Policy?
Non-local GPOs are used to control policies on an Active Directory-based network. A Windows  server needs to be configured as a domain controller on the network to use a non-local GPO. The non-local GPOs must be linked to a site, domain, or organizational unit (OU) to apply group policies to the user or computer objects. The non-local GPOs are stored in %systemroot%SYSVOLPOLICIESADM, where is the GPO’s globally unique identifier. Two non-local GPOs are created by default when the Active Directory is installed:
1. Default Domain Policy: This GPO is linked to the domain and it affects all users and computers in the domain.
2. Default Domain Controllers Policy: This GPO is linked to the Domain Controllers OU and it affects all domain controllers placed in this OU.
Multiple GPOs

GPO Apply order
When multiple group policy objects are assigned, the group policies are applied in the following order:
• The local group policy object is applied first
• Then, the group policy objects linked to sites are applied
If multiple GPOs exist for a site, they are applied in the order specified by an administrator
• GPOs linked to the domains are applied in the specified order
• Finally, GPOs linked to OUs are applied
The OU group policy objects are set from the largest to the smallest organizational unit, i.e., first the parent OU and then the child OU.
By default, a policy applied later overwrites a policy that was applied earlier. Hence, the settings in a child OU can override the settings in the parent OU
Group policy settings are cumulative if they are compatible with each other. In case they conflict with each other, the GPO processed later takes precedence.

What is No Override? Block Policy Inheritance?
The following are the exceptions with regard to the above-mentioned settings:
 No Override:
Any GPO can be set to No Override. If the No Override configuration is set to a GPO, no policy configured in the GPO can be overridden. If more than one GPO has been set to No Override, then the one that is the highest in the Active Directory hierarchy takes precedence
Block Policy Inheritance:
The Block Policy Inheritance option can be applied to the site, domain, or OU. It deflects all group policy settings that reach the site, domain, or OU from the object higher in the hierarchy. However, the GPOs configured with the No Override option are always applied
What is Loopback policy?

Is group policy from Parent Domain cab be inherited to child Domain?
Group Policy Inheritance
The group policies are inherited from parent to child within a domain. They are not inherited from parent domain to child domain

Following are the rules regarding group policy inheritance:
A policy setting is configured (Enabled or Disabled) for a parent OU, and the same policy setting is not configured for its child OUs. The child OUs inherit the parent’s policy
A policy setting is configured (Enabled or Disabled) for a parent OU, and the same policy setting is configured for its child OUs. The child OUs settings override the settings inherited from the parent’s OU
If any policy is not configured, no inheritance takes place
Compatible policy settings configured at the parent and child OUs are accumulated
Incompatible policy settings from the parent OU are not inherited

What is security filtering? Filtering Scope of GPOs
Although GPOs are linked to the site, domain, or OUs, and they cannot be linked to the security groups directly, applying permissions to the GPO can filter its scope. The policies in a non-local GPO apply only to users who have the Read and Apply Group Policy permissions set to Allow
By specifying appropriate permissions to the security groups, the administrators can filter a GPO’s scope for the computers and users

What Tools used to edit the Group policy?
GPMC and GPedit
How to check applied policy details from Client or server?
RSOP.msc (only works windows 2003 and above)
GPRESULT /v

What is .adm file?
Administrative Template are  required because Microsoft did not include all Registry settings in the default Group Policy, if you want to add more customized setting to existing policy then .ADM file can be created and imported to get the necessary setting

Twitter Facebook Favorites More