ZELLCO Introduces VoIP Services

ZELLCO Introduces VoIP Services

In an email yesterday, ZELLCO a mobile virtual network operator invited subscribers to register for public VoIP services. According to ZELLCO, the service is being offered by a local network called Gigatel.
social engineering

Social Engineering as a Hacking Technique

Political science refers to social engineering as an attempt by government or private groups to change the views and behaviour of citizens. In computer security, social engineering is the art and science of tricking people into revealing confidential information
Clouds of Change, Your Role in the Clouds

Clouds of Change, Your Role in the Clouds

Cloud computing and virtualization are bringing a paradigm shift for the classic IT function. Adapting your skills to the new technical requirements could make all the difference and ultimately increase your visibility and depending on your current situation, those clouds on the horizon bring welcome relief or are the beginning of the end to your career.
Internet banking login

Yeah, I Know Your Password!

Passwords are the primary way various systems, networks and applications verify that the user logging into the system is who he claims to be. This is why password security is enormously important for protection of the computer user, the workstation, and the network.
12 Reasons Your Zimbabwe Business Needs A Website

12 Reasons Your Zimbabwe Business Needs A Website

The internet is exploding in Zimbabwe, and already businesses are seeing the benefits of being online - Isn't time you joined in? If you're wondering what the benefits of a website would be for your Zimbabwe business, here are a few good reasons to go for it!
per second

Econet Introduces Per Second Billing

Today, Econet, Zimbabwe’s largest mobile operator announced that it has introduced ‘per second’ billing for its subscribers. The move is in compliance with regulatory requirements issued by POTRAZ earlier this year.
Facebook Typical User

The Forgotten Line of Defense: The People

From the beginning hackers have been known for their skills of breaking into computers and networks. They applied different techniques and methodologies in order to break into corporate systems or personal computers.

Getting the Facts Right Part 2: The Role of Leaders in Protecting Information

Getting the facts right: The basics of Protecting Information first article gave us a foundation on the fundamentals of information protection. I must say that this is a broad and technical area that requires a unified approach and effort among all key stakeholders. The expectation is that those that have been charged with the responsibility, the board of directors are taking the lead.

Chips Launches Sage ERP X3 Version 6

Chips Computing Services, which represents Sage Enterprise in Zimbabwe, officially launched the latest version of Sage Enterprise Resource Planning (ERP) X3, at a function at Meikles Hotel on Tuesday (July 13).
EASSy cable map

EASSy to be Switched on Tomorrow, 16 July 2010

The EASSy undersea fibre cable will go live tomorrow, 16 July 2010. The EASSy commercial launch follows the completion of three successful tests that have been carried out on the cable in the last few months.