About David Perkovic

David founded DP Computing in 1993. With a Computer Science degree and over 25 years of IT experience David has advanced computer, server and networking skills. He has personally designed, setup and administered many Microsoft based networks and likes to share his knowledge via blog posts and Youtube videos.

“You Have Been Hacked!” – Don’t Fall for This Common Scam

Hacked message

Have you ever received a terrifying email or SMS claiming someone has hacked your computer, watched you through your webcam and / or has our sensitive files? If so, you are not alone as these types of scam emails are becoming more common and are designed to frighten you into paying up. This blog article takes a closer look at how this scam works and why you should not worry. Continue reading

10 Settings to Boost Your Productivity in Windows 11

Productivity

A lot of people are now using Windows 11 (as of August 2024, Windows 11 had over 31% of the Windows market share) and since Windows 10 retires in late 2025 this will increase significantly over the next year. This blog article will go through some great tips on optimising your Windows 11 experience. Continue reading

Protect Yourself from Malicious Online Ads (Malvertising)

Infected Systems

There are many types of malware and one of the most common is called “malvertising”. It crops up everywhere, including social media sites, websites and even on Google searches. There are two things are making malvertising even more dangerous: the first is that hackers use AI to make it very believable and the other is that it is on the rise. According to Malwarebytes in the fall of 2023, malvertising increased by 42% (month over month). It is important to inform yourself about this online threat and knowledge is the power to protect yourself, especially when it comes to malicious cybercriminals. In this blog article, we will help you understand malvertising. We will also give you tips on identifying and avoiding it. Continue reading

6 Ways to Enhance Your Email Security

Email security

Email is a fundamental communication tool for businesses and individuals alike, thus this makes it a prime target for cybercriminals. As cyberattacks are increasing in sophistication, your email security has never been more critical. Continue reading

How to Buy a Budget Laptop Without Getting Burned

Laptop

Everybody loves a bargain, right? These days, laptops are more affordable than ever, but not all cheap laptops are created equal. While the price may be tempting, you do not want to end up with a laptop that is painfully slow and frustrating to use.

Continue reading

What Happens When You Interrupt a Windows Update?

Windows updates

We’ve all been there: You’re about to shut down your computer, and the dreaded “Windows is updating” screen pops up and then it feels like it takes forever to complete.. But what happens if you interrupt that update and turn off the computer before it completes (or you may even lose power)? Let us look into what happens when a Windows update gets interrupted and how to avoid any long lasting problems. Continue reading

Keep Your Files Organised for Business Collaboration

File organisation

If you run a business, chances are your team is constantly working together on various documents, spreadsheets, and projects. While cloud-sharing software has made collaboration more accessible than ever, good file organisation practices are still necessary to keep things running smoothly. Keeping your files tidy and well structured can prevent confusion, save time, and boost productivity across your team. Continue reading

Is Complacency Your Cybersecurity Blind Spot?

Security complacency

When it comes to cybersecurity, the biggest threats to most SMB’s is not a faceless hacker in a dark room, it is complacency. Many managers and business owners think that since nothing bad has happened yet, then nothing will! This mindset though can lead to disastrous consequences. Continue reading

Optimise Your M365 Setup

Microsoft 365 (aka M365) is a powerful suite of tools. It enhances both business and personal productivity and collaboration. This is especially true for small to mid-sized businesses (SMBs). To get the most out of M365, it is important to optimise it, otherwise you may only be using a fraction of the power you have. Continue reading

Common Mobile Malware Traps

Smart Phone Security

For most people their smartphone is their digital wallet, communication hub and personal assistant all rolled into one portable device. It is packed with sensitive data, ranging from financial information to personal photos. This make phone a prime target for cybercriminals but mobile malware is often overlooked as people focus on securing their laptops or desktops. Continue reading