Since the COVID-19 pandemic began in 2020, working from home has become the new normal as many employers and employees have dealt with social distancing, lockdowns and the closure of corporate offices. Advances in technology and computer technology has made this transition relatively smooth, with people able to create a fully connected home office using a suite of hardware and software. In this article we will examine some of the amazing technologies that are in use today that have really come to the forefront since 2020. Read further to find out how you or your company can utilise video conferencing, Office 365, cloud backup solutions, VPNs, managed antivirus, remote IT support, and remote desktop access to work effectively from anywhere in the world.

Here is just one example of how technology has greatly benefited a company during the COVID-19 pandemic. One of our clients was still utilising on premises servers with separated data sets. They did use dropbox in a very basic sense, but the amount and complexity of the data meant that a better solution needed to be found. Luckily just prior to the pandemic OJ Networks recommended and was able to deploy a nationwide Office 365 and SharePoint solution for multiple offices around Australia. This allowed them to seamlessly shift to working from home when the lockdown orders were issued and staff were able to remote in via Office 365 to continue their work without disruption. Staff were able to login to their ‘server’ as if they were in the office and they could work from any location, allowing them to continue their business as usual. We often hear from this client as to how lucky they were to set this up prior to the pandemic as there was no downturn in productivity and they would not have been able to function as a business without it!

Now lets explore some of the options in detail, what benefit they provide and how they may assist your business in working remotely.

What technologies are available?

Video conferencing hardware: webcams, headsets, microphones, speakers – These allow you to call and have remote video meetings via Skype or Zoom. When working remotely it can be hard to maintain a connection with colleagues.  Video conference calls let you stay in touch with co-workers, teammates and managers and maintain the productivity of face to face meetings.

VPN (Virtual Private Network) – A VPN allows you to connect securely to another network over the internet. It creates a secure tunnel between the user computer and office computer or server. Using a VPN allows employees to safely access company data from any network, public or private. These are crucial for businesses to avoid man in the middle attacks. This is where data is unencrypted and can be snooped upon by malicious parties.

Office 365 – Office 365 is Microsoft’s cloud based services including emails through Exchange Online, file management and storage through SharePoint and OneDrive, collaboration and chat through Teams along with cloud connected versions of popular applications (Word, Excel, Outlook, PowerPoint, OneNote). All programs can be used online through a browser, and all files can be accessed from the cloud, wherever and whenever they are needed. With Office 365 employees are able to work together and collaborate together, with the ability to work on the same document even in separate locations.

Third Party Office 365 Backup – Having a third party Office 365 backup system in place allows you to keep important business documents and emails secure and safe. It ensures that you can restore any data quickly in the event of any accidental or malicious deletion, user error, ransomware or data corruption. If there are ever any issues with the Microsoft Servers you have your own completely separate version of all of your files and emails.

Managed Antivirus – Its important to have one of the highest rated Anti-Virus products on the market protecting your workstations, laptops and servers. A managed antivirus solution goes one step further in allowing IT admins to remotely monitor any virus outbreaks on your network and act quickly to respond to any issues.

Remote IT Support – IT Support companies can now effectively monitor and manage your computers and networks remotely. To do this they utilise remote management tools which give insights into any issues that your devices are experiencing. Along with management tools they usually install a remote access client to connect to your device quickly and securely. This saves you time, as there are no travel costs involved. With this scenario it doesn’t matter whether users are working from home or out of the office, the IT support personnel can log on to their computer and fix any issues.

If you are struggling with this shift to working from home, either as a business or an employee we can help you! From something simple such as supplying a webcam, to assisting you to set up remote access to your office through a VPN, setting up cloud emails and applications through Office 365 or anything in between get in touch with us today.

Have you experienced your computer bluescreening when printing to a Kyocera, Ricoh or Dymo printer?

Over the past week we have had many clients experiencing the infamous Bluescreen of Death (BSOD) when they have attempted to print, and this is a known issue with a Windows Update that was rolled out last week to Windows 10 computers.

The windows updates were released on Tuesday last week, and affect both client and server Windows versions including Windows 10 version 20H2, Windows 10 version 2004, Windows 10 version 1909, Windows 10 version 1809, Windows Server version 20H2, Windows Server version 2004, Windows Server version 1909 and Windows Server version 1809.

The updates causing the blue screens when printing are:

  • KB5000802
  • KB5000808
  • KB5000822
  • KB5000809


How can you fix this?

Microsoft has since released updates to fix the Windows 10 blue screens when printing as optional updates to install via Windows Update. To install these manually you will have to open Windows Update from your settings and ‘Check for updates’, and you will then be able to directly click a link to download and install the optional update.

The optional updates to fix this issue are:

  • KB5001567 for Windows 10 version 2004/20HT
  • KB5001566 for Windows 10 version 1909
  • KB5001568 for Windows 10 version 1809 enterprise/education/LTSC 2019
  • KB5001565 for Windows 10 version 1803 enterprise/education


If you are experiencing this problem, and can’t fix it get in touch with us today and we’d be happy to help you out!

We hear it all the time, “My computer won’t start, saying disk not found”, “I opened an email and now I can’t open my files”, “My external hard drive where I keep all my photos isn’t detecting”.

And our first question to any of these is “Do you have any backups?”

There are so many ways that you can lose your data that it’s quite alarming how many of us don’t backup our files.

Situations Where Backups Can Help

If your computer dies from a hardware fault, it’s quite easy to get back up either with a repair or a replacement.  But if you lose all your data including your photos, they are potentially gone forever.  The simplest way to protect your data is to have at least one copy of it on an external hard drive.  The more copies you have, the less chance there is of losing all your data.

It is also important to do backups properly.  Like everything else in the technological world, backups will fail sooner or later.  Investing in a professional to setup your backup, make sure it works and provide some training will ensure you backups will run smoothly for a long time.

Backup options

We recommend and use Storage Craft Shadow Protect as it is a full featured backup software solution.  It has software for you desktop PC up to your file server at your office.  The backups from Storage Craft are an image based backup solution, allowing us to restore the system to a previous point in time with all software and files back how they were at that particular time.  You know the saying, “don’t put all your eggs in the same basket”, So we like to configure Storage Craft with a set of at least 3 external drives, 1 that’s currently being backed up, 1 in transit and 1 that’s offsite at a secure location.

Cloud based backups

Another option for saving your files is using a cloud service like Dropbox or One Drive.  Both offer a free amount of storage before you need to buy a plan to get more storage.  Cloud storage has become a lot more robust and secure over the years, now offering options like file history allowing you to go back to a previous version of a file.  It also allows you to access your files from the cloud anywhere in the world with an active internet connection.

Set & Forget?

We would love to just be able to set up a backup and never have to worry about it, but sadly that’s not the case.  Ideally it is a good idea to check your backups periodically to ensure they are working efficiently and effectively.  You don’t want to go to your backups in a time of need and find they haven’t been working for the last month.

Should I Backup Up My Smart Phone?

Another thing to consider is your smart phone.  When’s the last time you backed it up?  How many photos have you taken since the last time you backed it up.  We rely on our smart phones more and more, however problems arise when they fail, are dropped or end up in the toilet.  Making sure you have a regular schedule to back up your smart phone can ease the anguish when your device may inevitably fail.

By now you have probably heard of the CryptoLocker malware, by firsthand accounts or even on the news.  This is very prevalent on the Sunshine Coast and has affected many local businesses. It is part of a nasty class of software known as ransomware, malware that adversely affects a victim’s computer, and demands a ransom be paid in order to restore functionality.  Although ransomware has existed for many years, CryptoLocker’s release in 2013 caused a massive increase in reported cases, and it doesn’t show any signs of slowing.

What is Encryption?

The modern forms of ransomware take the form of malicious email attachments or URL links that subversively downloads a file to the victim’s PC which then begins encrypting the user’s photos, videos and documents. Strong Encyption is basically locking files away behind a very long password that cannot be cracked except in very rare cases. The malicious program that encrypts the files holds this key and will request the ransom in order to unlock all of your files.

What is Encrpyted?

As well as encrypting local files on the computer, the malware will also encrypt any other computers with shares on the network. This will include devices like NAS Storage devices or even Servers or other computers. Encrypted files will appear with different extensions – often .enc or .encrypted and will not be able to be opened. Once infection is underway, users will receive a message file (often dropped into every folder as “HOW_TO_UNENCRPYT.txt” informing them that their files have been encrypted, and directs them to a bitcoin payment site where the victim must pay a ransom in order to receive access to their files again.

In some rare cases, it can be possible to recover these files using what’s called Shadow Copies.  This technology is used by Windows to take automatic backup copies of files and folders in case of data loss.  Unfortunately, most modern ransomware software deletes these automatic copies as part of its infection routine, and thus is not reliable as a backup solution or ransomware prevention method.

Although CryptoLocker and other ransomware like it can prove devastating to those unprepared it is still malware and, just like all malware, there are steps that you can take in order to prevent it.

Preparation and Vigilance

The most effective means of avoiding infection by ransomware is preparation and vigilance.  As mentioned above, the most common method of infection is by attachments and website links attached to emails.  These emails can appear to be from well-known companies (previous examples include Australia Post, AGL Energy and Optus), friends and family, or work colleagues.  If you receive an email that contains an attachment of website link, it is better to be safe than sorry, so always triple check its contents before opening anything.

Check Sender Address

In the below example, you can see that although the email appears to be from Australia Post, the sending address is clearly not from an Australia Post official email account, and it appears to simply be a free email account created through Yahoo. Don’t trust anything that is not from the website you know such as the official Australia Post website


Check all Hyperlinks

In this example it wants you to click a link with the get parcel info to find out why it hasn’t been delivered. This will then download malware to your computer which when you run it will encrypt all your files.Note again the sender address is nothing like what you would expect.

Australia Post Scam Email

If the suspect email contains links rather than attachments, there are also ways of checking them before opening.  Without clicking on the link, simply hover your mouse over it.  This will display the actual text link that the email is trying to send you to.  In the case below, the sender claims to be from AGL Energy, telling the recipient that there are overdue fees.  When hovering over the link however, we can see that instead of the correct URL from AGL (, the link is a Russian address and not an official AGL Energy domain, and thus is almost certainly a malicious link that would try to download ransomware to the system. Don’t click this link!


Call the Sending Company

Whenever in doubt, the safest option is to call the person or company that appears to have sent the email to confirm that it is safe to open; remember to look their phone number up yourself, as the phone numbers included on the emails will often be false.  It is always better to be safe than sorry.

Help with Prevention

Aside from monitoring your emails, there is a range of software products available to help prevent ransomware attacks.  At OJ Networks, we have had some success with a program called CryptoPrevent.  A dedicated anti-ransomware suite, this program stops ransomware by preventing programs from running executable files (which are used to install the malware) in many of the locations that are used by CryptoLocker and other malware.  The rise of ransomware in recent times has meant that most good antivirus software has tools to combat it, and it is more important to make sure your PC is protected.

The Only Real Solution: Backups, Backups, Backups

Finally, perhaps most important is keeping a regular and up to date backup solution for your PC.  If the worst does happen, and you become infected, the last thing you want to do is hand over your hard earned money to the people who are holding you data to ransom.  With a solid backup solution, not only are you protected from malware attacks, you guard yourself against data loss, accidental deletions, computer hardware faults, and much more.  It really is invaluable if you used your computer to hold important information, personal photos and business documents.  One important thing to note with backups is that they too can become encrypted by ransomware if the USB drive you are storing them on is attached to your PC at the time of infection.  For this reason, we recommend that after you take a backup of your system and documents, you remove the USB drive from your PC and store it safely.

For business users, we take the next step and implement a full backup rotation of drives, often up to 5 of them, and couple that with backup software called ShadowProtect.  This powerful program allows us to manage multiple instances of backups over large periods of time, which allows for archival backups stretching back months in addition to the safety of having multiple backups spread over many devices and locations.  Another great benefit of using ShadowProtect is real time data recovery.  If only a few files are lost and damaged we can simply “load” a backup from before the time of data loss, and copy only what is needed rather than implementing a full data restore.  This can be invaluable for businesses who rely on server uptime and cannot afford the time for a full recovery.

Over the last few weeks, we have seen Windows 10 begin to roll out to computers across the world.  As people have begun to take advantage of the free upgrade offered to them, some of our clients have come to us with a peculiar error that prevented Microsoft Outlook from being able to send email after they completed their Windows 10 upgrade.

Users first notice that no emails they send are getting through, and a small SEND/RECEIVE ERROR is displayed in the bottom right of the screen:


When expanded, this error shows itself in more detail:
Sending reported error (0X800CCC13).  ‘Cannot connect to the network.  Verify your network connection or modem.’


Upon verifying that all the SMTP, username and password settings, were correct, we eventually came across the solution; running a command in order to correct missing or corrupt system files in Windows.  This command is known as the System File Checker, and below I will run through the process involved in invoking the program using a command prompt command:

  1. First of all, we need to open the command prompt.  Right click the Windows button in the bottom left of the screen, and select Command Prompt (Admin).
  2. Enter the following command:

    sfc /scannow

SFC Scnannow

Once completed, you will receive a message confirming that Windows found some corrupt or missing files, and that it has repaired them successfully.

Load up Outlook, and check that your emails are now sending!

If you are still having issues, there is still hope.  Another command that other users have found helped them out is using the NetShell utility from the command prompt, similar to the solution we provided above.

  1. Open the command prompt once more by right clicking the Windows button in the bottom left of the screen, and select Command Prompt (Admin).
  2. Enter the following commands:

    netshwinsock reset

This handy set of commands will reset your network adapter to its default settings, and hopefully get you going again.


OJ Networks prides itself on the Professional and  value for money IT services we provide on the Sunshine Coast. Since our incorporation in 2010 we have kept our fees at the same low rate. Recently the cost of business has increased and our fees will be increasing for the first time.

Please see the table below for the new fees applicable from 1 July 2015.

Service Before 1 July 2015 From 1 July 2015
Ad Hoc Business Hours IT Support
(Remote/On-site in Coolum Area/Additional Hours Onsite outside Coolum Area)
$80 + GST $90 +  GST
Ad Hoc First Hour On-site IT Support (Outside Coolum Area) $100 + GST $110 + GST
Ad Hoc Web Development and Maintenance $80 + GST $90 + GST

Managed Services Fees will not change and clients on Managed Services Agreements will not see a change in their fees.

We look forward to provide the same high quality of service our customers have come to expect.

We had a problem recently where we replaced the external backup drives on a client’s 2008 r2 server with a new suite of Samsung m3 portable 2tb USB 3.0 drives. The problem is that when the drives were plugged into the server on any USB port, they were detected as USB devices fine but did not appear in Windows Explorer. We checked in Disk Management and the drives appear ok but do not offer a drive letter. Also, the only option when right-clicking on the drive in Disk Management is to convert to a dynamic disk. There is no option to change drive letter.


After some research it was determined that the physical sector size on these drives was 4KB. Drives with physical sector size of 4KB represent the latest technology and as they are transitioning from the traditional 512 byte sectors which has existed since drives were measured in megabytes. The physical sector size represents the smallest unit that will be consumed even when the file being written is smaller. Years ago it would matter if a few Kilobytes were wasted but as the size of storage drives continually expanding, it makes sense for the physical sector size to grow too. A larger physical sector size means less error checking (ECC) required and therefore faster access.

It turns out that a lot of these Advanced Format Disk that have a 4KB physical sector size do still have the capability to be backwards compatible with 512 byte physical sector size systems. They do this by changing their logical addressing system to 512 bytes although their physical sectors remain at 4k. They are known as 512-byte emulation disks.

We did a check of the drives using FSUtil on a windows 8 machine which supports these drives natively…

Fsutil fsinfo ntfsinfo [driveletter]

It shows the Physical and logical “Bytes per sector” value. The drives we had were emulation disks.


Apparently this Server 2008 r2 had some issues seeing these drives properly. To solve this issue we installed the…

Microsoft KB 982018 – An update that improves the compatibility of Windows 7 and Windows Server 2008 R2 with Advanced Format Disks is available

and rebooted the server. The drives magically appeared with a drive letter and the correct sizing for 2tb.

The strange thing is that this update is supposed to be contained within SP1 of Server 2008 r2 which this server already had. Maybe the USB subsystem just needed to be reset in some way that this update helped with. In any case – if you are addressing this problem it might be worth a try!



The screenshot attached to this post will provide a good laugh to anyone that knows Windows. What the supposed “Windows Technical Support” expert has done here is type commands like “14 Trojans Found”, “Drivers Corrupt” and “Hackers to Network”! into command prompt and then tell the computer owner that their computer is infected and needs a lot of work to fix.

When you get an issue on your computer please think about taking it to someone local. What our customer has done in this case is had a problem with her laptop display and googled for free windows support. They have started an email or online chat and the person that has answered from some country overseas has then convinced them to start a gotomeeting ( This allows the remote user to gain access to your computer. They then tried to convince the customer that they needed a lot of work done and it will cost $x. Of course, once they are in they can install whatever they like and in cases like this will do absolutely nothing to fix your pc – in fact they will probably install trojans and malware so they can use your computer or get in again in the future.

Luckily for this customer they thought twice before proceeding and brought the laptop in to us to have a look. When we saw the command prompt window we had a laugh. It may not be so funny if you part with hard earned cash to these scammers though. Please use someone local and reputable – it may seem more expensive than free or super cheap online support but is it really?

External hard drives are not immune to having issues.

They are often transported around and bumped and knocked more than a drive in your computer. Many people consider these USB drives as a “backup” device and then proceed to place the only copy of their information on them.

Remember that in order for it to be a backup it needs to be a copy of the information stored on your main hard drive.

In the case where your external hard drive is not responding, the data may still be accessible. There is a controller on most external drives that may be malfunctioning.  In this case we can remove the drive and put it into a new external caddy to get it working again. In some cases through the actual drive is faulty and the data may not be able to be retrieved.

Which is why you should only keep a backup copy of your data on there!

Drop in or give us a call if you have any issues with external USB drives on the Sunshine Coast.


If you have a multi-storey home or a very long one that is made of concrete, you may find that the Wi-Fi signal from your modem/router doesn’t carry right through the house. This can be frustrating as your mobile devices keep switching back to 3g when they lose the signal.

There are a couple of options to fix the issue.

One is a wireless repeater. This is an access point placed within wireless range that connects wirelessly to your existing router. It boosts the wireless signal from its position. With this solution results vary widely and even change day-to-day.

A much better solution we have found is to use Powerline devices. These connect into the 240v power system of your house to work as a substitute for Ethernet (blue cables). Plug one in where your router is and connect it into the router. Plug the other one in out near the dead spot and you will have a solid Wi-Fi connection throughout your house. Powerline devices do rely on the power outlets being on the same phase and circuit. We have Powerline devices in stock and can install and configure them on-site if you are faced with this issue.