« Older Entries Subscribe to Latest Posts

23 Jul 2012

Secure your portable files

Posted by admin. 2,160 Comments

Flash Padlock 2/8GB 256-bit AES Hardware Encrypted USB Flash Drive

Ever lose or misplace your USB Flash Drive? Would you want someone to freely look at all your personal or business data stored on your lost or misplaced flash drive? Corsair’s Flash Padlock 2 is built for people who want the transportability and convenience of a flash drive,but with the added security and protection of hardware 256-bit encryption and a user settable PIN to prevent anyone from viewing your sensitive data. The Flash Padlock 2 is encased in durable rubber housing,and comes with 8GB of storage for all your document needs.

Key Features

  • Secure your personal or business data with a Corsair Flash Padlock 2 USB flash drive
  • Secure 256-bit hardware AES encryption
  • User customizable 4-10 digit personal identification number to lock and unlock
  • Built-in hacking detection locks device for 2 minutes after 5 failed attempts
  • Durable rubber,shock-proof housing
  • Plug-n-play compatible via USB 1.1 or 2.0 port

16 Jul 2012

Apple iPad, iPhone & iPod Repairs

Posted by admin. 3,166 Comments

Broken iPad? No Worries!

We provide full iPad repair services in our dedicated workshop.

Fast, professional iPhone repair

We provide a full iPhone repair services for the 3/3G/3GS, 4/4S and more.

This includes repair of front glass, digitizer, back glass (4 only) and the LCD screen. we also replace cracked covers, volume, power and sleep buttons.

Prices Start from just €59 incl VAT


Quick iPad Repair

Our full range of iPad repair services include LCD screen replacements, housing replacements, water-damage repairs and all other common faults. NO FIX NO FEE

Screen repair from just €124.99 incl VAT



All repairs come with a full guarantee.

We also have a NO FIX – NO FEE policy on repairs!

So Get a FREE, no obligations repair quote today

Find us on FacebookFollow us on TwitterWatch us on YouTubeRead Our BlogFollow us on LinkedInRead Our Blog

eMail Enda to find out more about this Product

16 Jul 2012

Secure Wireless hotspot

Posted by admin. 2,703 Comments

Provide guests with internet access while keeping your network secure with Guestgate MK

1. GuestGate is easy to setup

2. Protects your network

3. Is cost effective

Perfect for pubs, hotels, coffee shops, restaurants, corporate conference rooms, libraries and other small to mid-sized businesses, the Intellinet GuestGate MK II Hotspot Gateway is an intelligent wireless access point that handles user authentication, authorization and accountability on a public Wi-Fi network. This means you can use our GuestGate MK II to offer a public wireless hotspot through your network without users having to change their Internet settings, and without having to open your vital systems (IP security cameras, administrative computers, network storage, etc.) to prying eyes. Depending on the level of security you wish to enable for GuestGate MK II, users can be prompted to enter a password to access the network, and you can create a “walled garden” to prevent users from accessing high bandwidth websites or inappropriate content. Plus, GuestGate MK II isolates each guest user on the Wi-Fi and wired network, making for a safer and more enjoyable public Web browsing experience.

Captive Portal

GuestGate MK II offers must-have functions that define a captive portal. You can customize the welcome page by changing the text or uploading a new banner image, or you can change the welcome page completely because we give you full access to the HTML code.
The Walled-Garden functionality allows you to present Internet service to your guests, even if they have not authenticated themselves. Do you want to show the hotel services pages, company directory or special offers to all guests? Walled-Garden is the answer. Thanks to the “redirect after login” function you can forward your guests to a Web page of your choosing; e.g., special offers or your company’s Web site. If you’re worried about the amount of bandwidth the guest users are consuming, you can set a global bandwidth cap for both upload and download speed, thus guaranteeing that the guest network will always leave enough bandwidth for your crucial business applications.

Easy Access

When using GuestGate, there is no need for your visitors to reconfigure their notebook computers in order to access the Internet through your network — simply log in using the company-provided password.

Protect Your Private Network

Using the INTELLINET NETWORK SOLUTIONS HNP Technology, GuestGate MK II prevents clients from seeing the host network, while at the same time allowing them access to the public Internet. Special privileges, such as access to specific servers and printers, can easily be configured as needed while still providing host network protection. For added protection, you can choose to assign your visitor a password for Internet access. You can even limit the amount of bandwidth allowed for the guests, further ensuring that your network is not impacted by the additional users.

Client Isolation: Protect Your Guests’ Computers

Your visitors can rest assured that the security of their notebook computers will not be compromised by strangers; e.g., other guests you may have visiting and accessing your network at the same time. This innovative device protects your GuestGate users by assigning different random networks to each client. This unique client isolation capability is provided through Layer 3 LAN technology, and ensures that no connection between guest computers can be established (even if they are connected via a wireless access point). As if that were not enough, GuestGate also protects the guest computers from unauthorized access through the Internet, helping to prevent their computer from being attacked while connected to the Internet through your LAN.

Wireless Coverage and Speed with Wireless 300N!

The new Wireless-N standard has dramatically increased the overall performance of a wireless network. With speeds up to 300 Mbps and dramatically improved coverage distances, the new Wireless-N technology greatly surpasses that of 802.11g. Should this increased performance still not be sufficient for your environment, you can quickly attach additional access points to GuestGate MK II and increase your wireless coverage without the need for complex configurations.

Scalability and Flexibility

GuestGate MK II can be easily integrated into larger networks. It can be connected to virtually any network port that offers Internet access without interfering with the existing network. If you don’t wish to provide wireless access, or if you wish to continue to use your favorite brand of WiFi gear, you can simply deactivate GuestGate’s wireless function.

Thanks to the integrated 10/100 Mbps LAN switch, you can connect additional switches to GuestGate MK II; e.g., guests can connect to it through Ethernet ports in hotel rooms. And since GuestGate already provides the security mechanisms you need to protect both your own network and your guests, there is no longer a need for VLAN Ethernet switches that are expensive and complicated to set up. Keep it simple and save money with GuestGate MK II.

Simple and Affordable Is Better

The award-winning first-generation GuestGate followed a very straightforward design principle: Keep it simple.
Security devices often overburden the user with complex configuration screens and require solid know-how of networking setups. As a result, more often than not, the setup of proper security either is abandoned at the halfway point or comes with a hefty price tag. In GuestGate and GuestGate MK II, all security settings are preconfigured and activated by default. That means security out of the box at a price you can afford.

Find us on FacebookFollow us on TwitterWatch us on YouTubeRead Our BlogFollow us on LinkedInRead Our Blog

eMail Enda to find out more about this Product

15 May 2012

World’s 1st Mouse Scanner

Posted by admin. 3,680 Comments

There are countless moments in everyday life where you wish you had a scanner to hand – when children want to scan teaching material or articles from magazines, or when you have to type the details of a document. With the LG Scanner Mouse one drag is all it takes to complete your scanning. The Scanner Mouse also features remarkable editing power that converts text into a Microsoft Word or Excel document. You can also share in real-time through Twitter, Facebook etc. From now on enjoy easier, faster scanning with the LG Scanner Mouse.


Easy to Use:

With the Drag function the LG Scanner Mouse is so easy to use. You just drag it across the paper you want to scan and you can see the result on the screen immediately. Also a fully functioning 5 button laser mouse that you can use everyday.

OCR (Optical Character Recognition):

The OCR function means that you no longer have to re-type text in order to edit it; just scan it with the LG Scanner Mouse and save it as an editable file, i.e. Microsoft Word.

Scanning of Multiple Sizes:

You can scan any size up to an A3 or just scan a small area on a large sheet of paper.

Real-Time Scanning:

You can send your scanned files as emails, SNS (via Facebook, Twitter etc) and via SmartPhones.

Find us on FacebookFollow us on TwitterWatch us on YouTubeRead Our BlogFollow us on LinkedInRead Our Blog

eMail Enda to find out more about this Product

1 Mar 2012

Meet Windows 8…

Posted by admin. 2,416 Comments

Windows 8 Consumer Preview

Earlier today in Barcelona Microsoft announced the availability of the Windows 8 Consumer Preview — the next milestone of the Windows operating system. This latest preview will be made available for download starting today at http://preview.windows.com. The Windows 8 Consumer Preview offers a more robust experience for testing the world’s most popular operating system and is available to the widest range of people yet following the initial release of the Windows 8 Developer Preview late last year. The Developer Preview received more than 3 million downloads.

“With Windows 8, we reimagined the different ways people interact with their PC and how to make everything feel like a natural extension of the device, whether using a Windows 8 tablet, laptop or all-in-one,” said Steven Sinofsky, president of the Windows and Windows Live Division at Microsoft. “The Windows 8 Consumer Preview brings a no-compromises approach to using your PC.”

Some of the key new updates in the Windows 8 Consumer Preview:

• Broad range of product changes and improvements.

Since the Developer Preview in September, designed to preview the programming platform, Windows 8 has progressed across every dimension. From completing the user experience for touch, keyboard and mouse to refining the development platform, the Consumer Preview improves performance, quality and reliability across all subsystems. With the added features, it represents a more complete view of the capabilities of Windows 8.

• Windows Store with new apps.

The Windows 8 Consumer Preview marks the beta opening of the Windows Store, which is filled with a variety of new Metro style apps from both third-party developers and Microsoft. During the Consumer Preview, these apps are available to try and experience at no cost to users. The Windows Store will offer personalized recommendations, and Windows 8 gives users the ability to take their apps and settings with them across multiple PCs, making it easy to discover and try new apps while offering developers the greatest opportunity of any platform.

• Connecting to the cloud across Windows-based PCs and Windows Phone 7.

The Windows 8 Consumer Preview offers seamless integration with the content people care about across their Web services. An optional additional sign-on with a Microsoft account provides access to a host of features, including the ability to roam all settings, use cloud storage, communicate with email, calendar and contacts, and connect to a broad range of services. Your connection to the cloud works across your Windows-based PCs and your Windows 7 phones.

• Internet Explorer 10 Platform Preview 5.

The best way to experience the Web on Windows is with Internet Explorer 10. The browser has been re-imagined to create a new experience designed specifically for Windows 8 devices. It provides an edge-to-edge user interface that is all about less browser and more Web. Fast and fluid, Internet Explorer is hardware-accelerated to enable Web performance.

• Preview of new hardware capabilities.

At the event, Microsoft also showcased Windows 8 running on a wide range of new x86- and ARM-based reference hardware. This hardware will be available to select developers for trial and testing as previously announced.

The Windows 8 Consumer Preview will be available worldwide for download at http://preview.windows.com or http://windowsteamblog.com.

Find us on FacebookFollow us on TwitterWatch us on YouTubeRead Our BlogFollow us on LinkedInRead Our Blog

eMail Enda to find out more about this Product

26 Jan 2012

Introducing the HP Slate 2…

Posted by admin. 13,905 Comments

The HP Slate 2 Tablet PC is ideal for people with jobs that frequently take them away from a traditional desk, yet need to remain productive in a familiar Windows environment. The HP Slate 2 is also intended for those who use custom applications that must operate in a Windows environment

Why is this tablet right for me?

HP SlateIntegration – The HP Slate 2 brings you a mobile, full featured tablet that can integrate into a Windows 7 Operating System environment.

Windows 7 Professional- benefit from incredible speed, improved networking, data protection, and backup/recovery.

Multi-Touch- Lets you work intuitively with both pen and touch capabilities with Swype virtual onscreen keyboard.

Design- Smart Lightweight design and function with a starting weight of just 0.69kg.

Security – TPM embeddded Security Chip.

2 Dec 2011

Zoho CRM

Posted by admin. 2,281 Comments

Build, Maintain & Strengthen your Customer Relationships

Zoho CRM offers you a complete customer relationship life-cycle management software for managing Sales, Marketing, Customer Support, and Inventory activities in a single system. It is simple to use, yet packed with features for automation, customization, integration, and collaboration that allow you to grow your business and have a 360-degree view of your customer interactions.


All in One Solution

Zoho CRM offers all the CRM modules and tools that you might need to run your sales & marketing.

• Value for your money.

We not only provide a great CRM software, but also have a great price too.

• No long term contracts, pay as you go.

You have the flexibility of paying monthly or yearly.

• It’s all hosted.

When you choose Zoho CRM, we do the hard work for you. Just focus on selling and leave the rest to us.

• Full Training

We can provided your staff with full training so you get the full benefit of the Zoho solution.

Find us on FacebookFollow us on TwitterWatch us on YouTubeRead Our BlogFollow us on LinkedInRead Our Blog

eMail Enda to find out more about this Product

26 Oct 2011

Avoid scams that use the Microsoft name fraudulently

Posted by admin. 3,958 Comments

Cybercriminals often use the names of well-known companies, like Microsoft, in their scams. They think it will convince you to give them money or your personal information. While they usually use email to trick you, they have been using phone calls frequently recently.

Common scams that use the Microsoft name

• Someone from “Microsoft Tech Support” calls to fix your computer
• “You have won the Microsoft Lottery”
• Microsoft “requires credit card information to validate your copy of Windows”
• “Microsoft” sends unsolicited email messages with attached security updates

Avoid these dangerous hoaxes

Microsoft do not send unsolicited email messages or make unsolicited phone calls to request personal or financial information or fix your computer.
If you receive an unsolicited email message or phone call that purports to be from Microsoft and requests that you send personal information or click links, delete the message or hang up the phone.

Microsoft does not make unsolicited phone calls to help you fix your computer

In this scam cybercriminals call you and claim to be from Microsoft Tech Support. They offer to help solve your computer problems. Once the crooks have gained your trust, they attempt to steal from you and damage your computer with malicious software including viruses and spyware.
Although law enforcement can trace phone numbers, perpetrators often use pay phones, disposable mobile phones, or stolen mobile phone numbers. It’s better to avoid being conned rather than try to repair the damage afterwards.

Treat all unsolicited phone calls with skepticism. Do not provide any personal information.

If you receive an unsolicited call from someone claiming to be from Microsoft Tech Support, hang up. Microsoft do not make these kinds of calls.

If you think you might be a victim of fraud, you can report it.

You have not won the “Microsoft Lottery”

Microsoft customers are often targets of a scam that uses email messages to falsely promise money. Victims receive messages claiming “You have won the Microsoft Lottery!” There is no Microsoft Lottery. Delete the message. If you have lost money to this scam, report it. You can also send the Garda Síochána report to Microsoft and we will use it to help law enforcement catch the criminals who send out these e-mail messages.

To help protect yourself from these e-mail hoaxes, you can use the same general guidance that you use to protect yourself from phishing scams.

Microsoft does not request credit card information to validate your copy of Windows

Microsoft require that your copy of Windows is legitimate before you can obtain programs from the Microsoft Download Center or receive software updates from Microsoft Update. Our online process that performs this validation is called the Genuine Advantage Program. At no time during the validation process do they request your credit card information.
In fact, they do not collect information that can be used to identify you such as your name, email address, or other personal details.

Microsoft does not send unsolicited communication about security updates

When Microsoft release information about a security software update or a security incident, they send email messages only to subscribers of their security communications program.
Unfortunately, cybercriminals have exploited this program by sending fake security communications that appear to be from Microsoft. Some messages lure recipients to websites to download spyware or other malicious software. Others include a file attachment that contains a virus. Delete the message. Do not open the attachment.

Legitimate security communications from Microsoft

• Legitimate communications do not include software updates as attachments. Microsoft never attach software updates to our security communications. Rather, they refer customers to their website for complete information about the software update or security incident.
• Legitimate communications are also on  Microsoft’s websites. If  Microsoft provide any information about a security update, you can also find that information on their websites.

9 Sep 2011

DataTraveler 108…

Posted by admin. 3,355 Comments

Kingston’s new DataTraveler® 108 USB Flash drive is small and slim enough to fit anywhere while protecting your data. Its capless design features a USB plug protected by an aluminium cover that flips when you need to access your data. And its handy key loop lets users transform this stylish drive into a fashion accessory with the use of a lanyard.

And the best thing is they are only €20 for a 16GB Stick


Find us on FacebookFollow us on TwitterWatch us on YouTubeRead Our BlogFollow us on LinkedInRead Our Blog

eMail Enda to find out more about this Product

26 Aug 2011

Introducing the Epson EB-1775W…

Posted by admin. 2,484 Comments

Whether travelling on business or simply moving between meeting rooms, this ultra-mobile projector is the ideal choice for effective, stress-free presenting.

Weighing just 1.7kg, this stylish projector combines an extra-flat design with3LCD technology and a 3,000 lumens output. The result is exceptional picture quality and bright, natural colours, while the WXGA projector offers widescreen presenting.

Images are completely focused and fit the screen or whiteboard perfectly with theaddition of automatic vertical and horizontal keystone correction and screen-fitfunctions. And with no placement constraint, you can set up the projector anywhere in the room and your image will be automatically adjusted to fit the screen.


Presentations can be controlled and improved with a host of EasyMP features including: wireless connectivity, 3-in-1 USB display, USB plug-and-play flash driveand multi-screen display.



• Projector
• Power cable 3m
• Computer cable 1.8m
• USB cable
• Remote control and batteries
• Soft carrying case
• Bundled software
• Password Protect sticker
• User’s manual
• Wireless LAN unit
• Quick Wireless Connection USB Key


Find us on FacebookFollow us on TwitterWatch us on YouTubeRead Our BlogFollow us on LinkedInRead Our Blog

eMail Enda to find out more about this Product

  • Browse

  • Latest Offers

    • Advert for: describe the service offered
  • Categories