1800 677 656


Blogs by the Aspedia Developers

May 4th - Google Partners Event - Learn the Latest Techniques from Google Experts

A Development article written by Denise Belcher
The Aspedia Marketing Team would like to personally invite you to join Aspedia Australia for our Google Partners Connect Event which will be held on 4 May 2016 at 11.30 am. Join us either in person, or online, and learn from some of the experts at Google.

Aspedia Implements new Email Server with a new Spam Filtering Solution

A Development article written by Mike Whitehouse

Aspedia Australia are committed to the continual improvement of our technology systems as we understand the importance they play in the ongoing success of businesses. As a result, last night (04/05/2015) our systems administrator implemented a new Email Server with a new spam filtering solution that will improve our ability to detect SPAM messages.

LCA 2015 Part 1

A Development article written by

We sent our System Administrator Julian De Marchi to the 2015 Linux Conference in Aukland which he has turned into a series of blogs to keep everyone up to date with what is going on in the world of linux.

Part 1:

Developers Rejoice – Microsoft is Dropping Support for Outdated Browsers

A Development article written by Elle Meech

Microsoft has announced they will be stopping support for their outdated browsers from 2016, only supporting the latest IE release. They will also be helping users transition to the newest update by releasing resources and upgrade guidance.

The Australian Government looks to Standardise Drupal

A Development article written by

The federal government is looking at the introduction of a government-wide content-management system. The Australian Government Information Management Office (AGIMO) has shown interest in using the open source Drupal Web platform along with delivering the CMS as a cloud service.


Privacy Policy should include Mollom

A Development article written by George Tsoukatos

The Australian Government has introduced new Australian Privacy Principles, and a main topic was adding additional information on the management of personal information which is held by an entity.

Who has Mollom?

All of our client websites that currently have a webform such as a ‘Contact Us’ form and any other type of online form will currently have Mollom turned on.

What does Mollom do

Similarities between a Custom Website and Building

A Development article written by

A custom website is more like a building and people usually ask: to construct me a building, how much will it cost? This is a very open-ended question to which there could be a few different responses such as: What kind of building do you want? What are your budgets? What do you need to put in the building? What is the location? What are the construction materials? Do you already have plans?

These are the same main questions you need to answer when creating a website.

What type of building/website do you want?

Record-Breaking DDoS Attack

A Development article written by

Recently a record-breaking distributed denial of service attack (DDos) was made on CloudFlare, an online company that operates a global content delivery network. The attack hit their data centres in both the US and Europe. The attack is the largest we have seen and exceeded 400 gigabits per second; this record makes it the largest DDos attack ever recorded.

How the attacks are carried out

Crypto Malware Virus Update

A Development article written by Phil G

Since the Crypto Malware Virus was first detected in early September 2013, the ransomware has become a very profitable and huge success for the group behind it. The unknown group of attackers has performed between 200,000 and 250,000 known system infections worldwide. Not everybody paid the ransomware demand, but of those who did the attackers were able to raise 41,928 bitcoins. Due to the exchange rate and how much each bitcoin is worth (roughly $300 USD), the attackers have now made 40 million dollars! 

Price and Payment

Important Crypto Malware Virus Warning

A Development article written by Phil G

There is a nasty virus called Crypto Malware Virus that is currently doing the rounds. The Virus encrypts all files that it can find and then charges a ransom to decrypt the files.

Why the Virus is so Dangerous

The virus can infect by a simple click by a staff member opening an attachment on a suspicious email. Then without any special permission or breaking network policies, the virus is run successfully. The malware is able to look at every data-related file that person had rights to and encrypts all files.