Search

Advanced Search
Screen Reader users press Enter to Limit by product.  Limit by product
Screen Reader users press Enter to Limit by category.  Limit by category
Search Tips
Search filters applied

Search Results

Other Suggested Searches
Did you mean:
No results found.

Suggestions:
  • Make sure all words are spelled correctly
  • Use different words that mean the same thing
Results 1 - 10 of 38
Recommended Links
  1. Received an email but not sure if it's really from BT? Read more about "phishing" emails
    If you receive an email that appears to have been sent by BT with the either of following subject fields:   IMPORTANT: Alert about your BT Internet billing information on file or British...
    Date Updated: 18/05/2009
  2. 22/07/09: BT and Vodafone Agreement
    Consumers and small businesses in Ireland will benefit from greater competition and choice, following a strategic partnership agreed between BT and Vodafone.  The landmark contract will...
    Date Updated: 22/07/2009
  3. Q&A's regarding the BT and Vodafone Agreement
      Click here to read the full statement about the agreement between Vodafone and BT   What BT customers will transfer to Vodafone as part of this agreement?   This agreement involves...
    Date Updated: 22/10/2009
  4. Ensure your Wireless Connection is Secure
    Wireless routers use various security technologies to prevent unauthorised users connecting to the Internet over your wireless network.   The BT Voyager 2110 Wireless routers is preset with WEP...
    Date Updated: 02/05/2008
  5. Peer-to-Peer File Sharing and Copyright Infringements
      What is Copyright? Copyright is a property right, essentially giving the copyright owner the exclusive rights to produce copies, control or perform an original literary, musical, dramatic or...
    Date Updated: 07/03/2008
  6. Knowing if an Online Transaction is Secure
      Firstly, what is a secure connection? A secure connection is an encrypted exchange of information between the website you are visiting and Internet Explorer. Encryption is provided through a...
    Date Updated: 23/04/2008
  7. Spyware, Adware and Malware
    Spyware (also known as adware and malware) can install on your computer using a variety of methods, for instance if you view a web page that has malicious code, or through a virus which has infected...
    Date Updated: 23/04/2008
  8. Think Before You Click: The Top Five Internet Scams
    Internet scams are by no means a recent phenomenon, but certain scams come back again and again. Here are five popular Internet scams that you should be on the lookout for.  1. Auction fraud...
    Date Updated: 04/02/2009
  9. Protecting your identity online, part 1
      What is identity theft?   Identity theft is when your identity is stolen by a criminal who then impersonates you and uses your personal details for fraudulent purposes. By assuming your identity...
    Date Updated: 23/04/2008
  10. Protecting your computer against Viruses & Worms
    Computer Viruses A computer virus is merely a program that attaches itself to another program or data file in order to spread and reproduce itself without the knowledge of the user.   The effects of...
    Date Updated: 23/04/2008