Delete Empty Folders

So you have installed and uninstalled programs over the years.   Did you know you could have dozens or even hundreds of empty folders on your computer.   Delete these Folders with Empty Folder Nuker.   Empty Folder Nuker deletes empty folders and insures if there are subfolders with files, it skips these folders.

Link

The base folder is the hard drive or a directory you want to check.

It will take some time to scan each drive.   Deleting empty folders will optimize your hard drive (especially after defragging).

So what was the result?

You should scan through and make sure you check only folders that are not needed.   This program is around 99% accurate.  DO NOT DELETE YOUR TEMP FOLDER OR OTHER FOLDERS THAT WARN THEY ARE SYSTEMS FOLDERS.

Free Microsoft Digital Literacy classes -earn a certificate

If you are new to computing, the internet or if you have some experience with technology, Microsoft offers an excellent online FREE curriculum to pick up basic online certificates along with two more advanced levels.   Their courses teach many essential skills along with productive work software, online safety and other areas.   These certificates would be excellent on anyone’s resume to help show their computer literacy.   Once you finish, simple print your certificate or you can register it online to show your employer.

You must use Internet Explorer- Digital Literacy

Windows 7 Registry Forensics: Intrusion Related Activities | DFI News

Windows 7 Registry Forensics: Intrusion Related Activities | DFI News.  Two possible situations arise when forensically examining a system for evidence of an intrusion: performing live incident response and/or conducting a post mortem examination of hard drives.  (Read more – above link)

Russia’s Top Cyber Sleuth Foils US Spies, Helps Kremlin Pals | DFI News

Russia’s Top Cyber Sleuth Foils US Spies, Helps Kremlin Pals | DFI News.

It’s early February in Cancun, Mexico. A group of 60 or so financial analysts, reporters, diplomats, and cybersecurity specialists shake off the previous night’s tequila and file into a ballroom at the Ritz-Carlton hotel. At the front of the room, a giant screen shows a globe targeted by crosshairs. Cancun is in the center of the bull’s-eye.

Shared with Share this – original Source: Wired

Find and set your optimal MTU setting to improve your connectivity

MTU Ping Test

Want to determine the optimal MTU for your ISP connection?

  1. Go to Search or Run (Windows 7 vs. XP)
  2. Type in cmd. Hit the enter. A Command prompt window will open.
  3. Type ping http://www.speedtest.net -f -l 1500 and hit Enter (or a website of your choice).

  1. Look at your results.  Does the packet need to be fragmented?  Try lowering the size of the packet in increments of 8 to 10) until you have a packet size that does not fragment.

  1. Once the packets are not fragmented, begin increasing the packet size from the number you find in small increments until you find the largest size that does not fragment.  You will need to add 28 to that number  for IP/ICMP headers to get the optimal MTU setting.
  2. If you get 1410 as the largest packet size, add 28 to that number and 1438 would be your optimal MTU setting.
  3. To change the number, use TCP Optimizer.

Remember to change all computers on the network including the router’s MTU setting.

Originally posted on TCAT Shelbyville - Technical Blog:

NTCore has an excellent little program that will patch .exe files of applications letting them use 4gb of RAM. Typically these applications will use far less than the 4gb of RAM in a 32bit operating system.  This 4GB Patch file is a tiny file that modifies the executable of files and creates a backup of the file.  Once executed, you simply pick the .exe file and it will patch the file to use more memory.

The software will then ask if you have finished or if you need to patch another file.

If this does not work, simply delete the new .exe and rename the backup file back to the original name.

View original

Innovation and leadership in IT at the Tennessee Technology Center at Shelbyville

The IT team at TTC Shelbyville  offers innovation and leadership recognized nationally in magazines1 and in education.    Under Ivan Jones, Director of the educational facility, the team consist of three personnel who teach and also maintain a complex and diverse network.

(L-R) Mike Miller, Assistant IT Manager, Dawn Babain, Network Administrator-LMS Specialist, Ivan Jones, TTC Director and Steve Mallard, IT Manager

The Computer Information Technology class in Shelbyville offers more certifications than any other institution’s program in Tennessee.     Beginning as a simplex class in the mid ’90s, the program evolved from a small PC Repair class to one of the most comprehensive classes in the nation.   The CIT program offers a curriculum that exceeds state level CIT standard curriculum.

So what is unique about the Tennessee Technology Center at Shelbyville’s CIT Program?    The program not only offers 30 hours per week of hands-on along with traditional classroom training but also  offers over 2000 resources in an LMS that is available 24/7/365.

With resources that include PowerPoints, movies, study materials, software and other traditional e-learning resources, the class also offers a lab in the cloud.  Unlike any other class, the lab isn’t software simulators but it is physical switches, wireless, routers, virtualization, firewalls, hubs, servers, cameras and other hardware.

The LMS has been programmed to not only be used by standard laptops and computers but can be used on smartphones and tablets regardless of the vendor.

“Students couldn’t take home managed switches, firewalls, routers, access points and other hardware – so we put the hardware where they could use it – anywhere in the world.”, stated Mallard. 

Real hardware in the cloud has been expanded to include SCADA devices and controls in the cloud.

The recent success of the learning management system was recognized by Computerworld and Techtarget.  TTC’s LMS also offers live video broadcast that has been used to deliver video conferencing and educational classes to other states.  With more than 100,000 logins last year, the institution’s Computer Information Technology LMS server will be upgraded the last quarter of 2012.

While a traditional student may receive a little over 500 hours in the classroom along with labs in college or universities in their area of study, the CIT program’s students receive 2196 hours of instruction, hands-on in labs and now at TTC Shelbyville students receive real world hands-on working with local non-profits and government entities.

Because of technological advancements,  students have to learn more information and technology at an accelerated pace.   Waiting four years to enter a career, technology will leave skills and technology learned behind for traditional students.

Working with national certification entities such as CompTIA, CWNP, ECCouncil and Microsoft, a CIT student’s work is measured by hands-on, academic achievement, industry certifications and other performance metrics.   Students are encouraged to start their careers immediately, continue advanced certifications and to enroll in college in order to complete a well rounded career path.

More about the team

Accredited by COE (Council of Occupational Education), the IT team were recognized for their quality of service during a recent national higher-ed accreditation.

Steve Mallard, IT Manager  has over 28 years experience in Information Technology.   Mallard began teaching at TTC Shelbyville in 1995 and has won numerous awards to include Instructor of the Year, Harold Love Award, 2011 Computerworld Laurette, and the 2012 TechTarget-Customer Service and Innovation.  Mallard has been published in Networkworld, Computerworld, PCWorld and other national magazines and personal and professional blogs.

Mike Miller, Assistant IT Manager,  has been teaching for more than 10 years and has worked in Information Technology in banking and education.   Miller helps to manage the infrastructure at TTC Shelbyville.

Dawn Babain, Network Administrator- LMS Specialist,  began her career in IT in 2001.   Babian’s experience includes working as a Security Analyst in one of the world’s largest financial institutions,  Network Administration in K-12, and teaching Information Technology part-time for more than 11 years.   Dawn is one of the primary developers of the LMS system and is the local representative for the National Center for Women and Information Technology.

Each of the instructors are certified in all of the areas taught and assist with business and industry.   The instructors consult with business and industry advisory committees in order to meet quality standards and skills needed to succeed in Information Technology.  Students work throughout the U.S. and in some foreign countries.

Along with teaching and maintaining the school’s network, the monthly broadcast on Jax-Radio across Middle Tennessee and Northern Alabama radio of “Tech Today”;  features advice on mobile devices, smartphones, home entertainment, computers and technology being used today.    The trio broadcast technology advice monthly and offer technical and career tips to assist the general public, businesses and industry.

Links-

CIT Program

Kingsoft Antivirus 2012 cloud antivirus

Kingsoft Antivius 2012 is in the top 100 of vb100 and they are also a Microsoft VIA member (Virus Information Alliance).  This cloud based software named Cheetah is fast and its slick design takes very little bandwidth when connected to the web.   The easy dial on the main screen allows you to quickly set and see the status of different components.   This software is a supplement to your other antivirus.

The settings menu which is a small arrow in the top right corner allows you to setup Kingsoft Antivirus 2012 and select your level of protection.   With an antivirus such as Microsoft Security Essentials, your computer will be well protected.

Virus Scan can be customized to scan the entire hard drive or just your documents.   You can manually removed suspected files or have the Antivirus remove it for you.

Boundary Defense defends you against infected usb or video files that are infected.

System Defense sets your ‘level’ of monitoring your computer.

Self Protection protects your computer against malicious destruction.

Trusted Files helps you keep your files that may be falsely identified as a virus.

Other Settings

Virus Scan on the menu allows you to select your option on how you want to scan your computer.  This also gives quick links to scan logs, usb drives, your quarantine area and trusted files list.

Scanning

Defense allows you to turn on and off areas with quick switches.   With Boundary and these switches along with your antivirus, Kingsoft allows your computer’s defenses to be doubled.

Anti-Hacker disables services the common user may not use.  Be careful with these settings, this can make your computer’s remote access not accessible.

 

Quick Menu on Toolbar

With Kingsoft being in the top VB100, and working in harmony with your antivirus, this extra defense is fast and reliable.   Settings in Kingsoft can disable services user may not be familiar with so become familiar with the software before using it.   Link to Kingsoft.

Thanks Pat!

College Courses – Free online

Coursera offers online courses that are collegiate level.

Take course in

  • Biology and Life Sciences
  • Business and Management
  • Computer Science: Aritificial Intelligence, Robotics, Vision
  • Computer Science: Programming and Software Engineering
  • Computer Science: Systems, Security, Networking
  • Computer Science: Theory
  • Economics and Finance
  • Education
  • Electrical and Materials Engineering
  • Health and Society and Medical Ethics
  • Humanities and Social Sciences
  • Information, Technology, and Design
  • Mathematics
  • Medicine
  • Physical and Earth Sciences
  • Statistics, Data Analysis, and Scientific Computing

Thanks Kevin!