- Note: Products that are reviewed (hardware or software) are personally owned or freeware that appear in this blog.
Top 50 Higher-Ed Blogs 2016
Hits | SV (NI)
- 2,657,952 visits
Steve’s FavoritesMicrosoft Answers -
Ask Questions-Get Answers
ARS Technica' Blog
Bill Mullins' Blog
Brickhouse Labs is committed to learning, teaching and deploying all things technology. Coolest Gadgets
What's On My PC
Security Blogs The Hacker News Naked Security Threat Post Krebs on Security Tao Security Uncommon Sense Security Dark Reading
Category Archives: Apple
Need information about anything technical? Here’s a site ran by Rick over at What’s On My PC. The site BookMark4Techs is the largest resource for Technical Blogs.
This post is for educational purposes and any use of these tools against a network without explicit permission could be illegal. Metasploit is designed to identify weaknesses in networks and hardware/software on a network. Do NOT use metasploit for … Continue reading
Own an Apple/Mac? You can speed your computer up and keep it clean by using CCleaner and Malwarebytes. You can also download OnyX (See a review of OnyX) to take care of additional tasks and cleaning. https://www.piriform.com/ccleaner/download?mac https://www.malwarebytes.org/antimalware/mac/index.html
Need an excellent program to estimate your wireless bridges from building to building? AlphiMAX provides an excellent online program to estimate your wireless links. Sign up is easy and fast. The PTP Estimator requires that you have the Latitude and … Continue reading
Your Location has been Shared 5,398 Times in Last 14 Days.
Google Earth Pro is now free. Get your license here. Download Pro here. Although the link says free trial, it is now free. You can now capture videos, measure distances including areas, print up to 4800 x 3200, import addresses and … Continue reading
One of the best sites on the web is GeGeek. GeGeek has over 300 tools (freeware) that you can download for troubleshooting any computer. How can it possibly get more powerful? Use Rufus USB to create a bootable ISO … Continue reading
When you are networking computers, wireless access points, printers and other nodes in multiple rooms, try to avoid daisy-chaining switches or using small 4-8 port switches when you are in a hurry. Replace any hubs on your network as soon … Continue reading
Over-provisioning is the allocating of a specific amount of free space on your SSD. Over-provisioning improves SSD endurance and performance. Many SSDs are packaged with software that helps the end user install the drive and to plan for OP. … Continue reading
Want to extend your network and make it more reliable and robust? Note: IP addresses and MAC addresses in this demo are in a controlled lab environment Here’s what you will need – Two routers with the same firmware Preferably … Continue reading
How can you tie your cloud storage services together? It’s actually easy if you use MultCloud. MultCloud ties together all of the most popular cloud storage services so you can upload files to multiple sites through a single … Continue reading
Want to see who is on your wireless? SoftPerfect’s WiFi Guard is freeware that scans your network, both wireless and wired and it also inventories connections on your network. Before setting up WiFi Guard, inventory your computers, printers, routers, TVs … Continue reading
I discovered GE Geek through Rick at What’s On My PC. GE Geek is a resource like no other. The time and dedication to linking and uploading the thousands of resources at GE Geek is commendable. The best feature by far … Continue reading
Several years ago we introduced you to CloudU. A perfect introduction to how the ‘cloud’ works. CloudU by RackSpace now has a MOOC (Mass Open Online Course) that introduces you to Big Data. According to Wikipedia, Big Data is a … Continue reading
Many people who set up their wireless routers never optimize the channel to keep from ‘bumping’ into their neighbors. Regardless if you are a Apple, Linux or Windows user, you should select a channel as far away from your neighbors … Continue reading
Outdated software contains security flaws which cybercriminals can use as avenues to infiltrate the corporate network. The dangers of using outdated software.
100% credit goes to Bill Mullins for sharing this information. (BillMullins.wordpress.com). Softperfect has some of the best freeware for Windows. With Netscan you can see devices on your network and find information about the devices. Now with their software … Continue reading
So what happens when you install a firewall and make sure all operating systems on your home network are fresh installs? You’ll probably see hits from foreign and U.S. IP addresses trying to make connections to your computers, phones … Continue reading
ITX-motherboards can often be found in older computers from garage sales or thrift stores. What is the practical use for these motherboards or older computers? Here’s a small project that involves protecting your home. After finding an ITX motherboard and … Continue reading
According to the study, the most sought-after quality is a broad knowledge of security — more of a strategic understanding than technical know-how — followed by certifications. Read More Opinion – While certifications are an important part of IT, the … Continue reading