- Note: Products that are reviewed (hardware or software) are personally owned or freeware that appear in this blog.
Top 50 Higher-Ed Blogs 2016
Hits | SV (NI)
- 2,787,886 visits
Steve’s FavoritesMicrosoft Answers -
Ask Questions-Get Answers
ARS Technica' Blog
Bill Mullins' Blog
Brickhouse Labs is committed to learning, teaching and deploying all things technology. Coolest Gadgets
What's On My PC
Security Blogs The Hacker News Naked Security Threat Post Krebs on Security Tao Security Uncommon Sense Security Dark Reading
The Windows Club
Category Archives: Apple
How do you take a screenshot with a Mac? To capture your screen, use Command-Shift-3 To capture part of a screen, use Command-Shift-4. Use your mouse and drag the cursor over the area you want to capture. The file will … Continue reading
iPhone and Android woes Rootkit found pre-installed on 3 million Android Phones iPhone sends call information to Apple? iPhone Access can be bypassed? Some Android phones sending information to China
If websites are not appearing correctly, connections time out or if you cannot find a computer on a network, you may need to flush the DNS cache. Here’s how to do it- Microsoft Windows – Go to a command prompt … Continue reading
BullGuard has a scanner that quickly scans your public IP address and ‘sees’ if your network has open ports that could pose a threat to you or even the internet. Here’s the link to see if you have something that … Continue reading
Need information about anything technical? Here’s a site ran by Rick over at What’s On My PC. The site BookMark4Techs is the largest resource for Technical Blogs.
This post is for educational purposes and any use of these tools against a network without explicit permission could be illegal. Metasploit is designed to identify weaknesses in networks and hardware/software on a network. Do NOT use metasploit for … Continue reading
Own an Apple/Mac? You can speed your computer up and keep it clean by using CCleaner and Malwarebytes. You can also download OnyX (See a review of OnyX) to take care of additional tasks and cleaning. https://www.piriform.com/ccleaner/download?mac https://www.malwarebytes.org/antimalware/mac/index.html
Need an excellent program to estimate your wireless bridges from building to building? AlphiMAX provides an excellent online program to estimate your wireless links. Sign up is easy and fast. The PTP Estimator requires that you have the Latitude and … Continue reading
Your Location has been Shared 5,398 Times in Last 14 Days.
Google Earth Pro is now free. Get your license here. Download Pro here. Although the link says free trial, it is now free. You can now capture videos, measure distances including areas, print up to 4800 x 3200, import addresses and … Continue reading
One of the best sites on the web is GeGeek. GeGeek has over 300 tools (freeware) that you can download for troubleshooting any computer. How can it possibly get more powerful? Use Rufus USB to create a bootable ISO … Continue reading
When you are networking computers, wireless access points, printers and other nodes in multiple rooms, try to avoid daisy-chaining switches or using small 4-8 port switches when you are in a hurry. Replace any hubs on your network as soon … Continue reading
Over-provisioning is the allocating of a specific amount of free space on your SSD. Over-provisioning improves SSD endurance and performance. Many SSDs are packaged with software that helps the end user install the drive and to plan for OP. … Continue reading
Want to extend your network and make it more reliable and robust? Note: IP addresses and MAC addresses in this demo are in a controlled lab environment Here’s what you will need – Two routers with the same firmware Preferably … Continue reading
How can you tie your cloud storage services together? It’s actually easy if you use MultCloud. MultCloud ties together all of the most popular cloud storage services so you can upload files to multiple sites through a single … Continue reading
Want to see who is on your wireless? SoftPerfect’s WiFi Guard is freeware that scans your network, both wireless and wired and it also inventories connections on your network. Before setting up WiFi Guard, inventory your computers, printers, routers, TVs … Continue reading
I discovered GE Geek through Rick at What’s On My PC. GE Geek is a resource like no other. The time and dedication to linking and uploading the thousands of resources at GE Geek is commendable. The best feature by far … Continue reading
Several years ago we introduced you to CloudU. A perfect introduction to how the ‘cloud’ works. CloudU by RackSpace now has a MOOC (Mass Open Online Course) that introduces you to Big Data. According to Wikipedia, Big Data is a … Continue reading
Many people who set up their wireless routers never optimize the channel to keep from ‘bumping’ into their neighbors. Regardless if you are a Apple, Linux or Windows user, you should select a channel as far away from your neighbors … Continue reading
Outdated software contains security flaws which cybercriminals can use as avenues to infiltrate the corporate network. The dangers of using outdated software.