- Note: Products that are reviewed (hardware or software) are personally owned or freeware that appear in this blog.
Top 50 Higher-Ed Blogs 2016
Hits | SV (NI)
- 2,657,123 visits
Steve’s FavoritesMicrosoft Answers -
Ask Questions-Get Answers
ARS Technica' Blog
Bill Mullins' Blog
Brickhouse Labs is committed to learning, teaching and deploying all things technology. Coolest Gadgets
What's On My PC
Security Blogs The Hacker News Naked Security Threat Post Krebs on Security Tao Security Uncommon Sense Security Dark Reading
Category Archives: Linux
Image Source Over the next several months we plan on interviewing technical experts and leaders across the globe to find out how they got started in the technology industry, what their favorite operating systems are, information security trends and more. This … Continue reading
This post is for educational purposes and any use of these tools against a network without explicit permission could be illegal. Metasploit is designed to identify weaknesses in networks and hardware/software on a network. Do NOT use metasploit for … Continue reading
Your Location has been Shared 5,398 Times in Last 14 Days.
The Seagate GoFlex Home is a NAS for consumers. We did a review some time ago on this product and gave it a good review. Here’s a way to gain root access and perform drive maintenance on the drive. Download Putty … Continue reading
One of the best sites on the web is GeGeek. GeGeek has over 300 tools (freeware) that you can download for troubleshooting any computer. How can it possibly get more powerful? Use Rufus USB to create a bootable ISO … Continue reading
When you are networking computers, wireless access points, printers and other nodes in multiple rooms, try to avoid daisy-chaining switches or using small 4-8 port switches when you are in a hurry. Replace any hubs on your network as soon … Continue reading
Over-provisioning is the allocating of a specific amount of free space on your SSD. Over-provisioning improves SSD endurance and performance. Many SSDs are packaged with software that helps the end user install the drive and to plan for OP. … Continue reading
Want to extend your network and make it more reliable and robust? Note: IP addresses and MAC addresses in this demo are in a controlled lab environment Here’s what you will need – Two routers with the same firmware Preferably … Continue reading
How can you tie your cloud storage services together? It’s actually easy if you use MultCloud. MultCloud ties together all of the most popular cloud storage services so you can upload files to multiple sites through a single … Continue reading
Want to see who is on your wireless? SoftPerfect’s WiFi Guard is freeware that scans your network, both wireless and wired and it also inventories connections on your network. Before setting up WiFi Guard, inventory your computers, printers, routers, TVs … Continue reading
I discovered GE Geek through Rick at What’s On My PC. GE Geek is a resource like no other. The time and dedication to linking and uploading the thousands of resources at GE Geek is commendable. The best feature by far … Continue reading
Several years ago we introduced you to CloudU. A perfect introduction to how the ‘cloud’ works. CloudU by RackSpace now has a MOOC (Mass Open Online Course) that introduces you to Big Data. According to Wikipedia, Big Data is a … Continue reading
If you have flashed your router with DD-WRT or Tomato you can probably use the following linux commands in the picture below. Before you get started, you’ll need to enable Telnet client on your Windows computer. Go to Programs and Features under … Continue reading
Take a look at 10 of the more popular desktop Linux distributions through the lens of the novitiate’s experience The 10 best desktop Linux distros for newbies.
What if you want an IDS system that monitors malicious activities and provides you with logs (Network Security Monitoring) and graphs to help protect your network? And what if you want an easy setup that provides you with information that … Continue reading
Outdated software contains security flaws which cybercriminals can use as avenues to infiltrate the corporate network. The dangers of using outdated software.
Home users that ONLY check email and use very few other programs may consider replacing their OS. Linux has made an exceptional gain over the past several years with a Programs (Add/Remove) component and with hardware drivers. To see … Continue reading
100% credit goes to Bill Mullins for sharing this information. (BillMullins.wordpress.com). Softperfect has some of the best freeware for Windows. With Netscan you can see devices on your network and find information about the devices. Now with their software … Continue reading
So what happens when you install a firewall and make sure all operating systems on your home network are fresh installs? You’ll probably see hits from foreign and U.S. IP addresses trying to make connections to your computers, phones … Continue reading
ITX-motherboards can often be found in older computers from garage sales or thrift stores. What is the practical use for these motherboards or older computers? Here’s a small project that involves protecting your home. After finding an ITX motherboard and … Continue reading