- Note: Products that are reviewed (hardware or software) are personally owned or freeware that appear in this blog.
Top 50 Higher-Ed Blogs 2016
Hits | SV (NI)
- 2,786,906 visits
Steve’s FavoritesMicrosoft Answers -
Ask Questions-Get Answers
ARS Technica' Blog
Bill Mullins' Blog
Brickhouse Labs is committed to learning, teaching and deploying all things technology. Coolest Gadgets
What's On My PC
Security Blogs The Hacker News Naked Security Threat Post Krebs on Security Tao Security Uncommon Sense Security Dark Reading
The Windows Club
Category Archives: Software
How can you tie your cloud storage services together? It’s actually easy if you use MultCloud. MultCloud ties together all of the most popular cloud storage services so you can upload files to multiple sites through a single … Continue reading
Want to see who is on your wireless? SoftPerfect’s WiFi Guard is freeware that scans your network, both wireless and wired and it also inventories connections on your network. Before setting up WiFi Guard, inventory your computers, printers, routers, TVs … Continue reading
I discovered GE Geek through Rick at What’s On My PC. GE Geek is a resource like no other. The time and dedication to linking and uploading the thousands of resources at GE Geek is commendable. The best feature by far … Continue reading
Need a step by step tutorial on Sysprep, ImageX or other Windows’ deployment methods? Me, Myself and IT has excellent step by step tutorials on these different methods. Getting started using Windows Deployment Create a Windows PE USB (Includes … Continue reading
Have mobile devices, servers and need to monitor these devices remotely? OPSWAT Gears allows you to monitor your computers remotely – update antivirus software, discover compromised devices, manage threats and more.
If you are a beginner or an expert, MySQL Workbench is a must have if you have installed MySQL. The community edition allows you to Start/Stop your MySQL instance, write queries, monitor performance and has dozens of other features. With … Continue reading
If you have flashed your router with DD-WRT or Tomato you can probably use the following linux commands in the picture below. Before you get started, you’ll need to enable Telnet client on your Windows computer. Go to Programs and Features under … Continue reading
Windows 7 SP1 is a necessary critical update that should be applied when reinstalling or updating Windows. You may run into errors when applying this service pack. During the update, the update may stall or revert changes. What should you do? … Continue reading
Technet has a list of 77 Windows tips, don’t close the tips out too soon, you’ll find things you may not know how to do. Although most of these are old if you have discovered Windows 7, many people … Continue reading
The Microsoft Update may show that your computer is up-to-date but you may be able to improve system stability and performance with these 90 updates for Windows 7 and Server 2008 with a hotfix that was released earlier in 2013. … Continue reading
You can use these command line tools to take a quick short-cut to your reliability monitor and other performance tools. perfmon /rel Lets you review your computer’s reliability and problem history. perfmon /report Collects performance data for 60 seconds … Continue reading
Dawn and I faced a MySQL Upgrade for our Moodle LMS site and delayed as long as we could. Unlike traditional upgrades of Microsoft SQL, we couldn’t simply click a setup file and the upgrade would replace files and … Continue reading
Want to find information about a website or find information on an IP address you found in your security logs? Use Chrome’s add on IP Address and Domain information to find information you need to track or block an IP address. … Continue reading
What if you want an IDS system that monitors malicious activities and provides you with logs (Network Security Monitoring) and graphs to help protect your network? And what if you want an easy setup that provides you with information that … Continue reading
Outdated software contains security flaws which cybercriminals can use as avenues to infiltrate the corporate network. The dangers of using outdated software.
Home users that ONLY check email and use very few other programs may consider replacing their OS. Linux has made an exceptional gain over the past several years with a Programs (Add/Remove) component and with hardware drivers. To see … Continue reading
When you hear about Snort, the De facto of Intrusion Detection Systems, you think of Linux. Snort offers a Windows setup and signatures that can be used with any operating system. Snort should be a dedicated computer in your network. … Continue reading
100% credit goes to Bill Mullins for sharing this information. (BillMullins.wordpress.com). Softperfect has some of the best freeware for Windows. With Netscan you can see devices on your network and find information about the devices. Now with their software … Continue reading
Installation problems with Office 2013? Check out the Microsoft Office Configuration Analyzer Tool. This tool can be used to help you analyze problems with your installation. Download it here from Microsoft.
CrowdInspect by CrowdStrike uses resources such as WOT, VirusTotal and Team Cymru’s Malware to check a running process. This allows you to see if the process may be malicious or not. The DNS information about any connections is also … Continue reading