Tag: technology

How Does Cable Broadband Work?

How Does Cable Broadband Work?

[seotool] Ars Technica has an easy to understand article revealing how a one-way technology was converted to a bi-directional networking system through the magic of DOCSIS.  This is a must-read for any tech supporting SOHO or SMB networks using cable. Visit Stanbridge College to learn about how you can pursue a career in Information Technology. […]

Read the full article.

You need more than just technology

You need more than just technology

Spear phishing is targeted phishing.  A user receives the standard email containing a link to a fake web site purporting to be legitimate.  The website has input boxes to entice users into voluntarily giving up personal/corporate information and the added bonus of only sending the emails to users of the legitimate web site.  PhishMe, a […]

Read the full article.

No excuses: tips for cleaning screens

No excuses: tips for cleaning screens

Do you keep your screens clean? Or can you write in the dust on your laptop screen? From tablets to smart phones to LCDs and projection screens, we have to set up, manage, and troubleshoot more and more screens at work and in our home. However, screens—especially touch screens—are subject to a lot of grime. […]

Read the full article.

Booting the Unbootable

Booting the Unbootable

Just about everyone has experienced a hard drive failure.  What recovery methods are your old standbys? In an article on TechRepublic, Jack Wallen discusses a few strategies for recovering unbootable hard drives, including booting from a restore disk and using a Linux live CD.  A Linux live CD is definitely something that you should have […]

Read the full article.

Using Personal Network Devices at Work

Using Personal Network Devices at Work

An interesting article in the Wall Street Journal raises many questions about allowing/encouraging employees to use their own personal devices to perform necessary work functions, including security questions about lost phones/laptops, wiping devices if reported stolen (including wiping the employee’s personal information, too), and cost questions for devices used for both personal and work reasons.  […]

Read the full article.

Conan the Destroyer… of hard drives?

Conan the Destroyer… of hard drives?

While we usually dread the loss of access to our data on a drive, occasionally we need to ensure the data is no longer accessible by anyone – which either involves destroying the data or the physical drive itself.  Tech Republic has five tips on removing access to data on a drive that will no […]

Read the full article.

Linux Distribution Spotlight

Linux Distribution Spotlight

Puppy Linux is a mini-distribution, which was designed to be a portable (on a live CD/DVD or flash drive installation) operating system that can be carried from computer to computer, or used in a disaster recovery mode.  When installed to a USB connected flash drive, approximately 100 MB is used to store the operating system […]

Read the full article.

How to Find Trusted Online Health Information

How to Find Trusted Online Health Information

With more and more patients searching for health information on the internet, making sure this information is accurate is essential. According to a recent survey, 81% of Americans search the web for health information. Nurses can play an instrumental role in helping patients recognize reputable health information on the internet. Here are some important questions […]

Read the full article.

10 Cool Information Technology Freeware Tools

10 Cool Information Technology Freeware Tools

When you’re putting together your IT tool belt, your software tools can play just as an important role as your cable crimper and continuity tester. Network World’s Gearhead (Mark Gibbs) posted two articles (here and here) listing his top ten networking and PC optimization tools, many of which are free for personal use.  Of course, […]

Read the full article.

IT Buyer Beware

IT Buyer Beware

Think you’ve got a great deal on a hard drive?  Counterfeit and outright fake hardware is all too common, especially when purchasing from overseas resellers.  You may think you can spot a fake, but now fakes are becoming more and more sophisticated, such as this 500GB hard drive that is actually a perpetually rewriting 128MB […]

Read the full article.