­

Local Admin Blues

One of the most prevalent security risks we encounter is setting users to be local administrators on their workstations. This is usually set up because some important software application […]

New Ransomware Strain

This week in Security News, a new ransomware called Bad Rabbit has been infecting networks in Russia, Asia, and Europe since yesterday. Some infections in the US have also […]

Serious Wifi Flaw Discovered

A new and serious flaw with wireless networking was announced this morning. We are waiting for companies to provide patches to fix the security risk, and will update the […]

Make a bootable USB flash drive to wipe an old hard drive

Make a bootable USB flash drive to wipe an old hard drive
To use a USB to wipe an old hard drive on a Windows PC:

Download the DBAN *.iso […]

How to take a screenshot on your Mac

How to take a screenshot on your Mac
To take a screenshot of your whole screen:

Press Command (⌘)-Shift-3.

Find the screenshot as a .png file on your desktop.

You can take screenshots […]

Shadow Copy

Shadow Copy
The Shadow Copy feature is often one of the most overlooked tools built into Windows Servers. Utilizing shadow copies allows files to be recovered in real time, without […]

Importance of Keeping your firewall up to date

Importance of Keeping your firewall up to date
Keeping your firewall up to date is the easiest way to protect your network and data. Aging firewalls present a security risk […]

Easy external-monitor or projector setup for laptops

Easy external-monitor or projector setup for laptops
If you’re running Windows 7, 8, or 8.1 on a laptop, use this shortcut: Windows key + P.

Tap it with a monitor or projector […]

Use Windows 7’s Compatibility mode to run a troublesome older app

Use Windows 7’s Compatibility mode to run a troublesome older app
To activate Compatibility mode, right-click on the affected program’s icon, then click on the Properties item in the menu that pops […]

Clutter vs Junk mail

Clutter vs Junk mail – Office 365
With Office 365, users have been presented with a new feature called Clutter. What is Clutter, and why is it different than the […]