Archives
As of today July 1, 2014, Microsoft has increased the Default storage Quota from 25GB to 1TB. Yes TB as in 1000 GB (roughly). This applies to the Users of OneDrive for Business as well as users of Office 365 Pro Plus. It is worth mentioning of course that this is on a per user […]
In terms of securing anything it is important to make sure that all bases are covered; this remains especially true for networks in the business setting and elsewhere. When it comes to “attacks” on networks there are several different aspects that need to be considered; Malware, Viruses, Spyware, and Phishing, all things that […]
As I am writing this post, the countdown at the Windows XP end of support page reads 30 days, 13 hours, 26 minutes, and 48 seconds. What does that mean? It means that in one month, Microsoft will no longer be providing extended support for XP and it is highly recommended that you upgrade. Many think, “I don’t need Microsoft support so it […]
Later this year, Microsoft will likely release Windows 8 as its new operating system for personal computers. When Windows 8 arrives, it will have been 12 years since XP began its run as the most used Microsoft operating system. This run will be coming to an end, as Microsoft will no longer extensively support XP […]
We have already touched on the importance of keeping a backup of your data. What do you do if you need the data that has been backed-up? The process for copying backed-up data to computer system(s) is called restoring . In this post, I will focus on PC and Mac workstation restores and how the restore process works. […]
Malware and viruses are a hindrance to computers, but most infections can be avoided with a combination of good anti-malware/anti-virus software and preventative measures. Here a few preventative measures to aid in maintaining clean and secure computers. Uninstall Old Programs Uninstalling old, unused programs keeps computers clean and reduces the number of attack points on […]
The weather is changing and we will soon have more storms. Storms can produce lightning that may lead to power outages, surges, and other malicious aftermath. Problematic weather can wreak havoc on your computers/devices and we want you to be protected from data loss. One way to protect your business’ data, during poor weather, is […]
I’ve observed an acute increase in website and business hacks stories in recent weeks from sites I follow and even main stream media (MSM) outlets like CNN, FoxNews, etc. Why? Is it truly an insight into the computer security landscape evolving or maybe something simpler like an increased availability of sophisticated exploit tools that low […]
Caution – this post is for computer geeks. All other posts are approved for general consumption. Using robocopy makes many tasks easier with its robust switches and command line options. One thing that is not easily determined and is not readily defined in the help or online is how to use robocopy with file names and […]
Although the iPad craze started in April of 2010, the business world has been looking for a tablet solution for much longer. My personal introduction was over a decade ago when a sales person at the engineering firm I worked for bought a “convertible notebook”. This device allowed him to flip the screen and write […]