The hard drive in your PC or laptop holds all of your data and applications. It is kind of like long-term memory for a computer. Just like in the movies, even when you erase that data, remnants are left behind making it often possible to recover the data long after it has been deleted.
Permanent link to this article: https://www.robertborges.us/2012/04/it-security/how-to-securely-dispose-of-your-old-hard-drives/
Easy Steps to Increase your Computer’s Performance
As you may have noticed, even the fastest computers tend to get slower as they age. These performance issues could be because either the hardware is no longer sufficient for the programs now running on it, or because it needs a little maintenance. Here are a few steps you can take to help speed up …
Permanent link to this article: https://www.robertborges.us/2012/04/windows/easy-steps-to-increase-your-computers-performance/
Tech Update 2012 – FREE Event on Wednesday May 2, 2012
IT Pro Tech Update 2012 On Wednesday May 2nd 2012, the IT-Pro User Group is hosting Tech Update 2012 an all day FREE event. Come join us for this FREE event and discover the next phase of Information Technology as we discuss Windows 8 in the business environment, Virtualization, Security, Interoperability, and Systems Management. …
Permanent link to this article: https://www.robertborges.us/2012/04/uncategorized/tech-update-2012-free-event-on-wednesday-may-2-2012/
Is your home Wi-Fi secure?
Answer: Probably not. Most home networks are not secure to begin with. To add wireless A/B/G/N on top of that, you’re really asking for trouble. Fear not, for here are a few things you can do to lock down your environment, and keep out snooping eyes.
Permanent link to this article: https://www.robertborges.us/2012/04/it-security/is-your-home-wi-fi-secure/
Learning Tools & Resources from Microsoft
On many occasions I have had people ask me “Where can I learn about Microsoft’s product X”, or “Is there anywhere I can go to get free training”. Well, here is a list of just a few of the resources Microsoft provides to us all so we can get educated and try out many software …
Permanent link to this article: https://www.robertborges.us/2012/04/learning-resources/learning-tools-resources-from-microsoft-2/
IT Security is Like an Onion – IT Security Basics – Part 3: End-User Security
In Parts 1 and 2 I discussed securing your network perimeter and server environment. But as I said in the beginning, IT security is like an onion. Let’s take a look at the 3rd layer of that onion… securing your end-user environment. Again, this is not meant to be a complete list, but instead a …
Permanent link to this article: https://www.robertborges.us/2012/04/it-security/it-security-is-like-an-onion-it-security-basics-part-3-end-user-security/
IT Security is Like an Onion – IT Security Basics – Part 2: Server Security
In Part 1 I discussed securing your network perimeter. But as I said in the beginning, IT security is like an onion. Let’s take a look at the next layer of that onion… securing your server environment. Again, this is not meant to be a complete list, but instead a starting point to help you …
Permanent link to this article: https://www.robertborges.us/2012/03/it-security/it-security-is-like-an-onion-it-security-basics-part-2-server-security/
IT Security is Like an Onion – IT Security Basics – Part 1: Perimeter Security
In this day and age, every organization should have a good firewall at the perimeter of their network. There are firewalls all over the spectrum and many good options for businesses small and large. For small businesses there are great firewall units designed for the SMB market from companies like Cisco, Sonicwall, and Astaro. For …
Permanent link to this article: https://www.robertborges.us/2012/03/it-security/it-security-is-like-an-onion-it-security-basics-part-1-perimeter-security/
IT Security is Like an Onion: The Basics of IT Security Blog Series
In many ways, IT security is like an onion comprised of many layers. As you work through each layer new layers are revealed. This blog series is not meant to be a complete list, but instead a starting point to help you think through your own IT security strategy. Long gone are the days where …
Permanent link to this article: https://www.robertborges.us/2012/03/it-security/it-security-is-like-an-onion-the-basics-of-it-security-blog-series/
What is FOPE (Forefront Online Protection for Exchange)?
Forefront Online Protection for Exchange (FOPE) is one of the unsung heroes of the Microsoft Exchange world. If you’ve been running Microsoft Exchange for your organization, chances are you’ve heard of Forefront Protection for Exchange. This is a software which sits on servers in the datacenter and monitors all incoming and outgoing email to protect …
Permanent link to this article: https://www.robertborges.us/2012/03/it-security/what-is-fope-forefront-online-protection-for-exchange/
Cloud Computing: Why Go to the Cloud?
What is Cloud Computing? There are many definitions as to what constitutes “Cloud Computing”. Some organizations say that server failover clustering is a requirement. Others say that metered services are required. At its core, cloud computing simply means that these products/services are hosted on the web and you pay for what you use (to varying …
Permanent link to this article: https://www.robertborges.us/2012/03/cloud-computing/cloud-computing-why-go-to-the-cloud/
Consolidation for the mobile worker: How many phones do you carry?
Few can argue that carrying a cell phone is very convenient for both us and the people trying to contact us. For many of us it is an absolute necessity to be reachable for at least part of the day regardless of whether you are in the office, home, or on the soccer field with …
Permanent link to this article: https://www.robertborges.us/2012/03/mobile-computing/consolidation-for-the-mobile-worker-how-many-phones-do-you-carry/
When is a computer too old? The Cloud may be changing how we think about this.
When is a computer too old? This question is getting harder and harder to answer. Traditional PC lifecycle thinking says that a PC is efficient to use up to 4 years old, and no longer cost effective to use beyond 5 years old. This is because the cost of maintaining the system is greater than …
Permanent link to this article: https://www.robertborges.us/2012/02/cloud-computing/when-is-a-computer-too-old-the-cloud-may-be-changing-how-we-think-about-this/
Video: Microsoft’s Updated SkyDrive will be Integrated into Windows 8
Microsoft has announced an update to their popular cloud storage system SkyDrive (part of the Microsoft Live.com family of free cloud services). With this update SkyDrive will essentially be part of the Windows 8 metro style interface. There will also be integration to allow access to your SkyDrive from the Windows Explorer window in Windows …
Permanent link to this article: https://www.robertborges.us/2012/02/cloud-computing/video-microsofts-updated-skydrive-will-be-integrated-into-windows-8/
Closing a Crashed or Hung Application using the Windows Task Manager
Regardless of how much time and money software companies put into writing their programs, we still have application crashes. An application crash is when a program or part of the operating system ceases to function properly. Preventing application crashes is usually difficult since the only way to permanently ensure you never get a crash again …
Permanent link to this article: https://www.robertborges.us/2012/02/windows/windows-7/closing-a-crashed-or-hung-application-with-windows-task-manager/