Technology Made Simple
Wednesday October 18th 2017

Insider

Archives

‘Network Administration’ Archives

Q&A Monday: Security Question Safety?

Q&A Monday:  Security Question Safety?

Question: With all the talk about making a password secure, I noticed that someone with enough knowledge of me would be able to reset my password using the security questions. These questions are similar across almost every site that I visit and a friend or determined enough hacker could easily guess the answers, any idea on a way to help keep [...]

Q&A Monday: How DHCP Works

Q&A Monday: How DHCP Works

Question: Please don't laugh at me, but I've wondered how my computer gets an IP address from my router? Renee Newcomb Ferndale, WA Answer: I love questions like these, every computer, tablet, phone or laptop gets an IP address when connected to the internet, but rarely do we think of the process that takes place. So to go over the [...]

Q&A Monday: Data Center Teirs

Q&A Monday:  Data Center Teirs

Question: I am a small business owner looking to go with a cloud provider for our IT services.  Each of the vendors mentions their data center level, and I've tried doing research to figure out what these levels mean, but I can't find anything describing them in plain English, can you help? Vickie Downs Watertown, [...]

Q&A Monday: requested session access is denied

Q&A Monday:  requested session access is denied

Question: I have a user who is trying to connect to a RDS host (2008 R2 ), They are getting the error message "requested session access is denied". I checked and made sure the user is member of the local remote desktop user group and they have the permission "Allow logon via Remote desktop services" is granted.  What am I [...]

Q&A Monday: How to create a Windows Defender right click context menu

Q&A Monday: How to create a Windows Defender right click context menu

Question: How can I make a right click option to scan a file with windows defender? David A. Morrison Bellerose, NY Answers: Just as a reminder, that Windows Defender in Windows 8 is always running, but if you still wanted to scan individual files you can do it with the steps below: Press the Windows key to access the Start screen, type [...]

Simple Tips to a Secure Password

Simple Tips to a Secure Password

For many of us out there creating a secure password isn't always easy, it's hard to memorize one of those complex passwords (i.e. @<6v')T[~5).   I want to give you some good tips (and things to avoid) in order to make your password more secure.  The most common thing people do, and I was once guilty of that myself, is make the password for [...]

How to elevate RSAT shortcuts

How to elevate RSAT shortcuts

Companies out there, should not have their IT staff account with Administrator access for everyday work.  Yet IT staff generally will complain (I'm guilty of it) when they need do some administrative work.  Now to make an administrators work easier (while following best practices) you give the IT staff user accounts and use another account to [...]

Q&A Monday: 64 bit Print Driver on 32 Bit System

Q&A Monday:  64 bit Print Driver on 32 Bit System

Question: I'm trying to add a 64 bit driver, for our existing 32bit printer shares on our Windows 2008 Server.  When I try to add 64 bit drivers for the printer, I browse out to the 64 bit driver, and I get a prompts stating: "the specified location does not contain the driver for the requested processor architecture".  Another coworker tried [...]

Q&A Monday: LZMA File

Q&A Monday:  LZMA File

Question: I received a file from a coworker that has a LZMA file type with a large sum of data, and I don't know how to open it.  Please help! Kevin Knight South Dakota  Answer: LZMA is a compressed file, something like the ZIP compression that most of us are generally familiar with. It's used as a way to group files together and [...]

Importance of Security Awareness

Importance of Security Awareness

Whether you know it or not, companies spends millions of dollars trying to make their network safe from hackers.  Billions of dollars and a lot of lost time are the cost that companies have to share when their systems are breached.  The problem becomes that most companies only address half of the solution, you can pour all the money you have [...]

 Page 1 of 13  1  2  3  4  5 » ...  Last »