Google Trends is a tool provided by Google that lets people see topics and subjects that are gaining in popularity online. It gives people the ability to compare multiple topics to see what is more popular as well. Many bloggers use it to get ideas … [Continue reading]
Use TRACERT to Diagnose Network Issues
Windows comes with several commands that help you diagnose network issues. But, one of the more useful commands available to you is the TRACERT command. TRACERT is a command line tool that will show the different hops a packet will take as it reaches … [Continue reading]
How To Use The Google Authenticator App to Protect Your Google Account
In a previous post, I talked about enabling two factor authentication on your Google account. Just to rehash, two-factor authentication adds another layer of protection in your authentication method. You still login using your username and password. … [Continue reading]
Enable Two Factor Authentication for Google Account
Protecting your online accounts is becoming more important. Everyday we hear stories of accounts being hacked and broken into. Many times these accounts can contain sensitive information. Or, they can contain useful bits of information that a hacker … [Continue reading]
Protecting Your Email Account
Email is a crucial application in today's world. It is just as important for personal reasons as it is for business. It is essential in communicating with other people, signing up for events, managing memberships and a host of other reasons. But, … [Continue reading]
How to Turn Off Firewall in Windows 7
There are times where you may want to turn off the firewall in Windows 7, or at least disable it temporarily. This typically is necessary when a program will not work correctly. The firewall should be on your troubleshooting list of things to check … [Continue reading]
How to Turn on Firewall in Windows 7
Keeping your computer secure is important if connected to the Internet. One of the best forms of protection you can implement is a firewall. If you already have a firewall device between you and your modem, then you are in good shape. However, if you … [Continue reading]
Secure Your Connection to the Internet with VPN
With all the news of people being spied on while using the Internet, it is no wonder that more people are looking for ways to secure their online privacy. Problem is that people want a fast way to do this that does not interfere with the speeds they … [Continue reading]
Remove Annoying Malware in 5 Steps
Malware and viruses are a part of the computer landscape these days. Their presence shows no signs of slowing down. There are tools available to find and clean them, but malware still seems to find its way past these barriers at times. Furthermore, … [Continue reading]
Five Tips to Convert Servers to Virtualization
Virtualization has become a popular topic in the business world. It makes sense on so many levels, and, therefore, it has been on the mind of many people in the IT industry. Servers are perhaps the most popular piece of the IT puzzle to virtualize. … [Continue reading]