Tuesday, March 1, 2011
Disaster recovery planning is a great idea until someone actually has to do it. There are many reasons and events that will try and sabotage your disaster recovery planning project. Here are 10 keys to developing a successful disaster recovery plan and implementing it successfully.1. Set Expectations for The Disaster Recovery PlanEveryone will agree that your company needs a disaster recovery...
Whether you're a home PC user or a network administrator, you always need a plan for when the unexpected happens to your computers and/or network. A Disaster Recovery Plan (DRP) is essential in helping to ensure that you don't get fired after a server gets fried in a fire, or in the case of the home user, that you don't get kicked out of the house when momma discovers you've just lost years worth...
What is Hacking?
Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. Hacking is the art of exploiting the flaws/loopholes in a software/module. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give...
One of the coolest capabilities enabled by the Internet is that when you’re using it, you’re not bound by geographical location. This is especially handy when you’re shopping. Before the Internet, you were pretty much stuck with the selection and prices in the stores around your home. Now, you can shop anywhere, anytime, and you can be competitive about it.
Of course, there are some risks that...
Whether you're a home PC user or a network administrator, you always need a plan for when the unexpected happens to your computers and/or network. A Disaster Recovery Plan (DRP) is essential in helping to ensure that you don't get fired after a server gets fried in a fire, or in the case of the home user, that you don't get kicked out of the house when momma discovers you've just lost years worth...
Whether you’re shopping the holiday sales, or just looking to avoid the craziness at the mall, shopping safely online can be a challenge, especially if you stray from the larger e-tailers to get a better deal from a lesser known site. Here are 10 tips to help you gain some peace of mind while shopping online.1. Check the seller’s customer satisfaction ratings. Other people’s experiences with the...
Laptops are becoming more common than desktop computers. An increasing number of business and personal travelers bring along their laptops on flights. You should be prepared to remove your laptop from your laptop bag or carrying case to send it through the airport security checkpoint in its own bin. More importantly for travelers though is the need to protect the laptop throughout the trip. The...
One of the problems with passwords is that users forget them. In an effort to not forget them, they use simple things like their dog’s name, their son’s first name and birthdate, the name of the current month- anything that will give them a clue to remember what their password is. For the curious hacker who has somehow gained access to your computer system this is the equivalent of locking your...
Kids are more tech savvy than we can ever hope to be. We block a web site and they find a way around our blocking software. We put up a firewall, they go through it. What's a parent to do? We can never be sure that any of our parental controls will work, but we try our best to keep kids safe. Here are 8 things you can do to make your internet parental controls a little more effective and harder...
Subscribe to:
Posts (Atom)