INFORMATION TECHNOLOGY ARTICLES
If you’re like most Windows users, you have lots of great little utilities that run when you start Windows. While this works great for most apps, there are some that would be nice to start even before a user logs in to the PC. To do this, you’ll need to run the app as a Windows service.
Reinstalling Windows is a good way to fix serious problems with your computer, or just to get a fresh slate. But before you reinstall Windows, you should make a list of programs you currently have installed on your PC so you know what you want to reinstall on the new system.
You run a respectable website that your users can trust. Right? You might want to double check that. If your site is running on Microsoft Internet Information Services (IIS), you might be in for a surprise. When your users try to connect to your server over a secure connection (SSL/TLS) you may not be providing them a safe option.
Digitally signed drivers include an electronic fingerprint that indicates which company the driver was produced by as well as an indication as to whether the driver has been modified since the company released it. This increases security, as a signed driver that has been modified will no longer have an intact signature. Drivers are signed using code signing certificates.
When you need a data set for testing or demonstration, and that set needs to represent Personally Identifiable Information (PII), you generally don’t want to use real data that represents actual people. Here, we’ll walk you through how you can use PowerShell to generate a list of random names and phone numbers for just such an occasion.
We currently enjoy many wonderful bits of technology such as the internet, mobile phones, radar, and more, but how much of it was ‘predicted’ ahead of its time by science fiction authors? You just might be surprised! PBS Digital Studios looks at the predictions that came to pass, and which author was the most accurate of all.
The rsync protocol can be pretty simple to use for ordinary backup/synchronization jobs, but some of its more advanced features may surprise you. In this article, we’re going to show how even the biggest data hoarders and backup enthusiasts can wield rsync as a single solution for all of their data redundancy needs.
Iptables is an extremely flexible firewall utility built for Linux operating systems. Whether you’re a novice Linux geek or a system administrator, there’s probably some way that iptables can be a great use to you. Read on as we show you how to configure the most versatile Linux firewall.
We’ve previously written about hosting your own FTP server, but data is transferred in cleartext, making it unsuitable for confidential file transfers. In this guide we’ll go over the secure version of FTP – SFTP, and why it makes for an excellent way of transferring files to other people across the internet.
By default, Hyper-V tries to figure out which Virtual Machines were powered on at the time that your PC had its power cut. It uses this list to automatically turn Virtual Machines back on when your PC powers on. Here is how to change what gets switched back on.