Microsoft Exchange is without a doubt the 800 pound gorilla when it comes to business email, but the tide is steadily turning. Cloud alternatives like Google Apps and Microsoft’s own Office 365 are
VIEW POSTAs Computer Technicians, occasionally we need to dive into the registry to make some changes such as removing registry keys that a virus or some software left over. Of course, it is always a good idea
VIEW POSTYou are sitting up late at night working to finish up the computers on your bench. You’ve been running around all day, and you are exhausted. How do you create more hours in the day? Through automation!
VIEW POSTUp until very recently I’ve led a double life, so to say. A double life that has spanned just over two and a half years already. No, I wasn’t a secret agent or anything intriguing (relatively
VIEW POSTGuest Post by Micah Lahren: "I’ll just run DBAN on it and that will be good enough." Is that really good enough? What if the individual or business in question is required by law to complete
VIEW POSTGSmartControl is an open source and portable application for identifying, monitoring and testing hard drives. GSmartControl differs from applications like CrystalDiskInfo because GSmartControl monitors
VIEW POSTWhat is a Rootkit? A rootkit is a software program that enables attackers to gain administrator access to a system. On Unix/Linux system, this is called “root” access. Rootkits contain tools and code
VIEW POSTI know I am not alone in the way I manage my computer consulting & repair business FireLogic. Technibble recently surveyed its readers and it was evident that a fair majority of you who happen to run
VIEW POSTAs a fellow small computer business owner, I am always on the prowl for new and exciting ways to market my company that don’t break the bank. Don’t get me wrong: word of mouth referrals are still my
VIEW POST