Recently, I was asked a question “How can I tell if someone has placed spyware in my computer to track my stuff or remote control to see what I’m doing?”. It’s natural to fear the worst when complicated systems might have been left in the hands of those who might be somewhat untrustworthy. In this article, I’ll try to go over some of the ways you can tell if these things might be happening, and how to prevent some of them from occurring altogether.
So, it should come as no surprise that I’m quite interested in what can be done to combat threats on a Windows computer with tools you already have. Today I’m going to look at three tools you’ll find on most any Windows flavour out there: Windows XP, Windows Vista, and Windows 7. Namely, wmic and taskkill. This is going to be more of a beginning overview of how you might use these tools to identify and stop a rogue application on your computer
When you’re in this business of fixing and maintaining technology – one of the most common questions you’ll be asked is “What do I look for in a new computer?”. While I’m usually obliged to ask for more about the prospective computer in question – sometimes the brand names come up and sometimes it’s just a general question because the customer wants to buy a new one. Coming to me (the IT Guy) is a good step and a worthwhile use of time, but without me, what kind of stuff can you do to find the computer that’s best for you?
You want to explain what’s happening, but you’re no technology expert, right? Well, I want to let you in on a very important little secret. How you describe your issue and the questions you ask are essential to correcting your issues. Here, let me show you how to master this very important skill.
Apparently, the most common way to destroy a phone is by dropping it into a toilet (though, you want to take “studies” with a grain of salt). If you’re a heavy mobile phone user, at some point you’ll drop your phone or device into some liquid substance at some point. I had the same thing happen to my laptop, and I wanted to share how I managed to return the laptop to a working state.
While these practices all work, this industry is begging for consistency and there are recommendations as to the proper use of IP addressing to simplify your network management. Have you ever wondered why a network’s hosts might be numbered 10.x.x.x or 192.168.0.x?
One familiar refrain amongst all Canadian Internet users when talking about service levels is “There’s nothing we can do”. We’re resigned to bad connections, routing devices that appear untested, over-priced services, phone systems that are truly hellish, and big companies that operate as if they were monopolies. In fact, you don’t have to go far to find horror stories. If you even look at the history of my blog, you’ll see that I write much more about negative topics than positive. The challenge, I find, is surfacing the good stories, so they can also compete for attention just as much. This is a story about Teksavvy.
Today, I thought it might be interesting to show you something I sent to a young fellow who is interested in the technology field. I had sit down with him to discuss what I do, and some of the things he might look into and he emailed me a few days later. What follows is my advice to him.
When Dave Winer released a new tool, Little Outliner, I wanted to take my time to understand what it was, how easy I might learn to use it, what others might think of it and generally let the idea sink in. It’s important to let these things sink in when taking a look.