“High speed” or “broadband” Internet service — two interchangeable terms that describe something (most folks aren’t sure exactly what) that Internet users, persuaded by persistent advertising, have become convinced they need. When it comes to the Internet,...
After setting up and “locking down” a computer for Internet security, one of the last things I do before returning a computer to its owner is make sure that it has connectivity to the Internet Service Provider (ISP) of their choice. Having dealt with many...
I recently had the opportunity to perform some basic computer forensic analysis for some clients who wanted to know if their computers had been used for “illicit” purposes. One client, the owner of a popular hairdressing salon, needed to know if her...
There you are, dumbfounded, staring at the infamous Windows Blue Screen of Death (BSOD). You know the screen: the one with the Microsoft-blue background, and the cryptic message followed by indecipherable strings of numbers and letters. You’re stuck. Your...
All well built modern computer networks, whether in the small home office or gigantic corporation, have at their hearts two essential components: a router to direct network traffic, and a firewall to restrict unwanted contact with the outside world. A router does what...