Artwork

Contenu fourni par Podnutz.com. Tout le contenu du podcast, y compris les épisodes, les graphiques et les descriptions de podcast, est téléchargé et fourni directement par Podnutz.com ou son partenaire de plateforme de podcast. Si vous pensez que quelqu'un utilise votre œuvre protégée sans votre autorisation, vous pouvez suivre le processus décrit ici https://fr.player.fm/legal.
Player FM - Application Podcast
Mettez-vous hors ligne avec l'application Player FM !

The Computer Repair Podcast #328 – Knowledge vs. On The Job Training

 
Partager
 

Manage episode 239070490 series 2836
Contenu fourni par Podnutz.com. Tout le contenu du podcast, y compris les épisodes, les graphiques et les descriptions de podcast, est téléchargé et fourni directement par Podnutz.com ou son partenaire de plateforme de podcast. Si vous pensez que quelqu'un utilise votre œuvre protégée sans votre autorisation, vous pouvez suivre le processus décrit ici https://fr.player.fm/legal.

Learn How To Run Your Computer Repair Business

Hosted by: Jeff Halash from TechNut Computer Repair

John Dubinsky from Maven Group

Paco Lebron from ProdigyTeks

Computer Repair Podcast #328 Video

Live Show and Chat every Sunday at 4pm EST

You Can ask a question By:

Emailing: Podnutz@Podnutz.com

You Can Support This Show

Go To Patreon.com/ComputerRepairPodcast

Why not. You would be crazy not to!

Topics: How do you know when to go into Business?

2019 ANNUAL – TECHCON UNPLUGGED

This event will bring together like-minded individuals with the goal to improve their IT Business. Ticket includes all meals, access to workshops with community invested vendors and social.

Sept 20th-22nd 2019

Grand Rapids MI

TechCon Unplugged.com

Show Sponsors:

BusyBench

The all in one management tool, Simplifying IT for Computer Repair Businesses with a clean and simple interface. Spend more time running your business instead of learning your management software.

For a free 14 day trial, just go to BusyBench.com use the offer code Podnutz for 30% off the life of your account

Untangle Next-Generation Firewall

The best solution for bringing powerful network security to your clients in an easy-to-manage and cost-effective package. Untangle’s partnership program helps repair shops add cybersecurity to their services and get up and running quickly.

Get started today at untangle.com/podnutz

God Bless Eric Arduini and his family.

Rest In Peace Eric. Keep up the good fight.

Help Eric Arduini and family

Arduini loses battle with cancer: Services set for popular city clerk

Links:

Free Forms to help you in your I.T. Business

John Tips

Reg Converter v1.2

Reg Converter is a portable freeware utility to convert .reg data to .bat, .vbs, or .au3. This is particularly useful for files which need administrator privileges in order to be merged into the registry , or for unattended installations.

Am I Behind A Proxy?

This website shows you detailed information about any proxy servers on your internet connection.

Second Factor – Doh?

NinjaRMM Partner Used To Seed Ransomware – Lack of 2FA –

Why you are doing it wrong

Where is Geolocation of an IP Address?

LENOVO: THE FALLOUT: A REAL-WORLD CYBERSECURITY STORY

‘The Fallout: A Real-World Cybersecurity Story’ features actor and tech investor Olivia Munn, who takes viewers through a behind-the-scenes look into the Sony Pictures hack of 2014 by the group Guardians of Peace, which led to leaked emails and created havoc in the entertainment industry. It was also a huge wake-up call to businesses and brands everywhere.

A good one to possibly share with customers…. Do not let this be your business.

SMTP DIAG

Tool is used to identify and troubleshoot SMTP server problems by trying to send message to SMTP server and display all trial log in the log window.

List of computing and IT abbreviations

Bonus Tips:

View RAW Images in Windows 10 With Microsoft’s New Plugin

Microsoft just released a free RAW Image extension for Windows 10 that makes viewing RAW files much easier in Windows’ File Explorer

Caution: Misuse of security tools can turn against you

In a security context, this is a word of caution about making sure the tools we use to keep our information private don’t actually cause the data leaks themselves. In this article, I will be talking about some cases that I have come across in which security tools have leaked data they were intended to secure.

Music By Jim Holley

  continue reading

139 episodes

Artwork
iconPartager
 
Manage episode 239070490 series 2836
Contenu fourni par Podnutz.com. Tout le contenu du podcast, y compris les épisodes, les graphiques et les descriptions de podcast, est téléchargé et fourni directement par Podnutz.com ou son partenaire de plateforme de podcast. Si vous pensez que quelqu'un utilise votre œuvre protégée sans votre autorisation, vous pouvez suivre le processus décrit ici https://fr.player.fm/legal.

Learn How To Run Your Computer Repair Business

Hosted by: Jeff Halash from TechNut Computer Repair

John Dubinsky from Maven Group

Paco Lebron from ProdigyTeks

Computer Repair Podcast #328 Video

Live Show and Chat every Sunday at 4pm EST

You Can ask a question By:

Emailing: Podnutz@Podnutz.com

You Can Support This Show

Go To Patreon.com/ComputerRepairPodcast

Why not. You would be crazy not to!

Topics: How do you know when to go into Business?

2019 ANNUAL – TECHCON UNPLUGGED

This event will bring together like-minded individuals with the goal to improve their IT Business. Ticket includes all meals, access to workshops with community invested vendors and social.

Sept 20th-22nd 2019

Grand Rapids MI

TechCon Unplugged.com

Show Sponsors:

BusyBench

The all in one management tool, Simplifying IT for Computer Repair Businesses with a clean and simple interface. Spend more time running your business instead of learning your management software.

For a free 14 day trial, just go to BusyBench.com use the offer code Podnutz for 30% off the life of your account

Untangle Next-Generation Firewall

The best solution for bringing powerful network security to your clients in an easy-to-manage and cost-effective package. Untangle’s partnership program helps repair shops add cybersecurity to their services and get up and running quickly.

Get started today at untangle.com/podnutz

God Bless Eric Arduini and his family.

Rest In Peace Eric. Keep up the good fight.

Help Eric Arduini and family

Arduini loses battle with cancer: Services set for popular city clerk

Links:

Free Forms to help you in your I.T. Business

John Tips

Reg Converter v1.2

Reg Converter is a portable freeware utility to convert .reg data to .bat, .vbs, or .au3. This is particularly useful for files which need administrator privileges in order to be merged into the registry , or for unattended installations.

Am I Behind A Proxy?

This website shows you detailed information about any proxy servers on your internet connection.

Second Factor – Doh?

NinjaRMM Partner Used To Seed Ransomware – Lack of 2FA –

Why you are doing it wrong

Where is Geolocation of an IP Address?

LENOVO: THE FALLOUT: A REAL-WORLD CYBERSECURITY STORY

‘The Fallout: A Real-World Cybersecurity Story’ features actor and tech investor Olivia Munn, who takes viewers through a behind-the-scenes look into the Sony Pictures hack of 2014 by the group Guardians of Peace, which led to leaked emails and created havoc in the entertainment industry. It was also a huge wake-up call to businesses and brands everywhere.

A good one to possibly share with customers…. Do not let this be your business.

SMTP DIAG

Tool is used to identify and troubleshoot SMTP server problems by trying to send message to SMTP server and display all trial log in the log window.

List of computing and IT abbreviations

Bonus Tips:

View RAW Images in Windows 10 With Microsoft’s New Plugin

Microsoft just released a free RAW Image extension for Windows 10 that makes viewing RAW files much easier in Windows’ File Explorer

Caution: Misuse of security tools can turn against you

In a security context, this is a word of caution about making sure the tools we use to keep our information private don’t actually cause the data leaks themselves. In this article, I will be talking about some cases that I have come across in which security tools have leaked data they were intended to secure.

Music By Jim Holley

  continue reading

139 episodes

Tous les épisodes

×
 
Loading …

Bienvenue sur Lecteur FM!

Lecteur FM recherche sur Internet des podcasts de haute qualité que vous pourrez apprécier dès maintenant. C'est la meilleure application de podcast et fonctionne sur Android, iPhone et le Web. Inscrivez-vous pour synchroniser les abonnements sur tous les appareils.

 

Guide de référence rapide