Direct MP3 Download: The Computer Repair Podcast #328 – Knowledge vs. On The Job Training
Learn How To Run Your Computer Repair Business
Hosted by: Jeff Halash from TechNut Computer Repair
John Dubinsky from Maven Group
Paco Lebron from ProdigyTeks
Computer Repair Podcast #328 Video
Live Show and Chat every Sunday at 4pm EST
You Can ask a question By:
Emailing: Podnutz@Podnutz.com
You Can Support This Show
Go To Patreon.com/ComputerRepairPodcast
Why not. You would be crazy not to!
Topics: How do you know when to go into Business?
2019 ANNUAL – TECHCON UNPLUGGED
This event will bring together like-minded individuals with the goal to improve their IT Business. Ticket includes all meals, access to workshops with community invested vendors and social.
Sept 20th-22nd 2019
Grand Rapids MI
Show Sponsors:
BusyBench
The all in one management tool, Simplifying IT for Computer Repair Businesses with a clean and simple interface. Spend more time running your business instead of learning your management software.
For a free 14 day trial, just go to BusyBench.com use the offer code Podnutz for 30% off the life of your account
Untangle Next-Generation Firewall
The best solution for bringing powerful network security to your clients in an easy-to-manage and cost-effective package. Untangle’s partnership program helps repair shops add cybersecurity to their services and get up and running quickly.
Get started today at untangle.com/podnutz
God Bless Eric Arduini and his family.
Rest In Peace Eric. Keep up the good fight.
Arduini loses battle with cancer: Services set for popular city clerk
Links:
Free Forms to help you in your I.T. Business
John Tips
Reg Converter is a portable freeware utility to convert .reg data to .bat, .vbs, or .au3. This is particularly useful for files which need administrator privileges in order to be merged into the registry , or for unattended installations.
This website shows you detailed information about any proxy servers on your internet connection.
Second Factor – Doh?
NinjaRMM Partner Used To Seed Ransomware – Lack of 2FA –
Where is Geolocation of an IP Address?
LENOVO: THE FALLOUT: A REAL-WORLD CYBERSECURITY STORY
‘The Fallout: A Real-World Cybersecurity Story’ features actor and tech investor Olivia Munn, who takes viewers through a behind-the-scenes look into the Sony Pictures hack of 2014 by the group Guardians of Peace, which led to leaked emails and created havoc in the entertainment industry. It was also a huge wake-up call to businesses and brands everywhere.
A good one to possibly share with customers…. Do not let this be your business.
Tool is used to identify and troubleshoot SMTP server problems by trying to send message to SMTP server and display all trial log in the log window.
List of computing and IT abbreviations
Bonus Tips:
View RAW Images in Windows 10 With Microsoft’s New Plugin
Microsoft just released a free RAW Image extension for Windows 10 that makes viewing RAW files much easier in Windows’ File Explorer
Caution: Misuse of security tools can turn against you
In a security context, this is a word of caution about making sure the tools we use to keep our information private don’t actually cause the data leaks themselves. In this article, I will be talking about some cases that I have come across in which security tools have leaked data they were intended to secure.
Music By Jim Holley