Tuesday, March 11, 2025

HIPAA-Compliant Cloud Storage


If you're looking for HIPAA/HITECH-compliant cloud storage, you'll need a provider that offers encryption, access controls, audit logs, and a Business Associate Agreement (BAA) to ensure compliance with HIPAA regulations. Here are some of the best options!

Monday, February 17, 2025

Convert Existing Windows Installation from MBR/CSM to GPT/UEFI!

Convert an existing Windows 10 Installation from Legacy BIOS to UEFI

One of the critical system requirements for Windows 11 is having a GPT partition scheme for installation, which must be based on UEFI. This article explains how to convert existing Windows 10 Installation from the Legacy MBR partition scheme to the more modern GPT UEFI partition scheme, using Microsoft's MBR2GPT.exe tool; all without losing any data or settings!

Wednesday, February 5, 2025

Free Technical Certifications

There are several free technical certifications available that can help build IT skills boost your resume and to start you on a path towards a career in IT. While some certifications are entirely free, others may require a small testing fee. Here are some of the best options:

Monday, December 23, 2024

Improvised Diagnostics using the "OODA Loop"

Improvised Diagnostics: The "OODA Loop"

The OODA loop is a decision-making model that helps people respond to crises and make better decisions

Thursday, December 19, 2024

Lenovo M720Q Slim PC: Testing the Limits of a Mini Gaming PC

Lenovo M720Q Slim PC: Testing the Limits of a Mini Gaming PC

Mini PCs have become increasingly popular for their compact design and versatility, but how well can they perform when pushed to the edge? I recently set out to test the Lenovo M720Q Slim PC—an affordable and compact system rumored to be a surprisingly capable mini gaming PC. Here’s the journey of my testing, modifications, and results.

Thursday, December 12, 2024

Power Draw Tester & Injector - GPUs & Electronics; Diagnostics & Testing, etc.

"Homebrew" Power Tester/Injector - Electronics Diagnostic Tool!!


I built this device to allow me to measure the power being drawn by a device (meter on the right). If a device is working, it'll pull a certain amperage and voltage when power is applied.
But it can also inject power (meter/device on the left) to force very low amperage into a device, so I can check that device's board with a thermal camera for shorts.

Monday, October 14, 2024

Your Online Account(s) Got Hacked & You Are Locked Out: What Do You Do!?


Online security is becoming increasingly critical as more of our daily lives move onto the internet. If you believe one or more of your online accounts have been hacked or compromised, it’s essential to act swiftly. If you are locked out of an account, the situation becomes even more urgent. Below are detailed steps you can take to mitigate damage, regain control, and enhance the security of your other online accounts.

Sunday, September 15, 2024

Mac Self-Service System Configuration: How-To

Apple Self-Service
System Configuration: How-To

System Configuration may be required at the end of your repair. System Configuration is a postrepair software tool that completes the repair for genuine Apple parts. System Configuration has a number of purposes that vary based on the part replaced. Refer to the Introduction section of the model you’re repairing for a complete list of details.

Before initiating System Configuration, ensure that the Mac is running the latest version of macOS. You’ll have one attempt to complete System Configuration. If the attempt is interrupted, canceled, or encounters an error, the Mac will display a message instructing you to contact the Self-Service Repair Store team for assistance.

Monday, August 26, 2024

Understanding Phishing and Social Engineering Attacks: A Deep Dive Into Modern Scams

Understanding Phishing and Social Engineering Attacks: A Deep Dive Into Modern Scams

Phishing and social engineering attacks have become increasingly sophisticated, targeting individuals and organizations intending to deceive and exploit. One of the most prevalent forms of social engineering is the fake tech support scam, where attackers pose as legitimate technical support representatives to gain access to personal information, financial details, or direct control of the victim’s computer. However, there are many other ways a scammer can convince someone into believing and going along with a targeted Scam. In this article, we’ll explore how these scams operate, their common tactics, and how you can protect yourself and others from falling victim.

Friday, August 9, 2024

Set your Windows PC Network Profile to Private and Make Sure File and Print Sharing is On

Ensure Your Windows PC's Network is Set to Private and File & Printer Sharing Settings Are Correct!

1. Check and Set Your Network Profile to Private

  • Open Settings:

    • Press Windows + I to open the Settings app.
  • Go to Network & Internet:
    • In the left-hand menu, click on "Network & Internet."
  • Choose Your Network:
    • Click on "Properties" next to your current network connection (e.g., Wi-Fi or Ethernet).
  • Set Network Profile to Private:
    • Under "Network profile type," select "Private."
    • This setting makes your PC discoverable on the network, which is necessary for File and Printer Sharing.