Sh*t Customers Say (Part 2)

By StealthNo Comments

Here’s part 2 of “Sh*t Customers Say”
Continue reading this entry »

Uncategorized

Sh*t Customers Say (Part 1)

By StealthNo Comments

Because I work with many end users who don’t know what they’re doing, I have decided to create a compilation of the stupid things customers ask us and things they say to us. This is part one of what I hope to be many more as the IQ of customers goes down while technology gets simpler.

Continue reading this entry »

Uncategorized

Inside My Camera Bag

By StealthNo Comments

Photography is my #1 favorite thing to do when I’m not working or learning new things. The past few years have been full of random expeditions, adventures, and exploring the world around me. Since getting my first DSLR camera in 2007, I have made many observations. The observation I feel that is most notable is many photographers carry either too much or too little gear with them for whatever occasion. I think I have gotten what I need when I’m out down to the right amount of gear without giving me too much or too little when I’m away from home base.

Continue reading this entry »

Photography

Updating iTunes without Restarting Windows

By Stealth6 Comments

Needing to upgrade software is an inconvenience as it is when it needs to be done, even more so when you need to restart your computer after installing the update. I always run into this same issue with iTunes and updating my iPhone. iTunes always wants the latest version, and I don’t want to wait for it to download, install, then save all my work, restart, reopen everything, and continue working.

Continue reading this entry »

Software

Creating a Lightweight Server with CentOS

By StealthNo Comments

When using Linux, staying current with the times is hard to do without your own Linux system to work with. It is also very difficult to learn Linux without actually running Linux. When it comes to installing Linux there are many tutorials and lots of different methods of doing so, all claimed to be the “right way.” In this blog I’ll go over the way I install Linux. I do not believe there is a “right way” or “wrong way,” as long as the resulting system functions as required.

Continue reading this entry »

Operating Systems, Programming

Making a TrueCrypt System Discrete

By StealthNo Comments

In a previous blog I taught you how to install TrueCrypt on your computer and use it to encrypt your hard drive. In this blog I will teach you how to now hide the fact that you have TrueCrypt installed and take your computer’s security to the next level.

Continue reading this entry »

Security

Building a Low-Power Computer

By Stealth1 Comment

When it comes to your power bill, less power used by computers and equipment means more saving on the power bill every month. I’ll explain in this post how I built a couple personal servers that not only take much less power, but are 100% silent as a bonus feature — WITHOUT sacrificing performance.

Continue reading this entry »

Hardware

Protecting Your Computer with Encryption

By StealthNo Comments

These days data security is a necessity, and it’s clear that without security on your computer that you might be asking for a little more than you bargained for if your computer falls into the wrong hands. For many people, simply using a Windows password to log in is not enough. Likewise, this also isn’t enough to stop anyone with a little bit of computer know-how from accessing your data.

Continue reading this entry »

Operating Systems, Security

Installing Linux Mint as OEM

By Stealth7 Comments

From a business perspective I often install Linux on computers for my customers. Sometimes because they cannot afford the high price of Windows, sometimes they just need a computer that will get them by for now. I most usually use Linux Mint since it is very user-friendly and provides my end users with a simple and very usable desktop. Linux Mint also requires very little post-installation configuration so I don’t need to spend too much time getting their system running.

Continue reading this entry »

Operating Systems

Simply Subnetting

By StealthNo Comments

Years ago in college I learned a very simple way to calculate subnets. I had since forgotten this method, but have recently been re-acquainted with it. This method uses the binary representation of the subnet mask to determine the number of hosts per subnet, in turn giving you the number of possible networks and host ranges.

Continue reading this entry »

The Internets
Blue Taste Theme created by Jabox