Podnutz – The Computer Repair Podcast   /     The Computer Repair Podcast #328 – Knowledge vs. On The Job Training

Description

Learn How To Run Your Computer Repair Business Hosted by: Jeff Halash from TechNut Computer Repair John Dubinsky from Maven Group Paco Lebron from ProdigyTeks Computer Repair Podcast #328 Video Live Show and Chat every Sunday at 4pm EST You Can ask a question By: Emailing: Podnutz@Podnutz.com   You Can Support This Show Go To Patreon.com/ComputerRepairPodcast Why […]

Subtitle
Learn How To Run Your Computer Repair Business Hosted by: Jeff Halash from TechNut Computer Repair John Dubinsky from Maven Group Paco Lebron from ProdigyTeks Computer Repair Podcast #328 Video Live Show and Chat every Sunday at 4pm EST You Can ask a
Duration
Publishing date
2019-08-01 08:00
Link
http://feedproxy.google.com/~r/podnutz/~3/b-AQ-UkwzQ8/
Contributors
  Podnutz.com
author  
Enclosures
http://feedproxy.google.com/~r/podnutz/~5/oSUSCeFcZ5c/crp328.mp3
audio/mpeg

Shownotes

Learn How To Run Your Computer Repair Business

Hosted by: Jeff Halash from TechNut Computer Repair

John Dubinsky from Maven Group

Paco Lebron from ProdigyTeks

Computer Repair Podcast #328 Video

Live Show and Chat every Sunday at 4pm EST

You Can ask a question By:

Emailing: Podnutz@Podnutz.com

 

You Can Support This Show

Go To Patreon.com/ComputerRepairPodcast

Why not.  You would be crazy not to!

 

Topics: How do you know when to go into Business?

 

2019 ANNUAL – TECHCON UNPLUGGED

This event will bring together like-minded individuals with the goal to improve their IT Business. Ticket includes all meals, access to workshops with community invested vendors and social.

Sept 20th-22nd 2019

Grand Rapids MI

TechCon Unplugged.com

 

Show Sponsors:

BusyBench

The all in one management tool, Simplifying IT for Computer Repair Businesses with a clean and simple interface. Spend more time running your business instead of learning your management software.  

For a free 14 day trial, just go to BusyBench.com use the offer code Podnutz for 30% off the life of your account

 

Untangle Next-Generation Firewall

The best solution for bringing powerful network security to your clients in an easy-to-manage and cost-effective package. Untangle’s partnership program helps repair shops add cybersecurity to their services and get up and running quickly.

Get started today at untangle.com/podnutz

 

God Bless Eric Arduini and his family.

Rest In Peace Eric.  Keep up the good fight.

Help Eric Arduini and family

Arduini loses battle with cancer: Services set for popular city clerk

 

Links:

Free Forms to help you in your I.T. Business

John Tips

Reg Converter v1.2

Reg Converter is a portable freeware utility to convert .reg data to .bat, .vbs, or .au3. This is particularly useful for files which need administrator privileges in order to be merged into the registry , or for unattended installations.

Am I Behind A Proxy?

This website shows you detailed information about any proxy servers on your internet connection.

Second Factor – Doh?

NinjaRMM Partner Used To Seed Ransomware – Lack of 2FA – 

Why you are doing it wrong

Where is Geolocation of an IP Address?

LENOVO: THE FALLOUT: A REAL-WORLD CYBERSECURITY STORY

 ‘The Fallout: A Real-World Cybersecurity Story’ features actor and tech investor Olivia Munn, who takes viewers through a behind-the-scenes look into the Sony Pictures hack of 2014 by the group Guardians of Peace, which led to leaked emails and created havoc in the entertainment industry. It was also a huge wake-up call to businesses and brands everywhere.

A good one to possibly share with customers….  Do not let this be your business.

SMTP DIAG

Tool is used to identify and troubleshoot SMTP server problems by trying to send message to SMTP server and display all trial log in the log window.

List of computing and IT abbreviations

Bonus Tips:

View RAW Images in Windows 10 With Microsoft’s New Plugin

Microsoft just released a free RAW Image extension for Windows 10 that makes viewing RAW files much easier in Windows’ File Explorer

Caution: Misuse of security tools can turn against you

In a security context, this is a word of caution about making sure the tools we use to keep our information private don’t actually cause the data leaks themselves. In this article, I will be talking about some cases that I have come across in which security tools have leaked data they were intended to secure.

 

Music By Jim Holley