Redact is a great app to clean up your digital detritus. It’s free for personal use and supports 40, or so platforms including facebook, twitter, discord, twitch, etc. Check the full list here.
Delete your digital footprint

Redact is a great app to clean up your digital detritus. It’s free for personal use and supports 40, or so platforms including facebook, twitter, discord, twitch, etc. Check the full list here.
Your domain name is your web address, or the part after the @ in your email address. Our domain is gartnertechnology.com. Who owns your domain name anyway? Sounds like a pretty simple question, doesn’t it? Technically, the question is “Who holds the rights to your domain name?” According to Google: A registrant is the registered […]
Server product keys, like most other OS product keys can typically be found on a label affixed to the chassis of the device in question. Occasionally, we may need access to these product keys when physical access to the device is not practical. For example, I recently needed the product key for a server that […]
One of our clients wants a company wide contact list through Microsoft 365. It makes sense that this shared contact list would show up in the Outlook Address Book, but apparently, this is not how Outlook works. First, I followed this guide: https://docs.microsoft.com/en-us/outlook/troubleshoot/calendaring/how-to-share-calendar-and-contacts… and the group and calendar show up in Outlook right away, as expected, but […]
I’ve recently had an issue with one of the UniFi installations that I manage. The internet speed was upgraded so I made some optimizations to the network to better utilize the potential increase in bandwidth. Prior to completing my tweaks, all wireless clients suddenly could no longer get an IP address from the USG DHCP […]
We bought a Surface Pro 3 a few years back when it was new. After about 13 months – right after the warranty expired – a dead zone developed on the touch screen in which touch by hand or pen/stylus would not function. This was the approximately top 1/3 of the screen. After much searching […]
The types of data breaches that happen regularly are not typically affected by how secure our login passwords/procedures are. When point-of-sale systems are breached, my login has no bearing on how companies store and secure personally identifiable information. I believe that the security of financial data has a fundamental infrastructure problem that needs to be […]
I talk about Open Source and Free Software quite a bit. I’m sure that many are skeptical as to whether or not this really means anything practical for their business, after all, you may think, “Open Source only benefits nerds and academia”. This week, we begin a series of articles that will highlight specific Open […]
Because malware and viruses are often spread through email, Gartner Technology recommends multiple recipients not be placed in the ‘To:’ or ‘Cc:’ fields when emailing several people. When you place multiple recipients in the ‘To:’ or ‘Cc:’ field, all of the recipients receive the email addresses of all other recipients – as does anyone else […]
I’d been speaking with a colleague about the products and services that he sold. His experience had been mostly with installations of small business servers. We were talking about all of the really cool and useful things that you can do with Microsoft products. What we really wanted to know was the answer to these […]