How to Secure the Linksys EA4500 Wireless Router

How to Secure the Linksys EA4500 Wireless Router

Wireless routers, by default, are unsecured when you connect a router for the first time. This is important to know as you will need to take the necessary steps to secure any wireless router that you have just purchased. With regards to Linksys routers, the steps to secure the router are very similar, so if you have trouble finding proper steps to secure your Linksys router, you can usually follow steps for another Linksys router.

The Top 3 Most Dangerous Computer Viruses

The Top 3 Most Dangerous Computer Viruses

Computer viruses have come a long way since the very first one in early 1970s. Back in those days, computer viruses were basically self-replicating programs which didn’t do a lot of harmful activities (or anything harmful at all).

Most were intended as academic testing purposes, and some were pretty much intended as jokes. The first virus in the wild was Elk Cloner, which essentially cloned itself from floppy disks to spread and upon 50th use, it will show a poem.

Since then, viruses were developed with different purposes. These days when you talk about a computer virus, you think about malicious programs with evil intentions.

For good reasons, too.

Do you know how much destruction computer viruses are causing every year?

Billions.

Yes, that’s in dollars. Millions of computers get infected every year, and billions of dollars are lost.

Read more

The Power of 6 Seconds: Vine & Your e-Commerce Business

The Power of 6 Seconds: Vine & Your E-Commerce Business

Unscrew the cap on a bottle of water. Put a stamp on an envelope. Open the door to let the dogs outside.

These are a few examples of everyday tasks that usually take about six seconds to complete. But now, thanks in part to an innovative video feature called Vine, companies including e-commerce businesses are now using exactly six seconds to spread the word about who they are, and what they do.

Read more

SEO Be Damned. Why Your Blog is About You.

SEO Be Damned. Why Your Blog is About You.

After I decided to change the direction of Technically Easy, I have been thinking more about what content I would like to publish on Technically Easy. Of course, as I started to think about the content, other questions started to pop in my head. How often should I publish posts? What long should each post be? What type of posts should I write? How many guest posts should I accept?

The odd thing is that I started Technically Easy over six years ago, and many of the questions I asked myself were the same ones I asked myself when I first started. It seems that since I reset the direction of Technically Easy back to the way it was a few years ago, I also reset my thoughts on my blog. After six years of blogging, I have come to one conclusion with regards to my blog, and perhaps blogging in general: do whatever I want.

Read more

What is DOCSIS?

What is DOCSIS?

When I first began using the Internet, I used a dialup modem to connect and still remember the nice noise the modem made when establishing a connection. That was over 16 years ago, but for the past 14 years I have been using a broadband Internet connection through my cable provider. Over the years I have seen my Internet connection speeds increase for both download and upload. Recently I have been contemplating switching Internet providers – mainly because of price – and have begun researching cable modems.

The one thing that I have learned about cable Internet is the connectivity standard that is used by cable companies when it comes to offering Internet service. This standard is called the “Data Over Cable Service Interface Specification”, or more popularly known as DOCSIS. As I am at times, I became curious as to this specification and began doing some basic research.

Read more

Thinking of Guest Posting? Not if You Do These 5 Things

Thinking of Guest Posting? Not if You Do These 5 Things

Yesterday I wrote a post where I laid out a new direction for Technically Easy. Actually, the direction I will be taking this blog is back to the original way I had intended this blog to go from the beginning. In that post I talked about how I will be evaluating guest posts more critically, and won’t be publishing such posts as often. I also talked about publishing posts less, but publishing better quality posts.

With that being said, while I haven’t abandoned guest posts because I still feel that those types of posts have their place on Technically Easy, I have changed my guest posting guidelines to help ensure better quality guest posts. The reason for such a change has been over two years of accepting guest posts, I have been disappointed at times with some of the quality. I blame myself, of course, as I am the last in the line of publication of such posts.

For those looking at writing and submitting guest posts, either on Technically Easy or another blog, I have put together some points on what I haven’t liked about guest posts.

Read more

Rethinking the Direction of Technically Easy

Rethinking the Direction of Technically Easy

Over two years. That is how long I have been accepting guest posts on Technically Easy. Unfortunately, during that time I feel that the quality of my blog has suffered. Technically Easy has been online for over six years, and it started as a way for me to write my experiences, and answer technology issues, in a way that would be easy for others to find, read, and understand issues that they may be having, as well.

Read more

Acronis True Image 2014 Review

Acronis True Image 2014

A few years ago I had an issue with my wife’s laptop – it ran out of disk space on the installed 160GB hard drive. It was a horrible issue, I know. I eventually went and bought a 500GB hard drive, but my wife didn’t want anything to change after I installed the new hard drive – she is not a fan of technology changes.

In order to ensure that her laptop was the same after the installation of the new hard drive, I decided to clone the information from the original 160GB hard drive onto the new 500GB hard drive. After performing searches online regarding the cloning process I decided on a piece of software called Acronis True Image. The entire process went off without a hitch and the new 500GB hard drive was installed and my wife couldn’t tell the difference – except she could now fill up the hard drive with more data.

A few weeks ago I was asked by Acronis to review their new version of the True Image software aptly named Acronis True Image 2014. Remembering my experience of using their product in the past, I immediately jumped at the opportunity to have a look at what their software could do. After using the software for some time, it immediately became clear the True Image has undergone many changes since the version I used a few years ago.

Read more