How to Secure the Linksys EA4500 Wireless Router

How to Secure the Linksys EA4500 Wireless Router

Wireless routers, by default, are unsecured when you connect a router for the first time. This is important to know as you will need to take the necessary steps to secure any wireless router that you have just purchased. With regards to Linksys routers, the steps to secure the router are very similar, so if you have trouble finding proper steps to secure your Linksys router, you can usually follow steps for another Linksys router. Read More »

Networks

The Top 3 Most Dangerous Computer Viruses

The Top 3 Most Dangerous Computer Viruses

Computer viruses have come a long way since the very first one in early 1970s. Back in those days, computer viruses were basically self-replicating programs which didn’t do a lot of harmful activities (or anything harmful at all). Most were intended as academic testing purposes, and some were pretty much intended as jokes. The first virus in the wild was Elk Cloner, which essentially cloned itself from floppy disks to spread and upon 50th use, it will show a poem. Read More »

Security Tips

The Power of 6 Seconds: Vine & Your e-Commerce Business

The Power of 6 Seconds: Vine & Your E-Commerce Business

Unscrew the cap on a bottle of water. Put a stamp on an envelope. Open the door to let the dogs outside. These are a few examples of everyday tasks that usually take about six seconds to complete. But now, thanks in part to an innovative video feature called Vine, companies including e-commerce businesses are now using exactly six seconds to spread the word about who they are, and what they do. Read More »

Video Streaming

SEO Be Damned. Why Your Blog is About You.

SEO Be Damned. Why Your Blog is About You.

After I decided to change the direction of Technically Easy, I have been thinking more about what content I would like to publish on Technically Easy. Of course, as I started to think about the content, other questions started to pop in my head. How often should I publish posts? What long should each post be? What type of posts should I write? How many guest posts should I accept? The odd thing is that I started Technically Easy over six years ago, and many of the questions I asked myself were the same ones I asked myself when I first started. Read More »

Websites and Blogging

What is DOCSIS?

What is DOCSIS?

hen I first began using the Internet, I used a dialup modem to connect and still remember the nice noise the modem made when establishing a connection. That was over 16 years ago, but for the past 14 years I have been using a broadband Internet connection through my cable provider. Over the years I have seen my Internet connection speeds increase for both download and upload. Recently I have been contemplating switching Internet providers – mainly because of price – and have begun researching cable modems. Read More »

Technology

Thinking of Guest Posting? Not if You Do These 5 Things

Thinking of Guest Posting? Not if You Do These 5 Things

Yesterday I wrote a post where I laid out a new direction for Technically Easy. Actually, the direction I will be taking this blog is back to the original way I had intended this blog to go from the beginning. In that post I talked about how I will be evaluating guest posts more critically, and won’t be publishing such posts as often. I also talked about publishing posts less, but publishing better quality posts. Read More »

Tips

Rethinking the Direction of Technically Easy

Rethinking the Direction of Technically Easy

Over two years. That is how long I have been accepting guest posts on Technically Easy. Unfortunately, during that time I feel that the quality of my blog has suffered. Technically Easy has been online for over six years, and it started as a way for me to write my experiences, and answer technology issues, in a way that would be easy for others to find, read, and understand issues that they may be having, as well. Read More »

Websites and Blogging

Acronis True Image 2014 Review

Acronis True Image 2014

A few years ago I had an issue with my wife’s laptop – it ran out of disk space on the installed 160GB hard drive. It was a horrible issue, I know. I eventually went and bought a 500GB hard drive, but my wife didn’t want anything to change after I installed the new hard drive – she is not a fan of technology changes. In order to ensure that her laptop was the same after the installation of the new hard drive, I decided to clone the information from the original 160GB hard drive onto the new 500GB hard drive. After performing searches online regarding the cloning process I decided on a piece of software called Acronis True Image. Read More »

Security Software
  • Get Free Email Updates

  • Follow Me

    Follow Us on Facebook Follow Us on Google+ Follow Us on Twitter Follow Us on Pinterest Follow Us on RSS
  • Recent Posts