ManhattanTechSupport.com Rebrands as Homefield IT; Providing Strategic Technology Services Across the Country.

Learn More

Blog

If you're looking for some good and useful articles on technology - including industry trends, the latest cybersecurity alerts, tips, tricks and more - "favorite" the Manhattan Tech Support blog and check back often for fresh new articles from our team of IT experts.

Blog

How to Zip Multiple Files Into Individual Archives

calenderNovember 8, 2010

authorHomefield IT

How to Zip Multiple Files Into Individual Archives

You may know how to add multiple files to one zip file, but do you know how create individual zip archives for each file automatically? Read more. Published with permission from TechAdvisory.org. Source.

Read More
Don’t be Lazy with Your Passwords

calenderNovember 5, 2010

authorHomefield IT

Don’t be Lazy with Your Passwords

Passwords are more or less the equivalent of keys when it comes to cyberspace. However, passwords can be compromised through hacking, stealing, or even just guessing – which is why password security and integrity is very important. In the same way that keys are used to open different doors, passwords are used to access many […]

Read More
Managed IT Services: Helping You Understand Your IT Needs Through Documentation and Assessment

calenderNovember 4, 2010

authorHomefield IT

Managed IT Services: Helping You Understand Your IT Needs Through Documentation and Assessment

You can avoid computer problems with Managed IT Services. IT professionals will conduct a comprehensive analysis of your IT processes and functions and help you assess how to produce the most favorable results for your business. Today’s businesses rely heavily on computers. That’s why most entrepreneurs invest in the best computer hardware and software that […]

Read More
Cleaning your Keyboard

calenderNovember 3, 2010

authorHomefield IT

Cleaning your Keyboard

When your computer keyboard starts looking dirty, yellowish, or some keys are not working properly, it may be time to learn how to clean it properly. Read more. Published with permission from TechAdvisory.org. Source.

Read More
Lost your Smartphone? Erase Its Data and Track It Down

calenderNovember 1, 2010

authorHomefield IT

Lost your Smartphone? Erase Its Data and Track It Down

As businesses and business people store more and more important information in their smartphones, the smart thing to do is to have a plan in place in case you lose it – having your smartphone’s data in the wrong hands can be a potential nightmare. A few years ago, mobile phones were basically just a […]

Read More
How to Optimally Position a Wireless Access Point or Router

calenderOctober 31, 2010

authorHomefield IT

How to Optimally Position a Wireless Access Point or Router

The performance of a Wi-Fi home network greatly depends on signal strength of the wireless router or wireless access point. To position your wireless equipment for optimal network performance, follow these guidelines. Read more. Published with permission from TechAdvisory.org. Source.

Read More
Clear Cloud Keeps the Coast Clear

calenderOctober 28, 2010

authorHomefield IT

Clear Cloud Keeps the Coast Clear

Without us knowing, we may visit websites that aren’t exactly healthy for our systems – inviting malware, phishing, and all types of potentially unsavory viruses that can damage our systems. The solution is simple: Clear Cloud It’s a simple, straightforward approach to getting better security for your computer:  download software, install it, and have it […]

Read More
Finally, a Goodbye Salute to Windows XP

calenderOctober 25, 2010

authorHomefield IT

Finally, a Goodbye Salute to Windows XP

Microsoft recommends transferring to Windows 7 as Microsoft XP ceased sales on October 22, 2010, with support available only until April 2014. If you’ve been using Microsoft XP for a long time – with good reason, XP being one of the most stable operating systems in the Windows line – it might be time to […]

Read More
Malware Can Come in the Most Innocent Forms

calenderOctober 22, 2010

authorHomefield IT

Malware Can Come in the Most Innocent Forms

Since MS Word and Adobe Reader are widely used applications, hackers and malware designers have come up with ways to exploit these programs and the documents associated with them in order to infect as many people possible. It might be common knowledge that Microsoft Word and Adobe Reader are probably the most used document editing […]

Read More
1 39 40 41 42 43 48