How to Use the New Task Manager in Windows 8 or 10 – (from HowtoGeek.com)

If you have been a windows user for any length of time then you probably seen the the task manager before and may be used it to kill a rouge program. For Windows 8 and Windows 10, task manager has been revamped into a feature rich resource and process monitor alongside its task killing abilities.

Howtogeek.com, one of my personal favorite sites for focused tutorials on common and not so common technical tasks, has an excellent breakdown of the new taskmanager. This article is especially useful for students enrolled in CompTIA A+, and MCTS 70-680 courses as at some point you will be encountering machines with newer windows operating systems and knowing what you can do with the tools available to you in the OS. task manager really has a lot of information on what a machine is doing in real time so it can be a powerful tool in diagnosing issues with a machine, especially performance issues with a system.

 

4764534852_5a816717ac_o

IT Ninja Tip: hit CTRL+SHIFT+ESC to bring up taskmanager from the desktop in
Windows.  You can also hit CTRL+ATL+DELETE and then select task manager from the menu, but CTRL+SHIFT+ESC is more direct if you need.
from How-To Geek: How to Use the New Task Manager in Windows 8 or 10

 

ninja image from Andrés Álvarez Iglesias- via Flicker

Advertisements

A Must read Article on one of the Driving forces in the exponential rise in security threats.

A must read article from the UK edition of Ars Technica, a popular technology blog and one of my personal sources for solid tech writing,  (written by ) explores on one of the Driving forces in the exponential rise in security threats in recent years, the development of the zero day marketplace.  I highly recommend everyone read this to get an idea of the scope of the issues when it comes to security in the current technological climate.

 

How do you defend yourself against the unknown? That is crux of the zero-day vulnerability: a software vulnerability that, by definition, is unknown by the user of the software and often its developer as well.
The rise of the zero-day market – arstechnica.co.uk/

Kill the Password: Why a String of Characters Can’t Protect Us Anymore

One of the seminal articles on passwords and their inherit insecurity, Kill the Password, written by Mat Honan of Wired Magazine,  is one of the most important articles for aspiring admins who have users in their environment with internet access  and the ability to connect to sites and resources online that require authentication.

There are some issues that our current system of internet security have not ironed out and the consequences of leaning and depending on a password for security at any level in the enterprise has known significant risks that must be addressed.

http://www.wired.com/gadgetlab/2012/11/ff-mat-honan-password-hacker/?fb_action_ids=445573275505879,445572958839244

 

Originally Posted (9/3/2013)

7 Ways to Secure Your Web Browser Against Attacks

 

I am Always interested in providing students and clients hints and tools and  procedures to get the most out of their computers and their applications. To that end I came across an article over at howtogeek.com covering some simple things that we can all do to improve the security of our web browsers, things that I am incorporating into my own machines setup now. 7 Ways to Secure Your Web Browser Against Attacks

Career Spotlight: What I Do as a Cloud Developer

In an article Posed on lifehacker.com, writter Andy Orin  shares with us a profile of a Cloud Developer, The preface of which is contained below. I think this is an interesting profile of an individual IT Professional, but also highlights the growth of the field of IT and how one might navigate its ebbs and flows.

The “cloud” is a common computing buzzword with multiple uses; you might store your music in the cloud, or perhaps host a website. But that doesn’t mean there’s one server hosting your site—rather, the individual servers of yore are being replaced with virtualized machines. It’s the cloud.

Click here to see the Full Article on Lifehacker.com 

Top Five Hacker Tools Every CISO Should Understand

While this Article is geared towards C-level  Information Security Officers, the core values of the article hold and ran are applicable to any professional that has information security as either a direct job  responsibility or as a extended professional concern . Security site tripwire.com brings us a list of their top five “hacker” tools we should all understand. Click here to open the Article in a new window

How Windows 8.1 Integrates SkyDrive Everywhere

One of the biggest changes in Windows 8.1 is SkyDrive integration. In Windows 8, SkyDrive was available as a Modern app and a desktop app that you could install. In Windows 8.1, SkyDrive is integrated at the system level. SkyDrive integration doesn’t just apply to Modern apps.

http://www.howtogeek.com/166996/how-windows-8.1-integrates-skydrive-everywhere/

Terminology Page

So I know updates to the Blog have been few and far between, but I hope to add more content regularly to the Blog going forward. Proof of this effort can be seen in the new Terminology page, on the blog which will form the basis for a more complete reference tool that is in the works. For now Expect me to update select terms with  brief descriptions and references to more complete sources. The idea here is not to house all that information in this blog, but to link viewers with solid reference to facility further study. 

Just Delete Me Is a Massive List of Links to Close All Your Accounts

Just Delete Me Is a Massive List of Links to Close All Your Accounts

Have you ever signed up for a site or a webapp and had the hardest time trying find a way to get yourself off of that particular site later. Justdelete.me is a site that specializes in identifying the process of liberating your information from various sites around the web and could be an invaluable tool for you. Lifehacker.com (one of my favorite sites on the web) introduced me to this great resource of information and I highly encourage everyone to take a look at their article on just delete me.