facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Ways to Travel Without Fear of Hacking

Tip of the Week: 3 Ways to Travel Without Fear of Hacking

Cyber threats are everywhere. If you’re one to travel, then you’ll encounter many of these threats on public Wi-Fi networks. Therefore, remote workers need a secure way to access company files. Here are three tips to protect your digital assets while traveling.

0 Comments
Continue reading

Tip of the Week: You Won’t Believe These 4 Common Items that Mess With WiFi!

b2ap3_thumbnail_wifi_interruptions_400.jpgWireless Internet access is something that a lot of people take for granted, yet we all complain about shoddy Internet connections from time to time. Little do they know that some of the most common issues with their wireless connection could be ordinary appliances and other conflicting technologies. You might be surprised by what they are!

0 Comments
Continue reading

Tip of the Week: 5 Shockingly-Easy Ways to Improve Your WiFi Signal

b2ap3_thumbnail_tip_for_wifi_400.jpgWouldn’t it be nice to boost your WiFi signal and access it from anywhere in and around your office? Sometimes the solution is purchasing a new, more powerful router, but you might be able to get more out of your existing device by improving the placement of it.

0 Comments
Continue reading

Connectify Turns Your PC Into a WiFi Hotspot [VIDEO]

b2ap3_thumbnail_wifi_hotspot_virtual_router_400.jpgDo you need a WiFi signal? If you’ve got a PC with a wireless card, then you’ve got what it takes to download Connectify and turn your PC into a WiFi hotspot. These days, with everyone being so dependent on WiFi, having an additional WiFi hotspot can come in handy.

0 Comments
Continue reading

Tip of the Week: How to Broadcast WiFi From Your Android Device

b2ap3_thumbnail_broadcast_from_smartphone_400.jpgSometimes you find yourself in a pinch and you really need a WiFi signal for your laptop in order to complete a task. If you’ve got your smartphone handy, then you can easily turn your device into a WiFi hotspot and give your laptop the wireless Internet signal it needs. Here’s how you can accomplish this from your Android device.

0 Comments
Continue reading

Tip of the Week: Who’s Leeching Service from Your WiFi Network?

b2ap3_thumbnail_stealing_my_wifi_400.jpgWireless connections like WiFi can be tricky at times. Either they don’t work, the connection isn’t a very good one, or there are too many people using it for it to be effective. Whatever the reason, you can bet that there are people using your WiFi who shouldn’t be can be. This can lead to many problems including security concerns, slow browsing speeds, and more.

0 Comments
Continue reading

Tip of the Week: How to Securely Connect to Public WiFi

b2ap3_thumbnail_wifi_security_400.jpgAs the Internet of Things and BYOD make headlines in the technology world, more and more devices are connecting to wireless networks. While this means that technology continues to grow more mobile, it also means that threats are given new avenues to access countless devices, many of which might contain information of a personal nature.

0 Comments
Continue reading

Are You Being Hacked by Your Neighbor’s Cat?

b2ap3_thumbnail_hacked_by_neighbors_cat_400.jpgYes, you read that title right. If your WiFi isn't protected, you can be hacked by the furry little creature that wanders around your backyard when you're not home. Coco, a Siamese cat from Washington, D.C., was able to discover dozens of weak or unprotected WiFi networks in his neighborhood with his high-tech collar.

0 Comments
Continue reading

Make WiFi Passwords a Thing of the Past

b2ap3_thumbnail_wifi_security_400.jpgThe wireless router is something that has been around for a long time now, and you might still have yours from when you first got wireless Internet installed in your office. If this is the case, you owe it to yourself to upgrade to a newer model. Besides increasing the speed of your wireless connection, there are a few security benefits to updating your router.

0 Comments
Continue reading

Can You Live without WiFi?

b2ap3_thumbnail_nowadays_wifi_is_a_basic_human_need_400.jpg70 years ago, psychologist Abraham Maslow published his pyramid theory on human motivation called "Maslow's Hierarchy of Needs." At the top of the pyramid is self-actualization. Before this can be achieved, a person needs things like esteem, belonging, safety, and basics like food and water. Because people change, we feel that it's time to update Maslow's need pyramid and add a new layer: WiFi.

0 Comments
Continue reading

4 Xbox One Features for Your Business. Wait. What?

b2ap3_thumbnail_xbox400.jpgIn a recent marketing ploy by Microsoft that is nothing short of genius, the new Xbox One is pitched as a tool that can help your business. The beauty of this strategy is that it allows for businesses to write off the $499 Xbox One as a business expense. Here are four new Xbox One features that allow for this clever budgeting move.

0 Comments
Continue reading

Travel With Free Wi-Fi

Everybody likes the free goodies in a hotel room, tiny shampoo bottles, coupons to nearby restaurants, and HBO top the list. Wi-Fi however, our favorite goodie, sometimes fails to make the complimentary goodie list. It seems a little messed up to us, that hotels (the place you work and sleep) charge you for Wi-Fi while Burger King gives it away for free, but we have found a Wi-Fi loophole to help you out.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Data Microsoft Backup Workplace Tips Hardware Managed Service Provider Productivity Network Security Email Business Hosted Solutions Malware Saving Money IT Services Efficiency IT Support Google User Tips Small Business Computer Innovation Smartphones Productivity Mobile Devices Quick Tips Business Continuity Gadgets VoIP Social Media Microsoft Office Android Network Collaboration Data Backup Data Recovery Disaster Recovery Mobile Office Server Upgrade IT Support Virtualization Communication communications Smartphone Mobile Device Management Phishing Miscellaneous Cybersecurity Tech Term Ransomware Windows 10 Windows Facebook Operating System Unified Threat Management Passwords Apps Holiday Remote Monitoring Vendor Management Analytics Automation Managed IT services BYOD Mobile Computing Remote Computing Users Internet of Things BDR WiFi Mobile Device Marketing Apple The Internet of Things Data Management Outsourced IT Firewall Managed IT Services Artificial Intelligence History Browser Alert Save Money App Two-factor Authentication Cloud Computing Encryption Big data Spam IT Consultant Bandwidth Help Desk Bring Your Own Device Gmail Business Technology Office Antivirus Maintenance Printer Windows 10 Content Filtering Going Green Office 365 Health Computers Saving Time VPN Wireless Technology Managed IT Windows 8 Government Outlook Search Employer-Employee Relationship Cybercrime Tech Support Cost Management Virus Lithium-ion Battery Best Practice Information Technology Hiring/Firing Hard Drives Training Budget Customer Service It Management Travel Blockchain Education Managed Service Recovery Update Hacking Networking Information Money Document Management IBM Healthcare Access Control Phone System PowerPoint File Sharing Hard Drive Law Enforcement Applications Twitter Intranet Mobility Website Administration Compliance Data Loss Data storage Risk Management Avoiding Downtime Humor Password iPhone Legal Save Time Downtime Regulations SaaS Running Cable Proactive IT Augmented Reality Social Robot Windows 7 Wireless Data Security Securty Google Maps DDoS Patch Management Solid State Drive Fax Server Social Engineering Scam Black Market Flexibility Retail Cryptocurrency Word Data Breach Laptop Business Intelligence Private Cloud Cortana Business Growth Value Project Management Digital Digital Payment Hacker Websites Router Management Telephony Machine Learning Excel Paperless Office Vulnerabilities Telephone Systems Comparison Tablet Company Culture Sports Computing Computer Repair Customer Relationship Management Disaster User Hosted Solution Current Events End of Support Social Networking Bitcoin Co-managed IT Programming Gaming Console Identity Theft User Error Statistics IT service Network Congestion Documents Data Protection Webcam Distribution Entertainment Text Messaging Teamwork Heating/Cooling Politics Storage Virtual Reality Downloads Bluetooth Streaming Media Conferencing Automobile Lifestyle Emails Chromebook Voice over Internet Protocol Redundancy Computing Infrastructure Hack Monitoring How To eWaste Google Docs Net Neutrality Inbound Marketing Experience Chrome Download Evernote Virtual Assistant Cleaning Monitors Pain Points Office Tips Processors Start Menu Tech Terms Computer Accessories Microchip Taxes Distributed Denial of Service USB Mobile Technology YouTube Presentation Cooperation Software as a Service Unified Communications Settings Trending Public Cloud Vendor Uninterrupted Power Supply Mouse Specifications Safety Vulnerability Virtual Desktop Medical IT Permissions Language Unified Threat Management Backup and Disaster Recovery Sync Browsers Electricity Printing Username Webinar Point of Contact Harddrive Screen Reader Customer Resource management User Tip Proactive Maintenance Debate Gamification Notifications CCTV Digital Signature Security Cameras Smart Tech Reliable Computing Solutions Music GPS Piracy Upload Business Metrics Computer Malfunction Navigation cache Television switches Writing Professional Services Fiber-Optic Database In Internet of Things Data Analysis WannaCry Upgrades External Harddrive HTML GDPR Time Management Freedom of Information LiFi Analytic Telephone System PDF SQL Server Corporate Profile Recycling Mobile Security Product Reviews Thin CLient Multi-Factor Security Cost Scalability Integration 3D Software License Ebay Trends Motion Sickness Best Available Keyboard Tech Assessment SharePoint Messenger Tracking Domains Tip of the week Work/Life Balance Read Fraud Tactics Fileless Malware Google Calendar Deep Learning Best Practives Smart Phones Devices Modem Touchscreen News Visible Light Communication Memory Proxy Server Azure VoIP UTM Content Rental Service Meetings Public Speaking IT consulting Leadership Legislation Error Cabling Electronic Medical Records Transportation Knowledge Microserver Device Management Adminstration IT Plan Pirating Information Enterprise Resource Planning Web Server Shortcut Term Consultation Accountants A.I. Books Workers Troubleshooting Recording Content Management email scam Addiction Wi-Fi Administrator Entrepreneur Directions Technology Tips Business Managemenet SSID Fake News Advertising Flash Environment Dark Web Free Resource Audit CIO Get More Done Multi-factor Authentication Supercomputer HIPAA Data Warehousing Windows XP Printer Server Wireless Headphones Telephone Worker Electronic Payment Health IT Employee/Employer Relationship Staffing Google Wallet Turn Key online Currency Migration Connected Devices Competition Processing Equifax Fleet Tracking Reading Samsung Business Owner Logistics Emergency Hard Drive Disposal Society Network Management Managed IT Service Access Displays Trojan IP Address Microsoft Excel Organize Upselling G Suite Bookmark Computer Care Micrsooft LinkedIn Device security MSP Employer Employee Relationship Google Drive Windows Server 2008 Nanotechnology Social Network Licensing Human Resources Employer/Employee Relationships Drones Desktop Video Surveillance Finance Hacks Physical Security Application Google Play Skype Saving ZTime Startup Asset Tracking Relocation Tablets Microsoft 365 Archive Business Cards Service Level Agreement Banking Botnet Processor Spyware Mobile Payment Printers Managing Stress Regulation CrashOverride 3D Printing Capital Productuvuty

toner1