facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Ways to Travel Without Fear of Hacking

Tip of the Week: 3 Ways to Travel Without Fear of Hacking

Cyber threats are everywhere. If you’re one to travel, then you’ll encounter many of these threats on public Wi-Fi networks. Therefore, remote workers need a secure way to access company files. Here are three tips to protect your digital assets while traveling.

0 Comments
Continue reading

Tip of the Week: You Won’t Believe These 4 Common Items that Mess With WiFi!

b2ap3_thumbnail_wifi_interruptions_400.jpgWireless Internet access is something that a lot of people take for granted, yet we all complain about shoddy Internet connections from time to time. Little do they know that some of the most common issues with their wireless connection could be ordinary appliances and other conflicting technologies. You might be surprised by what they are!

0 Comments
Continue reading

Tip of the Week: 5 Shockingly-Easy Ways to Improve Your WiFi Signal

b2ap3_thumbnail_tip_for_wifi_400.jpgWouldn’t it be nice to boost your WiFi signal and access it from anywhere in and around your office? Sometimes the solution is purchasing a new, more powerful router, but you might be able to get more out of your existing device by improving the placement of it.

0 Comments
Continue reading

Connectify Turns Your PC Into a WiFi Hotspot [VIDEO]

b2ap3_thumbnail_wifi_hotspot_virtual_router_400.jpgDo you need a WiFi signal? If you’ve got a PC with a wireless card, then you’ve got what it takes to download Connectify and turn your PC into a WiFi hotspot. These days, with everyone being so dependent on WiFi, having an additional WiFi hotspot can come in handy.

0 Comments
Continue reading

Tip of the Week: How to Broadcast WiFi From Your Android Device

b2ap3_thumbnail_broadcast_from_smartphone_400.jpgSometimes you find yourself in a pinch and you really need a WiFi signal for your laptop in order to complete a task. If you’ve got your smartphone handy, then you can easily turn your device into a WiFi hotspot and give your laptop the wireless Internet signal it needs. Here’s how you can accomplish this from your Android device.

0 Comments
Continue reading

Tip of the Week: Who’s Leeching Service from Your WiFi Network?

b2ap3_thumbnail_stealing_my_wifi_400.jpgWireless connections like WiFi can be tricky at times. Either they don’t work, the connection isn’t a very good one, or there are too many people using it for it to be effective. Whatever the reason, you can bet that there are people using your WiFi who shouldn’t be can be. This can lead to many problems including security concerns, slow browsing speeds, and more.

0 Comments
Continue reading

Tip of the Week: How to Securely Connect to Public WiFi

b2ap3_thumbnail_wifi_security_400.jpgAs the Internet of Things and BYOD make headlines in the technology world, more and more devices are connecting to wireless networks. While this means that technology continues to grow more mobile, it also means that threats are given new avenues to access countless devices, many of which might contain information of a personal nature.

0 Comments
Continue reading

Are You Being Hacked by Your Neighbor’s Cat?

b2ap3_thumbnail_hacked_by_neighbors_cat_400.jpgYes, you read that title right. If your WiFi isn't protected, you can be hacked by the furry little creature that wanders around your backyard when you're not home. Coco, a Siamese cat from Washington, D.C., was able to discover dozens of weak or unprotected WiFi networks in his neighborhood with his high-tech collar.

0 Comments
Continue reading

Make WiFi Passwords a Thing of the Past

b2ap3_thumbnail_wifi_security_400.jpgThe wireless router is something that has been around for a long time now, and you might still have yours from when you first got wireless Internet installed in your office. If this is the case, you owe it to yourself to upgrade to a newer model. Besides increasing the speed of your wireless connection, there are a few security benefits to updating your router.

0 Comments
Continue reading

Can You Live without WiFi?

b2ap3_thumbnail_nowadays_wifi_is_a_basic_human_need_400.jpg70 years ago, psychologist Abraham Maslow published his pyramid theory on human motivation called "Maslow's Hierarchy of Needs." At the top of the pyramid is self-actualization. Before this can be achieved, a person needs things like esteem, belonging, safety, and basics like food and water. Because people change, we feel that it's time to update Maslow's need pyramid and add a new layer: WiFi.

0 Comments
Continue reading

4 Xbox One Features for Your Business. Wait. What?

b2ap3_thumbnail_xbox400.jpgIn a recent marketing ploy by Microsoft that is nothing short of genius, the new Xbox One is pitched as a tool that can help your business. The beauty of this strategy is that it allows for businesses to write off the $499 Xbox One as a business expense. Here are four new Xbox One features that allow for this clever budgeting move.

0 Comments
Continue reading

Travel With Free Wi-Fi

Everybody likes the free goodies in a hotel room, tiny shampoo bottles, coupons to nearby restaurants, and HBO top the list. Wi-Fi however, our favorite goodie, sometimes fails to make the complimentary goodie list. It seems a little messed up to us, that hotels (the place you work and sleep) charge you for Wi-Fi while Burger King gives it away for free, but we have found a Wi-Fi loophole to help you out.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Network Security Business Email Saving Money Hosted Solutions Malware IT Services Efficiency IT Support Google Small Business User Tips Computer Smartphones Mobile Devices Innovation Quick Tips Business Continuity Gadgets Disaster Recovery VoIP Microsoft Office Network Social Media Android Productivity Data Backup Collaboration Communication Mobile Office Virtualization Server Smartphone communications Data Recovery Mobile Device Management Miscellaneous Upgrade Cybersecurity IT Support Ransomware Windows 10 Tech Term Phishing Unified Threat Management Windows Operating System Vendor Management Passwords Holiday Facebook Remote Monitoring BYOD Managed IT services Remote Computing Automation Apps Analytics Mobile Computing BDR WiFi Users The Internet of Things Apple Mobile Device Marketing Outsourced IT Internet of Things Data Management History Firewall Artificial Intelligence App Managed IT Services Browser Alert Save Money Encryption IT Consultant Cloud Computing Big data Office 365 Spam Health Two-factor Authentication Gmail Content Filtering Going Green Office Windows 10 Bring Your Own Device Maintenance Bandwidth Printer Antivirus Managed IT Virus Training Tech Support Search Budget Hiring/Firing Hard Drives Business Technology Lithium-ion Battery Best Practice Information Technology Saving Time Cybercrime Outlook Windows 8 Help Desk Cost Management Wireless Technology Access Control Money Document Management It Management Phone System Blockchain Computers VPN Recovery Employer-Employee Relationship IBM Travel Education Healthcare Update Hacking Save Time Compliance Data storage Managed Service File Sharing Customer Service Hard Drive iPhone Running Cable Proactive IT Legal Mobility Networking Government Website Information Regulations Intranet Twitter Augmented Reality SaaS PowerPoint Risk Management Law Enforcement Humor Applications Administration Solid State Drive Digital Payment Router Downtime Black Market User Flexibility Cryptocurrency Avoiding Downtime Comparison Tablet Data Security Company Culture Social Laptop Computer Repair Wireless Business Growth Google Maps DDoS Current Events Patch Management Social Networking Data Loss Social Engineering Scam Excel Management Paperless Office Vulnerabilities Data Breach Customer Relationship Management Word Sports Retail Disaster Computing Fax Server Password Cortana Hosted Solution Digital Value End of Support Project Management Telephony Robot Websites Securty Machine Learning Hacker Business Intelligence Telephone Systems USB Distribution Software as a Service Vendor Uninterrupted Power Supply Presentation Public Cloud Bluetooth Computer Accessories Conferencing Vulnerability Safety Virtual Desktop Bitcoin Inbound Marketing Identity Theft Specifications Data Protection Google Docs Windows 7 Trending Documents Experience Mouse Monitoring Entertainment Cleaning Pain Points Politics Heating/Cooling Monitors Virtual Reality User Error Programming Emails Office Tips Co-managed IT Statistics Storage Automobile Network Congestion Chromebook Voice over Internet Protocol Computing Infrastructure Hack YouTube Redundancy Unified Communications Settings How To Streaming Media Download eWaste Evernote Private Cloud Lifestyle Gaming Console Virtual Assistant Start Menu Tech Terms Webcam Microchip Taxes Text Messaging Net Neutrality IT service Distributed Denial of Service Processors Mobile Technology Chrome Cooperation Piracy Upload Computer Care Content Management Employer Employee Relationship Google Play Smart Tech Upgrades Microsoft Excel Business Managemenet Business Owner G Suite Thin CLient Hacks Physical Security Processor HTML Google Drive Windows Server 2008 3D Ebay IP Address Licensing Microsoft 365 Fiber-Optic LiFi Database Get More Done Smart Phones Banking Botnet Browsers Human Resources Mobile Security Printer Server Spyware Mobile Payment online Currency Relocation Application Tablets Medical IT Telephone System Turn Key User Tip Software License Trends Work/Life Balance Trojan Electricity Printing Security Cameras Multi-Factor Security Deep Learning Cost Sync Leadership Notifications CCTV Navigation Devices Organize Adminstration Pirating Information LinkedIn Solutions Fraud Visible Light Communication Tactics Memory Business Metrics Computer Malfunction Data Analysis UTM Content cache Television Digital Signature Reliable Computing Professional Services IT consulting In Internet of Things IT Plan Enterprise Resource Planning WannaCry Downloads Archive Teamwork GDPR Legislation Error Skype Addiction Flash Corporate Profile Tech CIO Accountants A.I. Time Management Freedom of Information Integration email scam Advertising Point of Contact PDF Motion Sickness Fileless Malware Staffing Multi-factor Authentication Google Wallet Webinar Assessment SharePoint Scalability Windows XP Proxy Server Migration Society Connected Devices Google Calendar Upselling Best Available Messenger Keyboard Tracking Modem Wireless Headphones Displays Telephone Tip of the week Network Management VoIP Rental Service Meetings Term Equifax Micrsooft Fleet Tracking Touchscreen News Video Surveillance Electronic Medical Records Domains Knowledge Saving ZTime Analytic Web Server Directions Device security Drones MSP Consultation Recycling Public Speaking Cabling Recording Product Reviews Wi-Fi Administrator Dark Web Desktop Finance Technology Tips Books Shortcut Workers SSID Nanotechnology Social Network Business Cards Permissions Service Level Agreement Language Best Practives Audit Harddrive Read Entrepreneur Supercomputer Processing Startup Asset Tracking Fake News Debate Troubleshooting Health IT Environment Managed IT Service Username Data Warehousing GPS HIPAA Worker Logistics Unified Threat Management Backup and Disaster Recovery Electronic Payment Bookmark Music Gamification Access Device Management Reading Competition Samsung switches Screen Reader Writing Customer Resource management Microserver Emergency Hard Drive Disposal External Harddrive Productuvuty Managing Stress Regulation 3D Printing Printers CrashOverride Capital

toner1