facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Ways to Travel Without Fear of Hacking

Tip of the Week: 3 Ways to Travel Without Fear of Hacking

Cyber threats are everywhere. If you’re one to travel, then you’ll encounter many of these threats on public Wi-Fi networks. Therefore, remote workers need a secure way to access company files. Here are three tips to protect your digital assets while traveling.

0 Comments
Continue reading

Tip of the Week: You Won’t Believe These 4 Common Items that Mess With WiFi!

b2ap3_thumbnail_wifi_interruptions_400.jpgWireless Internet access is something that a lot of people take for granted, yet we all complain about shoddy Internet connections from time to time. Little do they know that some of the most common issues with their wireless connection could be ordinary appliances and other conflicting technologies. You might be surprised by what they are!

0 Comments
Continue reading

Tip of the Week: 5 Shockingly-Easy Ways to Improve Your WiFi Signal

b2ap3_thumbnail_tip_for_wifi_400.jpgWouldn’t it be nice to boost your WiFi signal and access it from anywhere in and around your office? Sometimes the solution is purchasing a new, more powerful router, but you might be able to get more out of your existing device by improving the placement of it.

0 Comments
Continue reading

Connectify Turns Your PC Into a WiFi Hotspot [VIDEO]

b2ap3_thumbnail_wifi_hotspot_virtual_router_400.jpgDo you need a WiFi signal? If you’ve got a PC with a wireless card, then you’ve got what it takes to download Connectify and turn your PC into a WiFi hotspot. These days, with everyone being so dependent on WiFi, having an additional WiFi hotspot can come in handy.

0 Comments
Continue reading

Tip of the Week: How to Broadcast WiFi From Your Android Device

b2ap3_thumbnail_broadcast_from_smartphone_400.jpgSometimes you find yourself in a pinch and you really need a WiFi signal for your laptop in order to complete a task. If you’ve got your smartphone handy, then you can easily turn your device into a WiFi hotspot and give your laptop the wireless Internet signal it needs. Here’s how you can accomplish this from your Android device.

0 Comments
Continue reading

Tip of the Week: Who’s Leeching Service from Your WiFi Network?

b2ap3_thumbnail_stealing_my_wifi_400.jpgWireless connections like WiFi can be tricky at times. Either they don’t work, the connection isn’t a very good one, or there are too many people using it for it to be effective. Whatever the reason, you can bet that there are people using your WiFi who shouldn’t be can be. This can lead to many problems including security concerns, slow browsing speeds, and more.

0 Comments
Continue reading

Tip of the Week: How to Securely Connect to Public WiFi

b2ap3_thumbnail_wifi_security_400.jpgAs the Internet of Things and BYOD make headlines in the technology world, more and more devices are connecting to wireless networks. While this means that technology continues to grow more mobile, it also means that threats are given new avenues to access countless devices, many of which might contain information of a personal nature.

0 Comments
Continue reading

Are You Being Hacked by Your Neighbor’s Cat?

b2ap3_thumbnail_hacked_by_neighbors_cat_400.jpgYes, you read that title right. If your WiFi isn't protected, you can be hacked by the furry little creature that wanders around your backyard when you're not home. Coco, a Siamese cat from Washington, D.C., was able to discover dozens of weak or unprotected WiFi networks in his neighborhood with his high-tech collar.

0 Comments
Continue reading

Make WiFi Passwords a Thing of the Past

b2ap3_thumbnail_wifi_security_400.jpgThe wireless router is something that has been around for a long time now, and you might still have yours from when you first got wireless Internet installed in your office. If this is the case, you owe it to yourself to upgrade to a newer model. Besides increasing the speed of your wireless connection, there are a few security benefits to updating your router.

0 Comments
Continue reading

Can You Live without WiFi?

b2ap3_thumbnail_nowadays_wifi_is_a_basic_human_need_400.jpg70 years ago, psychologist Abraham Maslow published his pyramid theory on human motivation called "Maslow's Hierarchy of Needs." At the top of the pyramid is self-actualization. Before this can be achieved, a person needs things like esteem, belonging, safety, and basics like food and water. Because people change, we feel that it's time to update Maslow's need pyramid and add a new layer: WiFi.

0 Comments
Continue reading

4 Xbox One Features for Your Business. Wait. What?

b2ap3_thumbnail_xbox400.jpgIn a recent marketing ploy by Microsoft that is nothing short of genius, the new Xbox One is pitched as a tool that can help your business. The beauty of this strategy is that it allows for businesses to write off the $499 Xbox One as a business expense. Here are four new Xbox One features that allow for this clever budgeting move.

0 Comments
Continue reading

Travel With Free Wi-Fi

Everybody likes the free goodies in a hotel room, tiny shampoo bottles, coupons to nearby restaurants, and HBO top the list. Wi-Fi however, our favorite goodie, sometimes fails to make the complimentary goodie list. It seems a little messed up to us, that hotels (the place you work and sleep) charge you for Wi-Fi while Burger King gives it away for free, but we have found a Wi-Fi loophole to help you out.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Software Cloud Business Management Hackers Data Hardware Microsoft Network Security Workplace Tips Backup Managed Service Provider Hosted Solutions Business Productivity Email Malware IT Services Saving Money Productivity Efficiency Computer Google User Tips Innovation IT Support Small Business Smartphones Data Backup IT Support Mobile Devices VoIP Quick Tips Business Continuity Network communications Collaboration Gadgets Android Data Recovery Microsoft Office Upgrade Social Media Mobile Office Server Disaster Recovery Cybersecurity Smartphone Virtualization Communication Mobile Device Management Miscellaneous Phishing Holiday Ransomware Passwords Outsourced IT Windows 10 Operating System Tech Term Windows Vendor Management Apps Internet of Things Remote Monitoring Facebook Managed IT Services Unified Threat Management BDR Automation Mobile Device Analytics Mobile Computing BYOD Data Management Managed IT services Users Remote Computing Apple Windows 10 WiFi Marketing History The Internet of Things Artificial Intelligence Save Money Firewall Training Cloud Computing Browser Help Desk Big data App Alert Bandwidth Spam Office 365 Encryption Two-factor Authentication Business Technology Information Technology IT Consultant Office Cybercrime Bring Your Own Device Antivirus Managed IT Maintenance Printer Access Control Hard Drives Content Filtering Windows 7 Health Going Green Gmail Government Employer-Employee Relationship Retail Wireless Technology Information Windows 8 Outlook Cost Management Search Healthcare Hiring/Firing Virus Tech Support Budget Computers Lithium-ion Battery Managed Service Saving Time Best Practice VPN Recovery Update Project Management Hacking Humor Money Document Management iPhone Networking It Management Customer Service Blockchain IBM Data Loss Phone System Travel Education Augmented Reality Computing Data Breach PowerPoint Risk Management Law Enforcement Password Administration Value Solid State Drive Save Time Compliance File Sharing Downtime Hacker Hard Drive Data storage Mobility Avoiding Downtime Applications Proactive IT Computer Repair Running Cable Legal Patch Management Wireless Conferencing Regulations Intranet Twitter Storage Website Customer Relationship Management Current Events SaaS Hosted Solution Telephone Systems End of Support Robot Word Securty Digital Management Cortana Business Intelligence Fax Server Websites Cooperation Digital Payment Vulnerabilities Vendor Router Software as a Service Google Maps Black Market Flexibility Cryptocurrency Comparison Tablet Company Culture Laptop Social Engineering Business Growth User Data Security Social Networking Virtual Desktop Social Meetings Excel Private Cloud Paperless Office DDoS Voice over Internet Protocol Wi-Fi Scam Sports Telephony Machine Learning Disaster Monitoring Gaming Console Distributed Denial of Service Evernote Managed Services Webcam Virtual Assistant Public Cloud Licensing Multi-factor Authentication Net Neutrality eWaste Text Messaging IT service Chrome Telephone Lifestyle Managed IT Service Start Menu Tech Terms Identity Theft Bluetooth Mobile Technology Computer Accessories Processors Processor Uninterrupted Power Supply Virtual Reality USB Inbound Marketing Politics Presentation Memory Vulnerability Automobile Trending Google Docs Emails Bitcoin Experience Mouse Chromebook Cleaning Specifications Safety Professional Services Pain Points Smart Devices Data Protection Computing Infrastructure Hack Distribution Monitors Programming How To Statistics Office Tips Documents Integration Downloads Download Network Congestion Entertainment YouTube Teamwork Heating/Cooling Unified Communications Settings Managed Services Provider Redundancy Co-managed IT Microchip Taxes Streaming Media User Error Reading Samsung IT Plan Enterprise Resource Planning Webinar Recording Optimization IT Assessment VoIP Legislation Error Best Available Product Reviews Keyboard Directions Display Touchscreen News Permissions Language Read Domains SSID How To Harddrive Knowledge G Suite Accountants A.I. Dark Web Free Resource Debate Consultation Employer Employee Relationship email scam Addiction Processing Health IT Employee/Employer Relationship GPS Technology Tips Hacks Physical Security Public Speaking Fake News Relocation Tablets Migration Connected Devices Device Management Music Logistics Virtual Machines Electronic Health Records Audit Banking Botnet Wireless Headphones switches Writing Shortcut Wasting Time External Harddrive Network Management Content Management Troubleshooting Cyber security Memes Sync Equifax Fleet Tracking Upgrades Business Managemenet Entrepreneur Bookmark Data Warehousing HIPAA Best Practives Google Play Telephone Service Thin CLient Emergency Hard Drive Disposal Device security MSP Environment Employer/Employee Relationships 3D Ebay Access Notifications CCTV LiFi Microsoft Excel Reliable Computing Desktop Finance online Currency Electronic Payment Microsoft 365 Surveillance Computer Care Business Metrics Computer Malfunction Nanotechnology Social Network Competition Managing Costs Smart Phones Business Cards Service Level Agreement Business Owner Work/Life Balance Medical IT Trend Micro IT In Internet of Things Startup Asset Tracking Deep Learning Microserver Browsers Google Drive Windows Server 2008 Visible Light Communication IP Address Security Cameras Threats Leadership Username LinkedIn User Tip Proactive Maintenance Adminstration Pirating Information Spyware Mobile Payment Unified Threat Management Backup and Disaster Recovery Scalability Gamification Human Resources Solutions Development Electricity Printing Motion Sickness Screen Reader Customer Resource management IT consulting Get More Done Application Navigation Virtual Machine Messenger Tracking Piracy Upload Archive Printer Server eCommerce Smart Tech Skype Turn Key Data Analysis Employees Advertising Trojan Flash GDPR Managing Risk HTML CIO SQL Server cache Television Rental Service Fiber-Optic Database Cabling Mobile Security Staffing Google Wallet Organize Video Conferencing WannaCry Web Server Telephone System Windows XP Point of Contact Digital Signature Tech Hypervisor Books Workers Software License Trends Society Holidays Upselling Communitications Corporate Profile Administrator Multi-Factor Security Cost Displays Fileless Malware Hybrid Cloud Time Management Freedom of Information Modem Strategy Devices Micrsooft Proxy Server Azure Video Surveillance Assessment SharePoint Supercomputer Fraud Tactics Saving ZTime Tip of the week Worker UTM Content Recycling Drones PDF Electronic Medical Records Transportation Google Calendar Analytic Term Capital Personal Information Productuvuty Financial 3D Printing Printers Managing Stress Regulation Internet Service Provider CrashOverride

toner1