The Pocket Troubleshooter – Product Review iFixit Toolkit

I will be the first to admit that I love my tools. One can never have enough tools. The trick is having the right tools. It seems like more and more devices like to use their own “special” screws or ones that are not used frequently enough to have a tool that can be found in your local hardware store or electronics supply house.
iFixit is a name I first heard when they advertised on Leo Laporte’s podcast network. I saw the potential of what their tools could do but I didnt see a need for them personally at that point. Little did I know that a few years later I would. The frustration began slowly where I started running into more and more situations where I didn’t have the right tool to work on a device and wasn’t able to find the tool easily.
As the screws got smaller, keeping them together when they were removed. This is where the one of the features of the iFixit Toolkit saved me from loosing some screws that would have been very difficult to replace. The lid that covers the assortment of 64 bits had a series of grids or pockets inside the underside of the lid. The grid can be used in a variety of ways. You can keep each type of screw in its own pocket or you can use a pocket for each area of the device that you are working on.
The quality of the metal used in the different bits was the first thing that got my attention. My biggest complaint with other tools that I have had is that I started getting metal shaving appearing shortly after using one or more of the bits. These bits didn’t show that same problem. As I understand it, these tools were designed by the folks at iFixit for their own use and then realized there would be a market for this tool (and others that would follow later).
If the device that you are working on has some small metal pieces that you need to keep track of while working on it, the iFixit toolkit has you covered. The driver kit is attached to the tool roll by a large magnet sheet. You can easily detach the bit kit and use that magnet to keep those pesky little metal pieces from getting scattered when you move your hand without touched anything.
There are a host of tools in this toolkit. You may never use some of them or not use them frequently. There are a variety of tools that may not seem like there is any use for. Watching some of the teardown guides can help you see how to use some of the tools, potentially in ways that you might not have thought about. I had to work on a laptop recently and ran into a challenge where I had removed the screws from the chassis but couldn’t remove the lower cover. The “Jimmy” tool helped in the process of separating the lower cover from the rest of the housing.
One of the tools that is included is something that I should be using more than I do. The Anti-Static Wrist Strap is something that is important to use when working on electronics. It helps to avoid sudden static charge that depending on the design of the device you are working on could prove fatal to the device. The tweezers can prove helpful in retrieving a screw or other small part from an area that isn’t friendly to having your fingers trying to do that job. There are a several different tweezers included in the kit that should let you get just about anything out of a small area.

To see first hand what this troubleshooting tool can do, I have created a special playlist on my TechBytes with Ron Nutter YouTube channel. Please click on the icon on the left to see that video. Future videos on for this book will be placed in this same playlist. When the book is released, the links will be in there as well so they will be close by.

Clicking on this button will send you to Amazon where you can buy one for your collection. Full Disclosure – This is an affiliate link where I will receive a small commission for the purchase. This will not raise or lower the price you pay for the tool. Any purchase is appreciated!

To see other posts in this series, click on this link – http://www.ronnutter.com/pocket

Send to Kindle
Posted in Pocket Troubleshooter | Leave a comment

The Pocket Troubleshooter – Vastar Lan Cable Tester Test Tool

More items in the home and office coming setup for network access for either firmware updates or control purposes. Having a way to test the network cable is a useful tool to have in your bag of tricks. A good deal of the problems I have had with network devices sometime end up with a bad or questionable cable being the problem. This tool is very affordable and not break the bank to have it ready when you need it. There are two different settings that you can use when checking a cable, the default setting walks through each wire in the connection. The setting labeled S walk through things at a little slower pace. This is a basic cable tester that checks you check for basic cable wiring. For short cable run situations, this is usually where I have found most of the problems I have run into.

Continue reading

Send to Kindle
Posted in Pocket Troubleshooter | Leave a comment

The Pocket Troubleshooter – HDMI High Definition Cable Tester Tool

I recently started working on my next book, tentatively titled “The Pocket Troubleshooter”. Whether you are your families designated technical support person, or do it as your chosen profession, this book will be for you. With the areas of technology seem to be a little on the gray side, you may end up doing a little of everything. For something to be included in this book, it has to be able to fit in your pocket. Understand, that with anything, the definition of how big a pocket is may be a little lax at times. The main thing is that you dont always need a fancy tool that costs thousands or tens of thousands of dollar to do something quickly that a $20 tool can do just as well. Now off to the first installment of my new book.

Continue reading

Send to Kindle
Posted in Pocket Troubleshooter | Leave a comment

How to capture with Wireshark in VMware

You can capture traffic to/from a virtual host in VMware in a variety of ways. Keep in mind that some of the changes mentioned here may result in a brief outage while they are being put in place. I have yet to have that happen to me in a production situation but it could happen.

1) Directly on host

This is just like you were running on an actual physical host. While this might be the easiest way of getting a packet capture done, it might not be possible because you may not have access to the machine due to a variety of reasons. if you can directly capture at a host, make sure that you plenty of disk space. Depending on the type of problem you may need to diagnose, you may need a good amount of disk space to get the information you are looking for.

Continue reading

Send to Kindle
Posted in VMware | Tagged , | Leave a comment

How to Protect your Yahoo login in as little as 3 steps!

yahoo_logoProtecting your online account is accomplished by taking a series of steps. The first step is to create a better mousetrap. That mousetrap begins creating a password that is more difficult to guess.

Continue reading

Send to Kindle
Posted in Blog Entries | Leave a comment

Directions for Future Posts – Raspberry Pi, Vmware, Two Factor

First off, I want to apologize for the lack of new content on the site. I have been spending a good deal of time working on several books that I have released on the Kindle and on paperback. I would appreciate your input on the survey that follows to help me know what your preferences would be for future content.

Create your own user feedback survey

Send to Kindle
Posted in Blog Entries | Leave a comment

ESPN reports LA Lakers Bryon Scott Instagram Account hacked

For details, please check this link – http://espn.go.com/blog/los-angeles/lakers/post/_/id/42618/lakers-scott-claims-instagram-account-was-hacked.

The sad thing is that there was a good chance this could have been avoided or at least made a little harder. Learn how to protect your Instagram account in as little as 3 steps – http://amzn.to/1jXcBSn

Send to Kindle
Posted in Blog Entries, Social Media | Leave a comment

Amazon – 3 Steps to keep your account from getting hacked

Amazon is one of the more popular e-commerce companies who offer a variety of services. This is another area where you should consider implementing a strong password and two factor authentication to keep you from loosing access to Amazon. Follow the steps outlined here to help prevent that from happening.

Continue reading

Send to Kindle
Posted in Blog Entries, Social Media, Two Factor Authentication | Tagged , | Leave a comment

Microsoft One Drive – 3 steps to keep your account from getting hacked

Microsoft One Drive is a cloud storage drive where you can keep files without having to worry where your flash drive is. It should be protected just like any other online account that you have. By following the steps I have outlined, you will do as much as you can to keep others from trying to get into your account. If you have a Skype account and have enabled Two Factor Authentication there, you are already ready to go. The instructions are listed here with minor changes so that those who don’t use Skype but use One Drive will be able to setup this same level of protection.

Continue reading

Send to Kindle
Posted in Blog Entries, Product Reviews, Social Media, Two Factor Authentication | Tagged , | Leave a comment

GoDaddy – 3 steps to keep your account from getting hacked

GoDaddy is one of the more popular web hosting companies who offer a variety of services. This is another area where you should consider implementing a strong password and two factor authentication to keep you from loosing access to the services you are getting from GoDaddy. Follow the steps outlined here to help prevent that from happening.

Continue reading

Send to Kindle
Posted in Blog Entries, Social Media, Two Factor Authentication | Tagged , | Leave a comment