Author Archives: ronald.nutter

The Pocket Troubleshooter – Product Review iFixit Toolkit

I will be the first to admit that I love my tools. One can never have enough tools. The trick is having the right tools. It seems like more and more devices like to use their own “special” screws or … Continue reading

Posted in Pocket Troubleshooter | Leave a comment

The Pocket Troubleshooter – Vastar Lan Cable Tester Test Tool

More items in the home and office coming setup for network access for either firmware updates or control purposes. Having a way to test the network cable is a useful tool to have in your bag of tricks. A good … Continue reading

Posted in Pocket Troubleshooter | Leave a comment

The Pocket Troubleshooter – HDMI High Definition Cable Tester Tool

I recently started working on my next book, tentatively titled “The Pocket Troubleshooter”. Whether you are your families designated technical support person, or do it as your chosen profession, this book will be for you. With the areas of technology … Continue reading

Posted in Pocket Troubleshooter | Leave a comment

How to capture with Wireshark in VMware

You can capture traffic to/from a virtual host in VMware in a variety of ways. Keep in mind that some of the changes mentioned here may result in a brief outage while they are being put in place. I have … Continue reading

Posted in VMware | Tagged , | Leave a comment

How to Protect your Yahoo login in as little as 3 steps!

Protecting your online account is accomplished by taking a series of steps. The first step is to create a better mousetrap. That mousetrap begins creating a password that is more difficult to guess. Send to Kindle

Posted in Blog Entries | Leave a comment

Directions for Future Posts – Raspberry Pi, Vmware, Two Factor

First off, I want to apologize for the lack of new content on the site. I have been spending a good deal of time working on several books that I have released on the Kindle and on paperback. I would … Continue reading

Posted in Blog Entries | Leave a comment

ESPN reports LA Lakers Bryon Scott Instagram Account hacked

For details, please check this link – http://espn.go.com/blog/los-angeles/lakers/post/_/id/42618/lakers-scott-claims-instagram-account-was-hacked. The sad thing is that there was a good chance this could have been avoided or at least made a little harder. Learn how to protect your Instagram account in as little … Continue reading

Posted in Blog Entries, Social Media | Leave a comment

Amazon – 3 Steps to keep your account from getting hacked

Amazon is one of the more popular e-commerce companies who offer a variety of services. This is another area where you should consider implementing a strong password and two factor authentication to keep you from loosing access to Amazon. Follow … Continue reading

Posted in Blog Entries, Social Media, Two Factor Authentication | Tagged , | Leave a comment

Microsoft One Drive – 3 steps to keep your account from getting hacked

Microsoft One Drive is a cloud storage drive where you can keep files without having to worry where your flash drive is. It should be protected just like any other online account that you have. By following the steps I … Continue reading

Posted in Blog Entries, Product Reviews, Social Media, Two Factor Authentication | Tagged , | Leave a comment

GoDaddy – 3 steps to keep your account from getting hacked

GoDaddy is one of the more popular web hosting companies who offer a variety of services. This is another area where you should consider implementing a strong password and two factor authentication to keep you from loosing access to the … Continue reading

Posted in Blog Entries, Social Media, Two Factor Authentication | Tagged , | Leave a comment