Blog

  • Week 10 – Protecting My Data

    Week 10 – Protecting My Data

    These days, we keep a lot of personal information on our phones, laptops, and other devices. Many of which are portable and easy to lose. With that in mind, it’s worth taking some basic steps to protect your data, especially by using encryption. You don’t need to be super tech-savvy, just a few smart choices can go a long way.

    Start with your devices. Turn on full-disk encryption on your laptop and smartphone. If someone gets their hands on your device, this keeps your files locked down. Windows (with BitLocker) and macOS (with FileVault) make it easy, and most phones now come with encryption enabled by default.

    If you use cloud storage, encrypt any files that contain sensitive info—things like financial records, medical details, or ID documents. Services like Google Drive and Dropbox don’t offer full end-to-end encryption, so you can use tools like Cryptomator or VeraCrypt to secure those files before uploading.

    For messaging, apps like Signal or WhatsApp offer end-to-end encryption, which keeps your conversations private.

    And don’t forget the basics: use strong, unique passwords and store them in a password manager—most include encrypted storage for notes and documents, too.
    A little effort goes a long way when it comes to protecting your data.

  • Week 9 – Simple Steps To Secure Your Mobile

    Simple Steps To Secure Your Mobile

    These days, our phones carry just about everything, including photos, texts, banking info, and more. That’s why keeping your device secure isn’t optional, it’s a must. Here are five simple tips to help protect your phone and your personal information:

    1. Lock it down with a strong passcode or biometrics.
    Skip the easy PINs like “1234” or your birthday. Go with a longer passcode, a pattern lock, or better yet—use fingerprint or face recognition if your phone supports it.

    2. Don’t skip updates.
    Yes, they’re annoying, but those software updates often fix security holes that hackers love to exploit. Set your phone to update automatically so you don’t have to think about it.

    3. Stick to trusted apps.
    Only download apps from the Apple App Store or Google Play. Be wary of apps with few downloads, sketchy permissions, or bad reviews.

    4. Turn on “Find My Device.”
    If your phone ever goes missing, this feature can help you track it down—or wipe your data remotely to keep it safe.

    5. Use a VPN on public Wi-Fi.
    Free Wi-Fi might be convenient, but it’s not always safe. A VPN adds a layer of protection when you’re browsing on unsecured networks.

  • Week 8 – DHCP What?

    DHCP What?

    DHCP (Dynamic Host Configuration Protocol) makes the IP address setup of devices on a network easy. Instead of having to set up the IP address of each device manually, a DHCP server can do so automatically based on free IP addresses on that network. Think of a DHCP server as a city planner. The city is a network, and the planner is the one who assigns each plot an address so mail can be delivered to it. A DHCP server does the same, only it provides each device with an address with the goal of delivering data.  

    The DHCP process involves a client device broadcasting a request for an IP address. The DHCP server responds by offering an IP, the client requests to use it, and the server acknowledges it, leasing the address for a certain time. This dynamic leasing ensures efficient use of IP addresses, allowing them to be reused when devices disconnect.

    This automatic process saves time and avoids mistakes that can happen when assigning IP addresses manually, especially as networks get bigger. Besides IP addresses, DHCP also gives devices other important information they need to work on the network, like the subnet mask, default gateway, and DNS server.

  • Week 7 – Why Virtualize?

    Why Virtualize?

    Virtualization has become a popular choice for both everyday users and businesses, and for good reason. By separating the operating system from the physical hardware, virtualization lets you run several virtual machines on one server. This means you can experiment with a new OS, use older software, or test apps without needing extra computers. It’s a smart way to save on hardware expenses and cut down energy costs.

    Another major perk is how simple it makes backing up and recovering data. Since a virtual machine is basically a file, making snapshots or full backups is quick and easy. If something goes wrong, you can restore the system to an earlier state in moments, which is a huge time-saver for developers, system administrators, and anyone aiming to minimize downtime.
    Virtualization also boosts security because each virtual machine runs isolated from the rest. So, if one VM faces a problem, it doesn’t affect the others. This separation makes it safe to test new or suspicious software without risking the entire system.

    All in all, virtualization offers flexibility, cost savings, better security, and easier management, making it a powerful tool for today’s IT needs.

  • Week 5 – The Registry

    Week 5 – The Regisry

    The Windows Registry is a critical database in the Windows operating system that stores low-level settings for the operating system and applications. Think of it as a centralized database where configuration data is organized in a tiered structure, resembling folders and files. Registry keys are the folders that hold the files, which are registry values.

    Every time you install software, change system settings, or tweak your desktop appearance, those changes are often recorded in the registry. It allows the operating system to remember what was done so that it can be restarted.

    The registry is divided into several root keys, such as HKEY_LOCAL_MACHINEand HKEY_CURRENT_USER, which serve different purposes. HKEY_LOCAL_MACHINEcontains settings that apply to all users, while HKEY_CURRENT_USER holds preferences specific to the currently logged-in user.

    Changes in the registry can be risky if one does not know exactly what they are changing. A single wrong modification can cause system instability or prevent Windows from booting. That’s why it’s always recommended to back up the registry before making changes.

  • Week 4 – Whats Driving Your Hardware?

    Week 4 – Whats Driving Your Hardware?

    Have you ever thought about how your computer’s parts, like your keyboard, printer, or game controller, all work together, even if they come from different manufacturers? The secret lies in programs called device drivers. Device drivers are small but powerful programs that let your operating system communicate with hardware devices. They act as translators, converting the OS’s general instructions into specific commands that each device understands. Without drivers, your computer wouldn’t know how to interact with external hardware.

    Every hardware component, whether it’s a printer, graphics card, or game controller, needs its own driver. For example, when you press “print,” the operating system doesn’t talk to the printer directly. Instead, it sends the request to the printer driver, which translates the instruction into something the printer can execute. The same goes for gaming: when you push your controller’s joystick to the left, drivers help the OS understand that movement and reflect it in the game.

  • Week 3 – The Two CPU Makers

    The Two CPU Makers

    If you’re shopping for a processor, chances are you’ll end up choosing between Intel and AMD, the two most common brands for consumers. They’ve both been around for decades and have earned their reputations by powering everything from low-power budget-friendly computers to high-end gaming rigs and workstations.
    Intel has a reputation for strong performance in tasks that rely on fast single-core speed, like gaming. Their popular Core i3, i5, i7, and i9 series make it easy to identify a chip based on your performance needs and budget. Intel chips are also known for solid power efficiency and high clock speeds, which results in consistent performance during usage.
    For AMD, their Ryzen processors offer more cores and threads at competitive prices, making them a great choice for content creators, streamers, and people who do a lot of multitasking. Where there was once a performance gap between Intel and AMD, it has lessened with AMD’s focus on this multitasking market.
    Both brands have something to offer, and the right pick comes down to what you need your computer to do. Whether it’s gaming, editing, or everyday use, while both do have a history with a specific targeted user, both offer options that will work for everyone. It’s not too uncommon, though, for some to stick to a specific brand out of loyalty earned from previous versions of their chips they have used.
     

  • Week 2 – Motherboards

    The Motherboard – Your Computers Connector

    While there are many components within a computer, none bring all others together to function as one, like the motherboard. Acting like a nervous system, it links the CPU, RAM, storage drives, graphics cards, and other peripherals. Like your nervous system facilitating the sending of data from what you are touching to your brain, the motherboard acts the same in the computer, allowing data and power to flow from the hard drive to the CPU and then to the graphics card to be displayed.

    Beyond physical connections, motherboards also determine compatibility, such as what type of processor (Intel or AMD) and memory (DDR4 or DDR5) you can use. Features like built-in WiFi, Bluetooth, and M.2 slots for fast SSDs add further value. With the vast array of manufacturers and component types, it’s very important to check and make sure each component is compatible with your motherboard. In many cases, it is best to take stock of what components you want to include in your computer and what they need, and then tailor your motherboard choice based on that.

  • Week 1 – Introduction

    Hello everyone, I am Pat.

    While I have grown up around computer technology my whole life, and even worked in IT customer service for a while, I have no formal degrees or certifications in anything. What I do know is from the school of “necessity to figure it out”. Need to save a few bucks to afford a quality computer by ordering separate parts and assembling myself? I researched what goes where and how to put everything together. Need to set up a blog for a college course? I looked up how to set up a subdomain and install a blog on it. Through this summer’s course, as I am offered more structured information to learn, I will use this space to discuss what I find interesting currently in the IT industry.