A Cisco solution that’s perfectly NAT-ural

If you are reaching for your CCNA R&S certification, you probably already know that configuring NAT is on the list of stuff to know. In the CCNA world, this is accomplished using dynamic NAT, or NAT pools, as one solution, … Continue Reading

Time to Recover – Rebuilding your Computer

(Part two in a series) For part one go to: Before you Rebuild your Computer (Actually, before your system fails) In my last blog, I shared suggestions that might help you to affect an efficient return to service for your … Continue Reading

Finding Rogue Wireless Access Points with Kali Linux

Many Wi-Fi network administrators have trouble dealing with unauthorized Wi-Fi access points on their networks. Users bring in their own APs so they can connect their iPad, their phone, their gaming device, even their non-approved laptops to the corporate network. … Continue Reading

How to Name Worksheets When Exporting SSRS reports to Excel

Let’s say we have the following report that shows total sales by product category by territory: When we export this report to Excel, we’d like each territory to appear in its own worksheet and each worksheet named after its territory: … Continue Reading

Finding Hidden Wireless Networks

Many Wi-Fi network administrators decide to disable SSID broadcasts. They do this, in part, in an attempt to hide their network from uninvited users. The common belief behind it is that if the network name is not being broadcast, it … Continue Reading

Preparing for the PMP Exam – 2015 update

Students ask many of the questions that lead to my blogs. They deserve the credit for good questions and valuable feedback. This time, I am actually using the input from several recently credentialed former students. Kudos to the dozen or … Continue Reading

Using Group Policy Object Preferences to modify the Screen Saver Grace Period

Within the operating system there is a delay from when the screen saver activates and the system actually locks the display requiring you to enter a password to continue working. This period of time is known as the screen saver … Continue Reading

Should you wait for 802.11ac Wave 2?

It is all about throughput: The IEEE 802.11n standard is called “high throughput”. The newer IEEE 802.11ac standard is called “very high throughput”. As the name suggests, 802.11ac enables higher throughput. Wikipedia defined throughput as “the rate of successful message … Continue Reading

Work Folders are Now Available for Windows 7

Work folders were introduced with Windows Server 2012 R2 with Windows 8.1 being the client.  Work Folders provide domain users with the ability to access corporate data from a network share whether in or out of the office.  Similar to … Continue Reading

Three Common Mistakes IT Professionals Make When Planning Their Wireless Network

Planning and deploying a wireless network for user access is considerably more difficult than implementing a wired network.  This is because every location has a unique radio frequency (RF) environment.  Even if you have offices or floors with the same … Continue Reading

Before you Rebuild your Computer (Actually, before your system fails)

Sometimes the Universe sends you a message. We don’t listen, so the Universe sends it again. And again. Until we learn. Four friends, clients, former students contacted me during my holiday time to request (beg?) assistance recovering or rebuilding their … Continue Reading

Wireless Networking for the IT Professional. Now Available at Interface Technical Training

Why IT professionals need to understand wireless Wireless networks are becoming increasingly more important to all organizations, from  mall mom and pop stores, to major corporations. It is forecasted that by 2018 wireless devices will account for 61% of IP … Continue Reading

The Best Anti-Phishing Tool in the Enterprise… Is Free!

Phishing is a combination of social engineering and technology that tries to trick users into disclosing sensitive information. You’re probably already familiar with the stereotypical Nigerian Prince email – an unsolicited email from an unknown sender identifying himself as a … Continue Reading

Configuring Windows 8 1 Mobility Center and How to Turn it On and Off

Video – Configuring Windows 8 1 Mobility Center Video transcription Steve Fullmer:   In our Windows 8.1 deployment courses, we often share information about the Windows 8.1 Mobility Center. Mobility Center was introduced for mobile and laptop devices in Windows … Continue Reading

PMP Procurement – Rent vs Buy Decisions

Video – PMP Procurement – Rent vs Buy Decisions Video transcription Steve Fullmer: As students prepare for the Project Management Professional (PMP) Certification, one of the areas upon, which there is an intense focus, perhaps we’ll call it a volume … Continue Reading

CCNA R&S prep, GNS3 1.x, and Router-on-a-stick!

Have you had a chance to build some projects in the new rev of GNS3?  If you have not done so yet, I would highly recommend heading over to GNS3 and downloading it.  In this blog I will presume that you … Continue Reading

Installing and Configuring Network Address Translation (NAT) on your Host Computer to connect Virtual Machines running on an internal Hyper-V Virtual Switch

If you are running your virtual machines in an internal network and you need to provide them with internet or connectivity to your corporate network there are a couple different solutions.   One solution is to use your host computer as … Continue Reading

Installing and Configuring Network Address Translation (NAT) on a Virtual Machine to connect Virtual Machines running in an Internal or a Private Hyper-V Virtual Switch

If you are running your virtual machines in an Internal or a Private network and you need to provide them with internet or connectivity to your corporate network there are a couple different solutions.  One solution is to use a … Continue Reading

Using Custom Code in SSRS

While expressions allow you to use limited VB.Net to create advanced dynamic functionality in your SQL Server Reporting Services (SSRS) reports, custom code allows you to leverage much more of the power of VB.Net. The focus of this article is … Continue Reading

Checking and Changing Adobe Flash Camera and Mic Settings in Windows

Adobe Flash gets used for a ton of web-based media applications, from game streaming to web conferences to online training courses. Here at Interface we use a Flash-based application called Adobe Connect for our remote student connections. Even though HTML5 … Continue Reading