Accessing Advanced Wireless Settings for Intel Wireless Adapters

“Does it matter which wireless adapter is in my new laptop?” I get this question whenever a coworker or friend is buying a new laptop. My first answer is that it depends on what they want to do with it. … Continue Reading

Changing Your MAC Address With Intel Drivers in Windows

You probably already know that each network interface card (NIC) on a network must have a media access control (MAC) address. Each address must be unique to the network, and should be globally unique. However, you might have the need … Continue Reading

Mental Sprint and Recover by Steven Fullmer PMP

Mind you, I studied neurochemistry, but am not a practicing neuroscientist. I do however actively study leadership and productivity, and have done so for more than 30 years. During that time I have continually monitored advances in our understanding of … Continue Reading

How to Make your Linux Box a DHCP Server

This topic is of interest to readers who are desiring their Network Plus certification, or those who just like to tinker with network settings (in a safe and approved environment) and observe the results. In this blog, I will delve … Continue Reading

Windows 10 Introduction

Just finished watching a Microsoft Webcast, “What’s Next with Windows 10” with Stephen Rose and Jeremy Korst. I became a member of the ‘Windows Insider Program’ last week and downloaded a copy of the Windows 10 Technical Preview ISO file.  … Continue Reading

Enabling Hypervisor to auto start in the Boot Configuration Database (BCD)

If you are getting the following error when attempting to start a Virtual Machine (VM) in Hyper-V, Virtualization may either be not enabled in BIOS or Hypervisor was not started during your computer start up. Recently after configuring a computer … Continue Reading

Repeating and Freezing Column Headers in SSRS Tables

In this article I’ll show you how to configure a table tablix to both repeat column headers at the top of every page and freeze them while scrolling. While tablixes have properties for these things, they only work in matrix … Continue Reading

Sources of Interference and When You Should Be Concerned

What is interference? Wi-Fi operates in the license-exempt frequency bands. The main advantage of operating in these bands is that the network administrator does not need to pay a licensing fee to operate their equipment. The primary disadvantage of operating … Continue Reading

Restoring Your Original MAC Address with Intel Drivers in Windows

You probably already know that each network interface card (NIC) on a network must have a media access control (MAC) address. Each address must be unique to the network, and should be globally unique. You might have changed the MAC … Continue Reading

A Cisco solution that’s perfectly NAT-ural

If you are reaching for your CCNA R&S certification, you probably already know that configuring NAT is on the list of stuff to know. In the CCNA world, this is accomplished using dynamic NAT, or NAT pools, as one solution, … Continue Reading

Time to Recover – Rebuilding your Computer

(Part two in a series) For part one go to: Before you Rebuild your Computer (Actually, before your system fails) In my last blog, I shared suggestions that might help you to affect an efficient return to service for your … Continue Reading

Finding Rogue Wireless Access Points with Kali Linux

Many Wi-Fi network administrators have trouble dealing with unauthorized Wi-Fi access points on their networks. Users bring in their own APs so they can connect their iPad, their phone, their gaming device, even their non-approved laptops to the corporate network. … Continue Reading

How to Name Worksheets When Exporting SSRS reports to Excel

Let’s say we have the following report that shows total sales by product category by territory: When we export this report to Excel, we’d like each territory to appear in its own worksheet and each worksheet named after its territory: … Continue Reading

Finding Hidden Wireless Networks

Many Wi-Fi network administrators decide to disable SSID broadcasts. They do this, in part, in an attempt to hide their network from uninvited users. The common belief behind it is that if the network name is not being broadcast, it … Continue Reading

Preparing for the PMP Exam – 2015 update

Students ask many of the questions that lead to my blogs. They deserve the credit for good questions and valuable feedback. This time, I am actually using the input from several recently credentialed former students. Kudos to the dozen or … Continue Reading

Using Group Policy Object Preferences to modify the Screen Saver Grace Period

Within the operating system there is a delay from when the screen saver activates and the system actually locks the display requiring you to enter a password to continue working. This period of time is known as the screen saver … Continue Reading

Should you wait for 802.11ac Wave 2?

It is all about throughput: The IEEE 802.11n standard is called “high throughput”. The newer IEEE 802.11ac standard is called “very high throughput”. As the name suggests, 802.11ac enables higher throughput. Wikipedia defined throughput as “the rate of successful message … Continue Reading

Work Folders are Now Available for Windows 7

Work folders were introduced with Windows Server 2012 R2 with Windows 8.1 being the client.  Work Folders provide domain users with the ability to access corporate data from a network share whether in or out of the office.  Similar to … Continue Reading

Three Common Mistakes IT Professionals Make When Planning Their Wireless Network

Planning and deploying a wireless network for user access is considerably more difficult than implementing a wired network.  This is because every location has a unique radio frequency (RF) environment.  Even if you have offices or floors with the same … Continue Reading

Before you Rebuild your Computer (Actually, before your system fails)

Sometimes the Universe sends you a message. We don’t listen, so the Universe sends it again. And again. Until we learn. Four friends, clients, former students contacted me during my holiday time to request (beg?) assistance recovering or rebuilding their … Continue Reading