Mattia Campagnano

Mattia Campagnano

Friday, March 28, 2014

How to create an emergency MacOsX Mavericks recovery disk on a bootable USB drive

Starting from Lion (Mac OS X 10.7), Apple operating systems no longer come with a bundled install DVD, which has been replaced by a hidden recovery partition that can be used for the same purpose. While this has surely meant a remarkable cost slashing for Apple, on the other hand it has created some inconveniences to users. It's actually pretty easy to reinstall Mac OS X from Recovery Partition, but it requires an active Internet connection in order to download the needed files from Apple servers. This is a consequence of the so-called cloud computing revolution. But, what if we need to reinstall Mac OS X without an active internet connection or we cannot access Wi-Fi from outside the operating system?
Luckily there's an easy fix for this problem: create an emergency boot disk on a bootable USB drive that will work the same way as an install DVD. 

Tuesday, March 25, 2014

XP Death - How to happily move on and what options you have

Windows XP will be discontinued starting from April 2014 and this opens tricky scenarios for individual users and companies because XP still  represents a relevant percentage of Windows-based computer around the world.
Though Microsoft will update anti-malware definitions through mid-July 2015, it will release no further updates for the operating system. This means bugs, vulnerabilities and exploits will not be fixed any longer and implies potential high liability risks for companies in case of security breaches or data loss.
Luckily there are several upgrade alternatives available.

Monday, March 24, 2014

MacOsX Mavericks- Wi-Fi keeps dropping? Here's why


Does your Wi-Fi connection often drop without any apparent reason?
Do you experience a poor wireless connection?
Does your Mac lose connectivity after being in Sleep Mode?
Luckily OS X supplies a built-in functionality that can help solve these problems in the twinkling of an eye.

Wireless Diagnostics "allows to troubleshoot and optimize a wireless network, by detecting common problems and monitoring your connection for intermittent connectivity failures" (Source: Apple). After completing its tests, it creates a report on your desktop that you can send to Apple for support.

Friday, March 14, 2014

9 Windows Command Prompt Hacks: the power of black and white.


  1. Copy/paste a file or folder to the Command Prompt: when you have to enter a command which involves a specific file/folder whose path or name is particularly lenghty or you simply don't want to enter it manually, you can drag and drop the file or folder to the Command Prompt to complete the command (Fig. 1) and then click Enter (Fig. 2).        

Thursday, March 13, 2014

How to get rid of Wi-Fi squatters with two easy steps.



Sometimes you notice that your Internet connection slows down suddenly without any apparent reason. You may think this is normal or it can be due to the number of tasks you're performing simultaneously. Sadly this is not always the actual reason for it. It may also happen when somebody squats your Wi-Fi and uses it to connect to the Internet. Luckily there are ways to address these problem and keep out these pesters for good.
  • Step 1 - The first step is to check your current IP configuration from Command Prompt by using the command Ipconfig /all (Fig. 1) (the command is ifconfig /all for Linux and Mac). From there you can recover your whole TCP/IP configuration; you'll need your IP address, your hostname, the router's IP Address and the MAC Address of your computer and of your other connected devices.
In the screenshot resulting from running the command, your MAC Address is listed as Physical Address, which makes perfect sense. MAC (Media Access Control) Address identifies physically a device (think of the equivalent of an SSN or of an ID for a human being) and, unlike the IP Address, it can't be changed (at least theoretically, as tools able to do it are currently available).

Wednesday, March 12, 2014

URL shorteners and URL unshorteners- cut it out and see it through

URL Shorteners

URL shortening is a technique allowing to transform the URL of a page, making it shorter but still directing to the original page. This is done by redirecting the connection (HTTP Redirect) to a page having a shorter domain name, which links to the original webpage.

Tuesday, March 11, 2014

Discover 6 top-notch hidden Windows 7 functionalities

  • Reliability Monitor:  This tool helps understand the reasons for a poor system performance. It creates a graph showing the reliability score of your system over a certain number of weeks (rated on a scale of 1 to 10). The graph highlights also what programs, Windows components or other items have crashed and when. To activate it, open Start/Search, look for reliability and run Reliability History (fig.1).

Monday, March 10, 2014

Windows God Mode: access 720 Windows settings with one click

Windows 7 has been designed to be more user-friendly than other Windows versions but, when you need to customize system settings, you still have to go through a series of stages, which can be time-consuming and frustrating. What if could we have all the functionalities we need listed in a single place and do it with one only click? This can be done by enabling a hidden Windows feature, called God Mode.

How to enable God Mode

Saturday, March 1, 2014

HTTPS Made Easy- what it means and why it's important for the average users.

You may have noticed, while surfing the web, that sometimes webpages look different than usual.
When you log to your email account or your bank account or you operate financial transactions (e.g. buying from eCommerce websites such as Amazon.com), you'll see that the URL of the page starts with https:// instead of http:// and that a padlock icon is displayed.

That happens because these pages utilize a more secure protocol, i.e. HTTPS.

HTTPS stands for Hypertext Transfer Protocol Secure, a protocol which utilizes encryption to protect data being transferred during an important transaction. It's active on port 443 (HTTP works on port 80) and it's based on public key cryptography. This means that on both computers involved in a data transfer a security certificate has been installed and the traffic can only be decrypted when the certificates on the two PC's match.

Related Posts Plugin for WordPress, Blogger...

Contact Form

Name

Email *

Message *