Blog

Home/Blog/
28 01, 2016

Use SSH to Create an HTTP Proxy on AWS

By |January 28th, 2016|Categories: AWS, Cloud Server, EC2, Linux, SSH|0 Comments

I am writing this article because a friend of mine wants to watch his daughter's competition event in Europe live online from Canada but the site restricts the traffic to local IP addresses only. Since Amazon Web Services (AWS) offers 11 regions world wide and soon (as of January 2016), the closest one to central Europe [...]

10 12, 2015

Quad monitor setup for Windows 10

By |December 10th, 2015|Categories: Uncategorized|0 Comments

For the longest time, I used my desktop with a large monitor to do all my network and system diagrams. I had to keep switching back and forth when I needed to access information from the web. I figured 2 monitors would be a lot more convenient since I have MS Visio running on one [...]

9 10, 2014

7 ways to optimize your iPhone battery life

By |October 9th, 2014|Categories: smartphone|0 Comments

As technology keeps evolving, so does battery technology but it doesn't evolve quickly enough to keep up with new technology, apps and gadgets. As for the iPhone, as its design gets slimmer, less space is available for battery. Any merely intensive iPhone user will charge their phone every couple days (if not daily). Here are [...]

18 09, 2014

TOP 10 Cloud Tools for the Ultimate Professional!

By |September 18th, 2014|Categories: Tech Support|Tags: , |0 Comments

Is it technology that saves or wastes our time or is it the way we use it? Revised on: May 30, 2015 When it comes to technology, I prefer using the best of all worlds. I discovered a winning combination of tech tools that I use for myself and my clients that make life a lot easier [...]

17 04, 2014

Are you still panicking about the heartbleed bug?

By |April 17th, 2014|Categories: Tech Support|0 Comments

If you don't have the time to change all your passwords online, it's OK! There is ONLY 1 that you ABSOLUTELY must change for now and that is your PRIMARY email Account because if someone gets access to that account, they have access to all your other accounts online. The email Accounts that were affected [...]