Earners of the CompTIA A+ certification are proven problem solvers who are able to perform critical IT support tasks including device configuration, data backup and recovery, and operating system configuration. CompTIA A+ certified professionals have demonstrated baseline security skills for IT support roles and are able to detect and remove malware, address privacy concerns, and troubleshoot core service challenges.
This badge was issued to Nicholas Shertzer on 15 May 2020.
Expires on 15 May 2023
Earners of the CompTIA Security+ certification have the knowledge and skills necessary to perform core security functions required of any cybersecurity role. CompTIA Security+ professionals know how to identify and address potential threats, attacks and vulnerabilities and they have established techniques in risk management, risk mitigation, threat management and intrusion detection.
This badge was issued to Nicholas Shertzer on 19 December 2019.
Expires on 19 December 2022
Step 1: Enable Remote Desktop on the Office PC
Set power-options high performance mode
- Start > Control Panel > search “Power”
- “Choose a Power Plan” > Show additional > choose “High Performance”
- Control Panel Home
Turn on Remote Desktop – allow connections
Microsoft Office programs such as Word, Excel, and PowerPoint, use an XML format to store various bits of information not readily seen when viewing the document as intended. This information is called metadata and it is hidden data that can contain personal information, original author usernames, tracked changes, file properties, and more. Thankfully, Microsoft includes an option to “Inspect Document” that can automatically remove this metadata before sharing the file.
Continue reading “How to Remove Metadata from Word – Office”
Presenting text messages to your legal counsel can be a difficult task. Often, these messages are tied to your phone and seem impossible to save in a sharable format. Screenshots only capture what is on the phone screen at that time. This can be very time consuming when dealing with a long conversation and instructions vary from device to device. Also, a screenshot does not always give clear information needed for court such as the parties cell numbers (relying instead on contact names) or the date and time of each message. Continue reading “How to Export SMS/MMS Text Messages for Legal Discovery”
Invitations to a shared Google Drive file or folder require a Google account to sign in to the Google Drive service. However, we can still access the Google Drive shared content by associating our existing email address with Google. Here is how.
If a file or folder has been shared to your non-gmail account, the OWNER\SENDER will see a warning stating the “recipient doesn’t have a Google account”. That is ok.
Continue reading “How to Access a Shared Google Drive without Creating a Gmail Account”
Email phishing attempts are increasing while, at the same time, their methods are getting harder to detect. Here are a few tips on how to look out for phishing emails.
Quick check that the Display Name matches the Email Address. The name displayed in email is not authenticated and can be any name the sender wishes. Make sure the email address matches what you expect by hovering over the name and click “Open Contact Card” (Outlook 365) or click “Show Details” (Gmail)
Continue reading “How to Look Out for Email Phishing”
If your Clio calendar has stopped syncing to Outlook / Google / iPhone / etc., then you may need to re-establish the Google Sync connector in Clio. To check if this is an issue that is affecting your account, go to Clio > Settings > Contact and Calendar Sync > Google Sync “Configure”.
Under “Clio Calendars”, you will find your name along with the last time it has successfully sync’d to your G Suite calendar.
In order to correct a stalled sync, follow these steps: Continue reading “Resync Clio Calendar to G Suite with Google Sync”