CT Southwest Austin - FAQ

512-394-9115



Do I have to have a WiFi password (encryption key)?

Posted on: 03/26/2015 | by: Danny Bryce

I must I admit while this question is one we frequently get, I was actually inspired to write this after the CSI Cyber episode that air last night.   In the show, black hat hackers have figured out ways to control and start a fire with your electronic devices.  At one of the crime scenes one of […]

Continue Reading

What does the FCC net neutrality mean to us?

Posted on: 03/05/2015 | by: Danny Bryce

The quick answer is I do not know.  More my opinion is actually mixed as to whether is it a good things or a bad thing.  I’ve seen some arguments on both sides of the fence here.  This going to probably get a little political which I try to avoid in most my Business discussion.  […]

Continue Reading

What is a proxy servers?

Posted on: 03/04/2015 | by: Danny Bryce

In a business a proxy server is typically used to pass all internet access through.  The proxy server provide multiple function.   Web sites that are commonly browsed are cached to the server making access to the sites faster.  Even with as fast as the internet has gotten accessing files from a local server is still way faster then […]

Continue Reading

Is it legal to monitor the use of a computer (or phone)?

Posted on: 03/03/2015 | by: Danny Bryce

Through use of software it is possible to monitor everything done on a computer.  Everything from email, to social media post, to web browsing, even capturing every keystroke.   There are a great number of reasons why you might want to do this, but is it legal?   Well, before we actually answer this question lets put out […]

Continue Reading

Can I get a virus from a Web page?

Posted on: 02/27/2015 | by: Danny Bryce

The short answer is yes.  This can actually happen a couple of different ways.   There are actually sites that sole and only purpose is to distribute malware.  However even valid/legitimate websites can also become “poisoned”.  A poisoned website is just a website that a been infected with malware. As a user just browsing the web going to one of […]

Continue Reading

What is a VPN?

Posted on: 02/27/2015 | by: Danny Bryce

VPN, Virtual Private Networking, is a establishing an encrypted tunnel over the internet between two sites or a client workstation to a site.   It allows you to use shared network resources (files stored on a server) over the internet but more securely.   It works by sending everything between the two points encrypted.   In many ways […]

Continue Reading

What is a Peer to Peer Network

Posted on: 02/27/2015 | by: Danny Bryce

Peer To Peer is a networking protocol (rules) that allows the sharing of your computer resources typically files and printers with other computer but without a “true server”. Each “node” (computer) in a peer to peer network can at as server or client or both. All devices are “peers”. Generally it is limited to your […]

Continue Reading

What is a P2P?

Posted on: 02/27/2015 | by: Danny Bryce

A P2P is a play on a Peer to Peer network. While sometimes these two terms are incorrectly used synonymously, they actually are very different.  Both involve the ability to share files.  A key difference is that P2Ps allow and promotes sharing of files across the internet. Whereas Peer To Peer, is local area network […]

Continue Reading

What is a Bit Torrent

Posted on: 02/27/2015 | by: Danny Bryce

Bit Torrent is a file distribution methodology for sharing files across the internet. Like other file sharing services, the Bit Torrent service does not actually store the file but maintains a catalog of the “member network” and the files that member has. When you’re looking for a file you search the Bit Torrent and it […]

Continue Reading

What is an Install Routine or Program?

Posted on: 02/27/2015 | by: Danny Bryce

When you add a program to your computer you typically need to install it.  The install routing is a program that does that.  It is program that installs other programs on your computer.  It copies or creates the different components and/or files to your computer, creates registry entries, might verify the product key or serial […]

Continue Reading

Newsletter Sign-Up

  • Get our exclusive offers, tips and news delivered right to your inbox

  • This field is for validation purposes and should be left unchanged.