Skip to content

TechRepublic

Trending Now

Hand Holding and tapping smartphone with Gmail Logo on it with according text.
Image: Garmon/Adobe Stock
Article

How to make voice and video calls from the Gmail app

new-phishing-technique-chatbot
Image: Gstudio/Adobe Stock
Article

How cyber criminals are targeting Amazon Prime Day shoppers

Quantum qubit scheme, sciencific vector illustration.
Image: local_doctor/Adobe Stock
Article

NIST selects four encryption algorithms to thwart future quantum computer attacks

OVERHEAD Caucasian male remote working from home, having work confrence call
Image: daniilvolkov/Adobe Stock
Article

How to deploy the Jitsi Meet conferencing server with Ubuntu 22.04

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Image of Bob Eisenhardt

Bob Eisenhardt

Send Bob Eisenhardt an email

Latest from Bob Eisenhardt

  • The paycheck for an IT project vs. the cost of stress
    Project Management

    The paycheck for an IT project vs. the cost of stress

    High-stress projects can take their toll on your health. An IT contractor recalls being reminded of this life lesson during a recent Windows 7 migration project.

    Bob Eisenhardt
    Published:  June 20, 2013, 4:31 PM PDT Modified:  June 20, 2013, 4:31 PM PDT Read More See more Project Management
  • Battling the Google Redirect virus
    Security

    Battling the Google Redirect virus

    Consultant Bob Eisenhardt recounts his frustrating experience trying to track down and get rid of a client's search-redirect virus. Here's how he finally ditched it.

    Bob Eisenhardt
    Published:  January 2, 2013, 2:56 AM PST Modified:  January 2, 2013, 2:56 AM PST Read More See more Security
  • Siege warfare IT project: A cautionary tale
    Networking

    Siege warfare IT project: A cautionary tale

    Consultant Bob Eisenhardt shares how a client's simple request for a public Wi-Fi turned into a nine-month nightmare project.

    Bob Eisenhardt
    Published:  October 23, 2012, 4:27 AM PDT Modified:  October 23, 2012, 4:27 AM PDT Read More See more Networking
  • Surprise at the GoDaddy outage? Vulnerable networks are ticking bombs
    Security

    Surprise at the GoDaddy outage? Vulnerable networks are ticking bombs

    Bob Eisenhardt sees the GoDaddy outage as the tip of iceberg for vulnerable networks from banks to infrastructure. His take is pessimistic. Do you disagree?

    Bob Eisenhardt
    Published:  September 25, 2012, 11:00 PM PDT Modified:  September 25, 2012, 11:00 PM PDT Read More See more Security
  • Porn browsing at work leads to corporate security breaches
    Security

    Porn browsing at work leads to corporate security breaches

    Users accessing porn at work is a gateway for malware and ransomware that IT pros have to clean up. And if the content is also illegal, it's an even bigger problem. Bob Eisenhardt shares some tips for dealing with this issue.

    Bob Eisenhardt
    Published:  August 23, 2012, 5:17 AM PDT Modified:  August 23, 2012, 5:17 AM PDT Read More See more Security
  • Around the world in IP attacks
    Networking

    Around the world in IP attacks

    Bob Eisenhardt recently had to lock down a server that was vulnerable to IP attacks. Here is what he found out about them and his steps to resolve the problem.

    Bob Eisenhardt
    Published:  August 1, 2012, 2:00 AM PDT Modified:  August 1, 2012, 2:00 AM PDT Read More See more Networking
  • From the trenches: Troubleshooting and securing SonicWall
    Networking

    From the trenches: Troubleshooting and securing SonicWall

    Consultant Bob Eisenhardt recounts a recent experience working with a small office's SonicWall V200. If you've ever tangled with one of these devices, these tips might help.

    Bob Eisenhardt
    Published:  July 11, 2012, 6:18 AM PDT Modified:  July 11, 2012, 6:18 AM PDT Read More See more Networking
  • Don’t let car problems bring your consulting business to a halt
    Project Management

    Don’t let car problems bring your consulting business to a halt

    A road warrior IT consultant recommends applying the same troubleshooting skills to your car emergency that you would employ when confronting a downed server.

    Bob Eisenhardt
    Published:  March 31, 2012, 7:03 AM PDT Modified:  March 31, 2012, 7:03 AM PDT Read More See more Project Management
  • How much has cyber-spying changed since 1989? Not as much as you’d think
    Security

    How much has cyber-spying changed since 1989? Not as much as you’d think

    Bob Eisenhardt looks back at Clifford Stoll's classic cyber-spying true story from 1989 and poses the question, how much has really changed in the world of cyber-espionage? Not that much, as it turns out.

    Bob Eisenhardt
    Published:  February 22, 2012, 4:40 AM PST Modified:  February 22, 2012, 4:40 AM PST Read More See more Security
  • Facing down the Ramnit virus on Facebook: Tips for protection and clean-up
    Security

    Facing down the Ramnit virus on Facebook: Tips for protection and clean-up

    Bob Eisenhardt explains how the Facebook virus Ramnit works, why it's so bad, and how it can affect much more than a Facebook account.

    Bob Eisenhardt
    Published:  January 23, 2012, 4:55 AM PST Modified:  January 23, 2012, 4:55 AM PST Read More See more Security
  • 1
  • 2
  • Next
15 results

TechRepublic Premium

  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice