Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of Bob Eisenhardt

Bob Eisenhardt

Send Bob Eisenhardt an email

Latest from Bob Eisenhardt

  • The paycheck for an IT project vs. the cost of stress
    Project Management

    The paycheck for an IT project vs. the cost of stress

    High-stress projects can take their toll on your health. An IT contractor recalls being reminded of this life lesson during a recent Windows 7 migration project.

    Bob Eisenhardt
    Published:  June 20, 2013, 4:31 PM PDT Modified:  June 20, 2013, 4:31 PM PDT Read More See more Project Management
  • Battling the Google Redirect virus
    Security

    Battling the Google Redirect virus

    Consultant Bob Eisenhardt recounts his frustrating experience trying to track down and get rid of a client's search-redirect virus. Here's how he finally ditched it.

    Bob Eisenhardt
    Published:  January 2, 2013, 2:56 AM PST Modified:  January 2, 2013, 2:56 AM PST Read More See more Security
  • Siege warfare IT project: A cautionary tale
    Networking

    Siege warfare IT project: A cautionary tale

    Consultant Bob Eisenhardt shares how a client's simple request for a public Wi-Fi turned into a nine-month nightmare project.

    Bob Eisenhardt
    Published:  October 23, 2012, 4:27 AM PDT Modified:  October 23, 2012, 4:27 AM PDT Read More See more Networking
  • Surprise at the GoDaddy outage? Vulnerable networks are ticking bombs
    Security

    Surprise at the GoDaddy outage? Vulnerable networks are ticking bombs

    Bob Eisenhardt sees the GoDaddy outage as the tip of iceberg for vulnerable networks from banks to infrastructure. His take is pessimistic. Do you disagree?

    Bob Eisenhardt
    Published:  September 25, 2012, 11:00 PM PDT Modified:  September 25, 2012, 11:00 PM PDT Read More See more Security
  • Porn browsing at work leads to corporate security breaches
    Security

    Porn browsing at work leads to corporate security breaches

    Users accessing porn at work is a gateway for malware and ransomware that IT pros have to clean up. And if the content is also illegal, it's an even bigger problem. Bob Eisenhardt shares some tips for dealing with this issue.

    Bob Eisenhardt
    Published:  August 23, 2012, 5:17 AM PDT Modified:  August 23, 2012, 5:17 AM PDT Read More See more Security
  • Around the world in IP attacks
    Networking

    Around the world in IP attacks

    Bob Eisenhardt recently had to lock down a server that was vulnerable to IP attacks. Here is what he found out about them and his steps to resolve the problem.

    Bob Eisenhardt
    Published:  August 1, 2012, 2:00 AM PDT Modified:  August 1, 2012, 2:00 AM PDT Read More See more Networking
  • From the trenches: Troubleshooting and securing SonicWall
    Networking

    From the trenches: Troubleshooting and securing SonicWall

    Consultant Bob Eisenhardt recounts a recent experience working with a small office's SonicWall V200. If you've ever tangled with one of these devices, these tips might help.

    Bob Eisenhardt
    Published:  July 11, 2012, 6:18 AM PDT Modified:  July 11, 2012, 6:18 AM PDT Read More See more Networking
  • Don’t let car problems bring your consulting business to a halt
    Project Management

    Don’t let car problems bring your consulting business to a halt

    A road warrior IT consultant recommends applying the same troubleshooting skills to your car emergency that you would employ when confronting a downed server.

    Bob Eisenhardt
    Published:  March 31, 2012, 7:03 AM PDT Modified:  March 31, 2012, 7:03 AM PDT Read More See more Project Management
  • How much has cyber-spying changed since 1989? Not as much as you’d think
    Security

    How much has cyber-spying changed since 1989? Not as much as you’d think

    Bob Eisenhardt looks back at Clifford Stoll's classic cyber-spying true story from 1989 and poses the question, how much has really changed in the world of cyber-espionage? Not that much, as it turns out.

    Bob Eisenhardt
    Published:  February 22, 2012, 4:40 AM PST Modified:  February 22, 2012, 4:40 AM PST Read More See more Security
  • Facing down the Ramnit virus on Facebook: Tips for protection and clean-up
    Security

    Facing down the Ramnit virus on Facebook: Tips for protection and clean-up

    Bob Eisenhardt explains how the Facebook virus Ramnit works, why it's so bad, and how it can affect much more than a Facebook account.

    Bob Eisenhardt
    Published:  January 23, 2012, 4:55 AM PST Modified:  January 23, 2012, 4:55 AM PST Read More See more Security
  • 1
  • 2
  • Next
15 results

TechRepublic Premium

  • TechRepublic Premium

    Mobile app development policy

    PURPOSE The purpose of this policy from TechRepublic Premium is to provide guidelines for developing mobile applications from a security, procedural and best practices standpoint. While it contains technical guidelines, it is not intended to serve as a programming guide but as a framework for operations. This policy can be customized as needed to fit ...

    Published:  March 29, 2023, 12:00 PM EDT Modified:  March 30, 2023, 4:43 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    New client audit checklist

    PURPOSE This checklist from TechRepublic Premium provides a method for auditing and documenting a client site and assembling an inventory of systems and software, as well as giving you a framework for developing recommendations, applying costs to them, and storing all that information in one file. Tracking client contact details, circuit information, network equipment, cloud ...

    Published:  March 29, 2023, 12:00 PM EDT Modified:  March 30, 2023, 4:54 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Hiring kit: Community engagement manager

    PURPOSE Recruiting a community engagement manager with the right combination of experience and communication skills will require a comprehensive screening process. This hiring kit from TechRepublic Premium provides a flexible framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY ...

    Published:  March 28, 2023, 12:00 PM EDT Modified:  March 29, 2023, 10:12 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Hiring kit: Chief experience officer

    PURPOSE Successful chief experience officers combine excellent communications skills with an intimate knowledge of customer expectations, company operations and industry standards. This hiring kit from TechRepublic Premium provides a workable framework you can use to find, recruit and ultimately hire the best candidate for CXO of your organization. From the hiring kit: DUTIES AND RESPONSIBILITIES ...

    Published:  March 28, 2023, 12:00 PM EDT Modified:  March 29, 2023, 10:26 AM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice