Skip to content

TechRepublic

Trending Now

Laptop featuring MuleSoft Logo.
Image: Adobe Stock
Article

MuleSoft Connect 2022: Automation fuels digital transformation

Hacker in data security concept. Hacker using laptop. Hacking the Internet. Cyber attack.
Image: Adobe Stock
Article

The business of hackers-for-hire threat actors

Opensea NFT non-fungible token marketplace
Image: Proxima Studio/Adobe Stock
Article

Data breach of NFT marketplace OpenSea may expose customers to phishing attacks

Internet technology concept
Image: tippapatt/Adobe Stock
Article

Best IT management software for 2022

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Image of jcmcintyre

jcmcintyre

Send jcmcintyre an email

Latest from jcmcintyre

  • How do I… Use BootVis to improve XP boot performance?
    Microsoft

    How do I… Use BootVis to improve XP boot performance?

    BootVis.exe is a free Microsoft utility that can help users boot their machines and access the operating system more quickly. Jim McIntyre shows you how it works.

    jcmcintyre
    Published:  July 22, 2008, 5:37 AM PDT Modified:  July 22, 2008, 5:37 AM PDT Read More See more Microsoft
  • SolutionBase: Linux gets a desktop publishing solution with Scribus
    Open source

    SolutionBase: Linux gets a desktop publishing solution with Scribus

    Desktop publishing has long been an area where Linux lacked decent applications. This article describes how to use Scribus to handle desktop publishing tasks in Linux.

    jcmcintyre
    Published:  February 16, 2005, 12:00 AM PST Modified:  July 26, 2007, 8:01 AM PDT Read More See more Open source
  • Protect against spyware and adware with Spybot
    Security

    Protect against spyware and adware with Spybot

    Here's how you can use Spybot to put an end to spyware and adware on clients' desktops.

    jcmcintyre
    Published:  May 3, 2004, 12:00 AM PDT Modified:  June 8, 2007, 9:51 AM PDT Read More See more Security
  • Get IT Done: Access NT Terminal Server remotely with rdesktop or PXES
    Hardware

    Get IT Done: Access NT Terminal Server remotely with rdesktop or PXES

    Install and run rdesktop and PXES in order to better connect to Windows NT/2000 Terminal Server from Linux clients.

    jcmcintyre
    Published:  June 25, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:43 AM PDT Read More See more Hardware
  • Safely delete Linux files with libtrash
    Open source

    Safely delete Linux files with libtrash

    Deleting files in Linux usually pushes you to the point of no return, with no hope of retrieving any files you may have accidentally deleted. But there is a way to get deleted files back, thanks to the freeware utility libtrash.

    jcmcintyre
    Published:  June 4, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:42 AM PDT Read More See more Open source
  • Step-By-Step: Use BootVis to improve XP boot performance
    Microsoft

    Step-By-Step: Use BootVis to improve XP boot performance

    Learn to use BootVis.exe, a free Microsoft utility, to help users boot their machines and access the operating system quickly

    jcmcintyre
    Published:  May 15, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:41 AM PDT Read More See more Microsoft
  • Configure IT Quick: Mount SAMBA and NetWare volumes with pam_mount
    Data Centers

    Configure IT Quick: Mount SAMBA and NetWare volumes with pam_mount

    Learn how to mount NetWare, Samba, and other network shares on Linux by using the pam_mount module.

    jcmcintyre
    Published:  May 7, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:41 AM PDT Read More See more Data Centers
  • Build a recovery floppy for your Linux system with tomsrtbt
    Open source

    Build a recovery floppy for your Linux system with tomsrtbt

    What do you do when your Linux system won't boot? Panic? Weep? Start sending out resumes? If you have a boot floppy, you can use it to restart your system and figure out what's wrong.

    jcmcintyre
    Published:  April 9, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:40 AM PDT Read More See more Open source
  • Connect to Windows with RDC client for Mac OS X
    Microsoft

    Connect to Windows with RDC client for Mac OS X

    Most large companies have at least some Macintosh computers on their networks, if only in graphics departments. If you need those Macs to be able to access Windows applications, Microsoft's Remote Desktop Connection client for Mac can help.

    jcmcintyre
    Published:  April 7, 2003, 12:00 AM PDT Modified:  June 8, 2007, 9:41 AM PDT Read More See more Microsoft
  • Lock IT Down: Simplify spam filtering with SpamAssassin
    Security

    Lock IT Down: Simplify spam filtering with SpamAssassin

    Learn how to install and configure one of the best Linux/UNIX spam filtering systems available.

    jcmcintyre
    Published:  December 27, 2002, 12:00 AM PST Modified:  June 8, 2007, 9:31 AM PDT Read More See more Security
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
59 results

TechRepublic Premium

  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice