While staying at a hotel, you visit the business center and find some open computers, you then sign into gmail and print out your boarding passes or time share visit discount coupons.  But then you walk away and forget to logoff.  Now the next guy who comes along will be able to use your gmail to spam your friends and family. This guide will explain how to identify those forgotten logon sessions and how to

Read more 0

The Gmail Doctor Can Help You Lock it Down. The value of the private information contained within our Google accounts has become more valuable to hackers and identity thieves.  Not only does it have all of our private email from friends and family, but it is also a link to your banking accounts, paypal, ebay, brokerage accounts, and more. Plus your email is also valuable to hackers who would love to spam your friends.  Bad

Read more 0

Microsoft Dynamics CRM 2015 is one of Microsoft's earlier versions of Dynamics CRM server. Microsoft offers dynamics crm trials on their legacy versions.   However, you have to install it onto your own server if you want to try it out.  CRM 2015 was yet another major release in their CRM product line.  CRM started with version 2007, which was just meh, then came CRM 2011, which was a big improvement, then came CRM 2013 which was

Read more 2

ShoreTel Now that you have a Shoretel / Mitel Connect server in your own datacenter, you may find that you need to run some SQL commands within the Shoretel database. Fortunately, Shoretel uses MySQL 5.0 running on ports 4308 and 4309.  The good news is that you can use standard SQL commands to query the call database and make your own custom reports from scratch.  Here's a little DOS batchfile that will connect to the

Read more 0

What is Ping? Well, Ping is a legacy program that will send a short message to a network client, and then wait for a reply back from the client. It uses the old ICMP protocol. Will will help you solve your network problems by verifying connectivity across the network. Ping is the key to your solution. Almost any network endpoint will reply back to a ping, unless they have disabled it in the firewall.  In

Read more 0