Two dumb comedians debate everything from God to Wrestling with the guest moderator declaring a winner.
…
continue reading
DRM Podcasts
Dirt Rd Muzic presents a station for up and coming independent artists of all genres around the world. Send your MP3's/audio file's to [email protected], subject Attn: Official Cool Breeze.
…
continue reading
Welcome to our first podcast, we are talking about DRM and Diablo III
…
continue reading
Ideas Worth Seeing promotes videos, films, and shorts by up-and-coming visual artists. We also interview innovative ideas that leverage the digital age.
…
continue reading
I'm Tim French and I think video game preservation is important. As is accessibility to those games. This art form is stunted by short-sighted business decisions and gamers who don't expect enough out of their purchases. This podcast is my contribution to the conversation around this exciting yet frustrating industry. We will cover emulation, piracy, FOMO (Fear of Missing Out), monetization, DRM, internet requirements, etc. I will define what it means for a game to be Virtually Immortal. Sup ...
…
continue reading
Podcast with various Video Game developers as well as other people involved in entertainment such as TV/Film
…
continue reading
This is the Self-Directed Research Podcast! Our hosts, James and Amos, host hyper focused technical deep dives Visit sdr-podcast.com/ for more information about the podcast, check out all episodes and learn about who we are and how to support us! Questions, comments, interested in sponsoring? Send an email to [email protected]
…
continue reading
The A+ Audio Course is your full-spectrum audio study guide for the CompTIA A+ certification (Core 1 and Core 2). Whether you're brand new to IT or brushing up before exam day, this podcast breaks down every topic in the official exam objectives into clear, structured, and accessible episodes. Each lesson focuses on what matters most—helping you understand, retain, and apply essential IT concepts, from hardware and networking to operating systems, security, troubleshooting, and professional ...
…
continue reading
Replays from various shows on DRR Hits 1
…
continue reading
Hello and welcome to my new podcast for movie opinions and my views on upcoming movies and how Studios are doing with their movies my episodes will be shorter than 10 minutes but may run longer depending on the topic
…
continue reading
Inspiring Conversations with Changemakers & Unsung Heroes: Discover the Power of Impactful Stories in The Navin Purohit Show Welcome to The Navin Purohit Show, where we celebrate extraordinary individuals who are creating meaningful change in our society! This podcast goes beyond the headlines to spotlight unsung heroes, innovators, and influencers who are shaping the world around us. Join Navin Purohit as he dives deep into candid conversations with remarkable guests, exploring their unique ...
…
continue reading
The vidcast that strives to tell the truth about important subjects.
…
continue reading
Podcast by Microsoft Canada
…
continue reading
The only video game podcast that almost never talks about video games. Enjoy! :)
…
continue reading
A bi-weekly discussion of legal, policy, and other issues in the open source and software freedom community (including occasional interviews) from Brooklyn, New York, USA. Presented by Karen Sandler and Bradley M. Kuhn.
…
continue reading
Advancing Health Systems in Low and Middle Income Countries Podcast. This podcast series aims to help listeners appreciate why health finance and governance must be addressed when working to improve health outcomes, and will include episodes which delve into the dynamics of topics like domestic resource mobilization for health, expanding access to healthcare through insurance, and the importance of “good governance” in creating responsive, patient-centered health systems. The Health Finance ...
…
continue reading

1
Bhopal DRM Pankaj Tyagi ने भारतीय रेलवे के आधुनिकीकरण का खुलासा किया | The Navin Purohit | Podcast
27:58
27:58
Play later
Play later
Lists
Like
Liked
27:58Bhopal DRM Pankaj Tyagi ने भारतीय रेलवे के आधुनिकीकरण का खुलासा किया | The Navin Purohit | Podcast Bhopal के DRM Pankaj Tyagi भारतीय रेलवे के आधुनिकीकरण के दृष्टिकोण को साझा करने के लिए The Navin Purohit Show में शामिल हुए और इस बात पर प्रकाश डाला कि तेज़ी से विकसित हो रहे भारत की माँगों को पूरा करने के लिए यह कैसे बदल रहा है। भाप इंजनों के विकास स…
…
continue reading

1
The Navin Purohit Show में Senior IPS Officer Riyaz Iqbal से खास बातचीत | Podcast
26:03
26:03
Play later
Play later
Lists
Like
Liked
26:03The Navin Purohit Show में IPS Officer Riyaz Iqbal के जीवन की झलक दिखाते हुए, उनके अटूट समर्पण और दृढ़ता की दुनिया में कदम रखें। यह प्रेरणादायी वार्ता आपके लिए वर्दीधारियों द्वारा सामना की जाने वाली चुनौतियों, ज़िम्मेदारियों और सफलताओं पर एक विशेष बातचीत लेकर आया है। नक्सलवाद से निपटने से लेकर कानून प्रवर्तन में Artificial Intelligence (A.I.) जैसी …
…
continue reading

1
The Navin Purohit Show में PWD मंत्री राकेश सिंह से खास बातचीत | Podcast
34:00
34:00
Play later
Play later
Lists
Like
Liked
34:00जानें कि कैसे Madhya Pradesh ने Jabalpur में भारत का सबसे लंबा केबल-आधारित फ्लाईओवर बनाकर एक अभूतपूर्व उपलब्धि हासिल की! The Navin Purohit Show के इस विशेष एपिसोड में, Navin Purohit, वरिष्ठ BJP नेता और Madhya Pradesh के PWD मंत्री राकेश सिंह के साथ एक विचारोत्तेजक बातचीत में इस प्रतिष्ठित बुनियादी ढांचा परियोजना के पीछे की दृष्टि, चुनौतियों और अभिन…
…
continue reading

1
BJP क सकटमचक Dr. Narottam Mishra स खस बतचत The Navin Purohit Show Podcast
26:34
26:34
Play later
Play later
Lists
Like
Liked
26:34BJP के "संकटमोचक" Dr. Narottam Mishra से खास बातचीत | The Navin Purohit Show | Podcast Madhya Pradesh के पूर्व गृह मंत्री और भारतीय जनता पार्टी (BJP) के एक प्रतिष्ठित नेता डॉ. नरोत्तम मिश्रा के एक विशेष और विचारोत्तेजक एपिसोड के लिए The Navin Purohit Show में हमारे साथ जुड़ें। BJP के "संकटमोचक" कहे जाने वाले डॉ. मिश्रा भारतीय राजनीति में नेतृत्व, स…
…
continue reading

1
Chhattisgarh सरकार के स्वास्थ्य मंत्री श्री श्याम बिहारी जायसवाल
30:38
30:38
Play later
Play later
Lists
Like
Liked
30:38Chhattisgarh स्वास्थ्य असमानता से कैसे निपट रहा है! | The Navin Purohit Show | Podcast Chhattisgarh में स्वास्थ्य असमानता को दूर करने के लिए क्या कदम उठाए जा रहे हैं? जानिए "The Navin Purohit Show" पर, जहाँ Chhattisgarh सरकार के स्वास्थ्य मंत्री श्री श्याम बिहारी जायसवाल जी के साथ एक प्रेरणादायक वार्ता हुई। इस विशेष बातचीत में उन्होंने स्वास्थ्य से…
…
continue reading

1
#194 - GOG Interview On Game Preservation, DRM, Japanese Laws, Stop Killing Games.......
1:01:48
1:01:48
Play later
Play later
Lists
Like
Liked
1:01:48GOG is a digital distribution platform with a mission to preserve video games. I spoke with 3 employees Piotr(Senior PR), Marcin (Senior Business Developer) and Adam(Technical Producer). #gog #gamepreservation #pcgaming SOCIAL MEDIA WEBSITE - https://www.gog.com/en/ X - @GOGcom NOTE: Unfortunately the guys had some technical and internet issues, so…
…
continue reading

1
Episode 138: Scripting and Remote Access — .bat, RDP, SSH, Risks
11:42
11:42
Play later
Play later
Lists
Like
Liked
11:42Automating tasks and supporting systems remotely are part of modern IT workflows. In this episode, we begin with scripting—specifically .bat and PowerShell scripts—and explain how they’re used to automate routine tasks like file transfers, user creation, or system reboots. Then we introduce remote access tools like R D P and S S H, showing how they…
…
continue reading

1
Episode 137: Handling Confidential Materials
11:10
11:10
Play later
Play later
Lists
Like
Liked
11:10Protecting sensitive data requires not only digital safeguards but also physical and procedural awareness. This episode teaches you how to properly handle confidential information, whether it's on printed documents, storage devices, or screens. We cover methods like locked cabinets, badge-restricted rooms, and screen privacy filters to prevent unau…
…
continue reading

1
Episode 136: Communication and Customer Service Skills
10:58
10:58
Play later
Play later
Lists
Like
Liked
10:58Technical skills are vital, but soft skills are what turn technicians into trusted professionals. This episode focuses on communication techniques that improve user experiences and foster trust. We start with active listening—how to give users your full attention and confirm your understanding through paraphrasing and clarification. Then we cover t…
…
continue reading

1
Episode 135: Data Privacy and Licensing — DRM, Chain of Custody
12:06
12:06
Play later
Play later
Lists
Like
Liked
12:06This episode explores the legal and ethical responsibilities of handling data and software in IT environments. We start with licensing—understanding the difference between OEM, volume, and subscription licenses, and how misuse can result in compliance violations. Then we discuss Digital Rights Management (DRM), which limits copying or modifying med…
…
continue reading

1
Episode 134: Environmental Controls — Ventilation, Disposal, MSDS
12:14
12:14
Play later
Play later
Lists
Like
Liked
12:14Maintaining the physical environment around IT systems is just as important as managing the systems themselves. This episode begins with ventilation and cooling requirements—how airflow affects server performance, what happens when heat builds up, and how to monitor environmental thresholds. We explain how to position equipment in racks, monitor fo…
…
continue reading

1
Episode 133: Safety Procedures — ESD, Handling, Fire Safety
12:10
12:10
Play later
Play later
Lists
Like
Liked
12:10Keeping yourself and your equipment safe is foundational to effective IT work. This episode covers essential safety practices beginning with Electrostatic Discharge (E S D) prevention—why grounding matters and how to properly use wrist straps, mats, and anti-static bags. We explain how improper handling can damage sensitive components like CPUs, RA…
…
continue reading

1
Episode 132: Backup and Recovery Methods — GFS, 3-2-1, Testing
12:00
12:00
Play later
Play later
Lists
Like
Liked
12:00This episode focuses on the backup strategies and data recovery techniques that every IT professional must know. We begin with the Grandfather-Father-Son (GFS) backup rotation model, explaining how it balances data redundancy and storage space. Then we dive into the 3-2-1 rule—keeping three copies of your data, on two different media types, with on…
…
continue reading
Change is a constant in IT, but managing that change responsibly is what keeps systems stable. This episode introduces the formal change management process, starting with the identification of proposed changes and their potential impact on systems, users, and business operations. You’ll learn about documentation requirements, stakeholder approvals,…
…
continue reading

1
Episode 130: IT Documentation Types — AUP, SOP, Diagrams
12:39
12:39
Play later
Play later
Lists
Like
Liked
12:39There’s more than one kind of documentation in I T, and this episode explains the major types that appear on the A Plus exam. We start with Acceptable Use Policies (AUPs), which define what users are permitted to do with company devices and networks. These documents are key to setting boundaries and providing grounds for enforcement. Next, we cover…
…
continue reading

1
Episode 129: Asset and Inventory Management
12:14
12:14
Play later
Play later
Lists
Like
Liked
12:14Keeping track of hardware, software, and configuration data is vital for organizations of all sizes, and this episode explores how asset and inventory management supports that effort. We begin with physical asset tracking—using labels, barcodes, and location databases to monitor laptops, desktops, and peripherals. Then we move into software invento…
…
continue reading

1
Episode 128: Documentation and Ticketing Systems
13:14
13:14
Play later
Play later
Lists
Like
Liked
13:14This episode focuses on the importance of clear, consistent documentation in every phase of IT support. We begin by explaining ticketing systems—how they track user requests, service histories, resolutions, and follow-up actions. You’ll learn what makes a good ticket entry, including timestamps, concise descriptions, and links to previous cases. We…
…
continue reading

1
Episode 127: Domain 4.0 Operational Procedures — Overview
13:55
13:55
Play later
Play later
Lists
Like
Liked
13:55The final domain in the Core 2 exam is Operational Procedures, and this episode introduces its wide-ranging content. You’ll learn what this domain includes: documentation standards, safety procedures, communication skills, licensing and privacy concerns, and basic scripting. While these topics may seem non-technical, they are just as important for …
…
continue reading

1
Episode 126: Mobile Malware — Rooted Devices, Data Leaks, Ads
14:05
14:05
Play later
Play later
Lists
Like
Liked
14:05Malware isn’t limited to desktops. In this episode, we explore the types of malicious threats that target mobile devices. We begin with adware, spyware, and malicious apps that gain access to sensitive permissions—like camera, microphone, or SMS—without the user’s knowledge. Then we explain the concept of rooting or jailbreaking, which removes manu…
…
continue reading

1
Episode 125: Mobile App Issues — Crashing, Connectivity, Updates
13:54
13:54
Play later
Play later
Lists
Like
Liked
13:54Mobile devices introduce their own unique troubleshooting challenges, particularly when it comes to application behavior. In this episode, we start with app crashes—why they happen, how to review logs or force close misbehaving apps, and what steps to take before uninstalling. Then we examine connectivity issues within apps, such as those that rely…
…
continue reading

1
Episode 124: Malware Removal Steps — Quarantine, Clean, Restore
12:45
12:45
Play later
Play later
Lists
Like
Liked
12:45Successfully removing malware requires following the right sequence, and this episode lays out that process according to CompTIA’s expectations. We begin with identification—recognizing that malware is present—followed by isolating the system from the network to prevent spread. Then we quarantine the malicious files using antimalware software and p…
…
continue reading

1
Episode 123: PC Security Symptoms — Alerts, File Changes, Redirection
13:56
13:56
Play later
Play later
Lists
Like
Liked
13:56Security issues don’t always come with flashing warnings—sometimes they hide behind subtle behavior. This episode helps you identify the symptoms that often indicate malware or unauthorized access. We begin with security alerts—both real and fake—and how to distinguish between legitimate warnings and scareware popups. Then we cover unexplained file…
…
continue reading

1
Episode 122: Repair Techniques — SFC, Reimage, Rollback
14:00
14:00
Play later
Play later
Lists
Like
Liked
14:00When something breaks in Windows, there are several tools you can use to restore functionality, and this episode breaks them down step by step. We begin with the System File Checker (SFC), which scans and repairs corrupted or missing system files using known-good versions. Next, we explain DISM and when to use it alongside or instead of SFC to fix …
…
continue reading

1
Episode 121: Windows Symptoms — BSOD, Boot Issues, Low Memory
13:35
13:35
Play later
Play later
Lists
Like
Liked
13:35This episode covers some of the most common and dramatic symptoms you'll face when troubleshooting Windows systems. We begin with the infamous Blue Screen of Death—also known as BSOD—explaining what causes it, how to interpret error codes, and what logs or tools to use when diagnosing the issue. Then we move into boot problems, such as systems gett…
…
continue reading

1
Episode 120: Domain 3.0 Software Troubleshooting — Overview
13:48
13:48
Play later
Play later
Lists
Like
Liked
13:48Troubleshooting software problems is a core responsibility in IT, and this episode introduces Domain 3.0 of the Core 2 exam. You’ll learn what kinds of software issues are covered, including application crashes, boot problems, security alerts, and general OS instability. We explain how this domain connects to others, such as security and user suppo…
…
continue reading

1
Episode 119: Data Disposal and Destruction Techniques
13:08
13:08
Play later
Play later
Lists
Like
Liked
13:08Properly disposing of storage media is a critical part of data security, and this episode outlines the methods you need to know. We begin with data wiping—using software to overwrite existing files—and explain why a single delete or format isn’t enough. Then we move on to degaussing, which uses magnetic fields to scramble data on hard drives and ma…
…
continue reading

1
Episode 118: Mobile and Embedded Device Security
15:11
15:11
Play later
Play later
Lists
Like
Liked
15:11Mobile and embedded devices require a tailored approach to security, and this episode explains how to apply protections without compromising usability. We begin with passcodes, biometrics, and auto-lock timers as primary defenses. Next, we explore mobile device management (MDM), including how organizations use it to enforce encryption, remotely wip…
…
continue reading

1
Episode 117: Workstation Security Best Practices
15:11
15:11
Play later
Play later
Lists
Like
Liked
15:11Securing a user’s workstation is about more than antivirus—it involves a full spectrum of proactive configurations. This episode outlines best practices for maintaining a secure endpoint. We begin with patch management, including automatic updates and reboot scheduling, then move to account management, such as disabling unused accounts and enforcin…
…
continue reading

1
Episode 116: User Account Controls and SSO
14:20
14:20
Play later
Play later
Lists
Like
Liked
14:20In this episode, we cover two important mechanisms for managing user access and security: User Account Control (UAC) and Single Sign-On (SSO). We begin with UAC—how it prompts users before executing administrative tasks, how to configure its sensitivity level, and what role it plays in limiting malware execution. Understanding UAC’s purpose and beh…
…
continue reading

1
Episode 115: OS Security Settings — Defender, BitLocker, NTFS
15:29
15:29
Play later
Play later
Lists
Like
Liked
15:29Securing a system starts with built-in operating system tools, and this episode walks you through three key Windows security features. First is Windows Defender, which provides real-time protection against malware, network attacks, and unwanted software changes. We explain how to configure scanning, quarantines, and exclusion lists. Next is BitLock…
…
continue reading

1
Episode 114: Threats and Vulnerabilities — Zero-Day, SQLi, XSS
14:20
14:20
Play later
Play later
Lists
Like
Liked
14:20This episode explains the technical underpinnings of some of the most dangerous threats and vulnerabilities in modern systems. We start with zero-day exploits, where attackers take advantage of unknown software flaws before patches can be released. These are especially damaging because traditional defenses often can’t detect them. Next, we explore …
…
continue reading

1
Episode 113: Social Engineering — Phishing, Impersonation, Tailgating
13:40
13:40
Play later
Play later
Lists
Like
Liked
13:40Not all threats are technical—some are psychological. This episode focuses on social engineering attacks, which trick users into revealing information or granting access through manipulation rather than code. We start with phishing, covering both traditional email attacks and newer variants like spear phishing and smishing. You’ll learn what signs …
…
continue reading

1
Episode 112: Detection and Prevention — Antivirus, Firewalls, Education
14:01
14:01
Play later
Play later
Lists
Like
Liked
14:01Preventing malware infections involves more than just scanning files—it’s about layering multiple defenses. In this episode, we start with antivirus and antimalware software, explaining how they use signature detection, heuristic analysis, and behavioral monitoring to stop threats. We describe how these tools are managed, updated, and configured fo…
…
continue reading

1
Episode 111: Malware Types — Virus, Worms, Keyloggers, Rootkits
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49This episode dives into the various types of malicious software, or malware, that technicians must be able to recognize and address. We begin with viruses, which attach to legitimate files and require user interaction to spread, then move into worms, which self-replicate across networks and can bring down systems without any user action. We explain…
…
continue reading

1
Episode 110. Authentication — RADIUS, TACACS+, Kerberos
12:52
12:52
Play later
Play later
Lists
Like
Liked
12:52Authentication protocols ensure that users are who they say they are, and this episode covers three of the most important ones for the A Plus exam. We begin with RADIUS—Remote Authentication Dial-In User Service—and explain how it centralizes authentication for wireless and VPN access. Next, we look at TACACS Plus, a Cisco-designed protocol that se…
…
continue reading

1
Episode 109: Wireless Protocols — WPA2, WPA3, TKIP, AES
12:33
12:33
Play later
Play later
Lists
Like
Liked
12:33Wireless security standards are a frequent source of exam questions, and this episode breaks down the differences between key protocols. We start with WPA2 and WPA3, explaining how each provides encryption and authentication for wireless traffic, and why WPA3 is considered more secure with protections like forward secrecy and better brute-force res…
…
continue reading

1
Episode 108: Active Directory — Group Policy, Scripts, Domains
12:19
12:19
Play later
Play later
Lists
Like
Liked
12:19This episode introduces Active Directory (AD), Microsoft’s central system for managing users, computers, and security in domain-based environments. We explain how AD organizes resources into domains, trees, and forests, and how Group Policy Objects (GPOs) are used to enforce settings across multiple systems automatically. You'll learn about domain …
…
continue reading

1
Episode 107: Logical Security — MFA, ACLs, Tokens
12:33
12:33
Play later
Play later
Lists
Like
Liked
12:33In this episode, we move into the digital layer of defense, exploring logical security techniques that help ensure users access only what they’re authorized to. We start with multi-factor authentication (MFA), detailing its components—something you know, have, or are—and why it’s so effective. Then we look at access control lists (ACLs), which defi…
…
continue reading

1
Episode 106: Physical Security — Locks, Guards, Surveillance
11:46
11:46
Play later
Play later
Lists
Like
Liked
11:46Protecting physical assets is the first line of defense in cybersecurity, and this episode explores the methods used to safeguard devices and facilities. We begin with door locks, cable locks, and biometric scanners—tools used to restrict access to equipment and data. Then we move into mantraps and security guards, which provide controlled entry to…
…
continue reading

1
Episode 105: Domain 2.0 Security — Overview
12:40
12:40
Play later
Play later
Lists
Like
Liked
12:40This episode introduces Domain 2.0 of the Core 2 exam: Security. We provide an overview of the key areas covered, including physical security measures, logical access controls, malware prevention, authentication protocols, and data destruction practices. You’ll hear how CompTIA frames security as both a technical and procedural discipline that must…
…
continue reading

1
Episode 104: Partitioning, Formatting, Feature Updates
11:50
11:50
Play later
Play later
Lists
Like
Liked
11:50This episode focuses on disk setup and system maintenance—key areas tested on the A Plus exam and vital for support professionals. We begin with partitioning: the process of dividing a physical disk into logical sections. You’ll learn the difference between MBR and GPT partitioning, and how to configure primary, extended, and logical partitions usi…
…
continue reading

1
Episode 103: Installation Methods — USB, PXE, Network, ISO
12:28
12:28
Play later
Play later
Lists
Like
Liked
12:28Installing an operating system requires choosing the right method for the environment, and this episode explores all the major approaches. We start with the most familiar: bootable USB drives created using tools like Rufus or the Windows Media Creation Tool. Then we introduce PXE booting, which allows network-based installations using a centralized…
…
continue reading

1
Episode 102. OS Life Cycle and Compatibility Concerns
12:30
12:30
Play later
Play later
Lists
Like
Liked
12:30Operating systems, like all software, go through a defined life cycle—from launch to end of support—and this episode walks you through what each stage means. We begin by outlining the general stages: mainstream support, extended support, and end of life. You’ll learn how these stages affect security updates, driver support, and vendor troubleshooti…
…
continue reading

1
Episode 101: Filesystems — NTFS, exFAT, ext4, APFS
13:31
13:31
Play later
Play later
Lists
Like
Liked
13:31This episode explores the filesystems used by various operating systems, each with its own capabilities and use cases. We begin with NTFS, the default for Windows, explaining its support for file permissions, compression, encryption, and large volume sizes. Then we cover exFAT, which bridges compatibility between Windows and macOS, and is commonly …
…
continue reading

1
Episode 100: O S Types — Windows, macOS, Linux, Android
13:38
13:38
Play later
Play later
Lists
Like
Liked
13:38Not all operating systems are created equal, and this episode explores the strengths, purposes, and distinctions among the most common ones. We start with Windows—still the dominant OS in enterprise environments—and explore its versatility, support base, and administration tools. Next, we cover macOS, highlighting its tight hardware integration and…
…
continue reading

1
Episode 99: App Impact — Device, Network, Business
12:45
12:45
Play later
Play later
Lists
Like
Liked
12:45This episode focuses on the broader implications of application use and performance in business environments. We begin by analyzing how resource-hungry applications can affect system performance—leading to slow response times, overheating, or reduced battery life. We also examine how apps may consume excessive network bandwidth, resulting in conges…
…
continue reading

1
Episode 98: Installation Sources and Distribution Methods
12:59
12:59
Play later
Play later
Lists
Like
Liked
12:59Installing software isn’t just about double-clicking an installer anymore—it can come from a wide range of sources and methods. In this episode, we explore the most common installation types: local setup files, network shares, Group Policy deployment, and web-based installers. We also discuss digital storefronts like the Microsoft Store and their a…
…
continue reading

1
Episode 97. Application Requirements and Compatibility
13:01
13:01
Play later
Play later
Lists
Like
Liked
13:01Before installing software, it’s essential to confirm that a system meets the application’s requirements. This episode explains how to assess compatibility based on OS version, architecture, memory, storage, and graphics capabilities. We also cover how to interpret software documentation and compare it against system specs to avoid installation fai…
…
continue reading

1
Episode 96. VPN, Proxy, Wired, Wireless, WWAN
13:12
13:12
Play later
Play later
Lists
Like
Liked
13:12This episode explores a variety of network connection types and how they're configured or supported within a Windows environment. We begin with Virtual Private Networks (VPNs)—how they provide secure tunneling for remote access and what authentication methods are commonly used. Next, we explain proxy settings and their effect on web access and appl…
…
continue reading

1
Episode 95: IP Configuration — Static, DNS, Subnet, Gateway
13:51
13:51
Play later
Play later
Lists
Like
Liked
13:51IP addressing is the foundation of network communication, and this episode provides a deep dive into how it's configured on Windows systems. We explain how to assign a static I P address manually, including setting the subnet mask, default gateway, and primary and secondary DNS servers. Then we show how to switch back to dynamic addressing using DH…
…
continue reading