Blogs, Videos and Articles

SuperVPN and GeckoVPN Security Breach

The user records of popular VPN services have reportedly been compromised, and millions of user data are now offered for sale [...]

How to network boot computers over ethernet with TFTP

An introduction video explaining how to boot computers and laptops etc over ethernet. The ability to boot devices over a network is [...]

How to setup Microsoft 365 spam filter policies

Microsoft (Office) 365 has many settings available to setup anti-spam policies which are probably overlooked and left unconfigured. In [...]

An introduction to Casilium, an open source ticket system

Sheridan Computers are an IT Support Company based in Manchester. As an IT Support company, or a Managed Service Provider (MSP), [...]

Untangle z4 Security Gateway Appliance overview

Unboxing of the Untangle z4 security appliance (official hardware), including basic installation and setup / overview of the prodct.

How to get started with multi-factor authentication

Multi-factor authentication (MFA) is an increasingly popular way to add an extra layer of security to your online accounts. With MFA, [...]

How to install Arch Linux with full disk encryption

I have recently installed Arch Linux on a few machines to replace Microsoft Windows. I am installing it one more time with the goal of [...]

What is a password manager and why you should use one

A password manager is a software program that helps you create and manage strong, unique passwords for all of your online accounts. It [...]

Windows 10 control panel missing, create a shortcut icon

It's no secret that Microsoft are trying to get rid off the classic control panel within Windows 10, with the latest update of [...]