Solving IT Problems Everyday - Since 2002
Solving Tech Issues for New Jersey - Since 2002
Doing Geek Stuff for Non-Geeks - Since 2002
Providing IT Support to Businesses for Over 20 Years
Looking to Upgrade Your "Computer Guy"? Call Us.

Call or Text
732-477-4005

How To Setup Camera and Mic Passthrough For Use In Remote Desktop Services (RDS)

How To Setup Camera and Mic Passthrough For Use In Remote Desktop Services (RDS) With the growing popularity of Zoom  and Teams meeting in the workforce, we are see a lot more requests to use those services from within a terminal server (Remote Desktop Services – RDS) session. In order to successfully have a video conferencing session, […]

Launch A Remote App on a Terminal Server Using The Microsoft RDP Client

How To Launch a Remote App on a Terminal Server Using The Microsoft RDP Client This blog article will explain how you can use the Microsoft RDP client to launch a specif app (Remote App) on a terminal server rather than the full desktop environment. Prior to Windows 10, there was a Programs tab that […]

Using E-Discovery To Download All Communication Between An Internal User/Domain and An Outside Recipient/Domain

Using E-Discovery To Download All Communication Between An Internal User/Domain and An Outside Recipient/Domain This blog article will explain how you can search and export all communications (Email, Teams, Sharepoint, etc…) from your Office365 tennant for a specific internal email sender or entire internal email domain TO A specific outside email recipient or entire email domain. […]

The Power of Whitelisting: Enhancing Cybersecurity for Your Business

The Power of Whitelisting: Enhancing Cybersecurity for Your Business In the world of cybersecurity, where threats evolve constantly, businesses are perpetually in pursuit of robust defenses to shield their digital assets. Among these defenses stands a formidable strategy: “whitelisting.” This proactive security approach delineates trusted entities, applications, or processes permitted to function within a network […]

5 Reasons To Outsource Your IT Placement

5 Reasons To Outsource Your IT Placement In today’s fast-paced business environment, having a reliable and efficient IT infrastructure is crucial for success. Small and medium-sized businesses often face the challenge of building and maintaining an in-house IT department, which can be both expensive and resource-intensive. This is where outsourcing IT placement comes into play. […]

How to Disable the Windows 11 Update and Stay on Windows 10

How to Disable the Windows 11 Update and Stay on Windows 10 One of the biggest changes to Windows 10 has been the Windows Update process. Windows updates are now delivered as an UaaS (Update as a Service) platform meaning that updates are rolled out as cumulative updates on a regular basis, and you are […]

How To Quickly Free Up Disk Space on a Terminal Server

How To Quickly Free Up Disk Space on a Terminal Server If you’ve found this article, then you are experiencing the same issue on your terminal server as I have. When you have a terminal server with a lot of users, the downloads folder and recycle bin quickly fill up with unneeded documents as users work […]

How to Properly Configure NTP Time In Your AD Environment: Step by Step

How to Properly Configure NTP Time In Your AD Environment: Step by Step This article will show you step-by-step how to configure your DC with an external time source and to force all your AD clients to sync with your DC. If you’re reading this article then you probably already know that Active Directory can’t […]

How To Set an Office365 Account Password to Never Expire

How To Set an Office365 Account Password to Never Expire By default, the passwords for Office365 accounts are set to expire after 90 days. In some situation that may interfere with other applications that sends email with that account. In order to set them to never expire, the PasswordPolicies setting needs to be changed. You […]

How to Enable Auto Logon In Windows 10 Using The Registry

How to Enable Auto Logon In Windows 10 Using The Registry Usernames and passwords are a great way to protect your information in public workspaces. However, if you’re using your computer in a safe place logging in all the time can get tedious. If you want to cut through all that red tape and get […]