ReddingITPro

Technical Blog of Jason Olson

Dad needs a new computer?!

One of the banes of most IT Professionals is when family members ask for help with purchasing a computer, or worse yet, they just purchased something from a big-box retailer

Read More

Scotch Box – Dead simple Web Development

EDIT: March 2020 – Scotch Box is no longer actively maintained so please take a look at the following post which described how to use Cognac Box which is currently

Read More

Configuring a basic Road Warrior OpenVPN Virtual Private Network Tunnel

If you’re a road warrior like me, you’re often accessing the internet from insecure hotspots. All traffic that traverses an open wireless connection is subject to inspection, but furthermore even

Read More

W32/autorun.worm.aaeb-h Outbreak

I don’t typically post on virus or malware outbreaks because it would consume too much of my time and they are simply too frequently created. For the most part, if

Read More

Hashed Passwords

Something making a lot of news in the papers recently is compromised usernames and passwords. This has been seen from companies such as LinkedIn, Yahoo and DropBox. In some of

Read More

Finding unused user accounts in active directory

Periodically it is a good idea to audit/review your user accounts in Active Directory to find unused accounts. This helps find terminated employees you might not know about, or role

Read More

The tools I use…

Here are some of my favorite applications I have installed on my computer, and often install right away, in no particular order: Microsoft Office Professional Plus – This is the

Read More

Any user can unlock now with this custom GINA

This Article is Now Outdated: Since the introduction of Windows 10, reliable multi-user switching is supported in the business environment. It is retained for historical purposes. From the folks over

Read More

HIPAA Compliance & Faxing

The primary objective of HIPAA is that health organizations have the infrastructure and procedures – administrative, technical and physical – that allow them to safeguard patient health information from any

Read More

Encrypted E-mail Solutions

Here is some information on setting up secure e-mail encryption with outside parties. There are basically two options available. Prices can vary based on the selected vendor and the information

Read More