SSCP and CISSP are both (ISC)² certifications. I get a lot of questions about the two of them, especially about SSCP, as CISSP overshadows it.
CISSP definitely pays better, but that’s not to say SSCP doesn’t have merit.
Continue reading SSCP vs CISSP
Marx made five different type of couplers between 1934 and 1974. If you’ve never seen Marx couplers explained before, here’s a primer on how to identify them and use them together. And I even have a few repair tips if you need them.
Continue reading Marx couplers explained
What was the first successful home computer? Some people would argue it was the Apple II, the TRS-80 Model I, or perhaps even the Apple I. But I argue it was Commodore’s VIC-20.
Continue reading The first successful home computer: Commodore VIC-20
“Daniel” from “Microsoft” called me the other day. The number looked halfway legit so I picked up. He out and out claimed to be from Microsoft and said he was getting alerts from my computer. His voice sounded familiar–I think I’d talked to him before.
“Which computer?” I asked.
“Your Microsoft computer,” he said.
Continue reading I read Microsoft’s site to a “Microsoft” scammer
Insurance companies are starting to offer discounts if you plug one of their devices, often called a RightTrack or SnapShot, into your car’s ODB2 port.
One of my college buddies asked me about them when his insurance company offered his family a 5% discount to plug these into their cars, and then make them eligible for up to another 25%. Those are compelling numbers. So what are the potential drawbacks?
Continue reading Pros and cons of RightTrack or SnapShot devices
I’ve talked before about replacing a power cord on a transformer, but for whatever reason, I forgot to mention a cheap source of replacement power cords that also provide a safety improvement.
Use a 3-prong computer power cord.
Continue reading Putting a 3-prong grounded plug on a transformer
I was trying to install some software last week and I got an NSIS error like the one to the right. The message certainly suggests corrupt downloads, but corrupt downloads are relatively rare, and when they happen, redownloading it ought to clear that up. Getting two of these failures in a row with different programs is really a freak occurrence, so I started looking for another problem.
Continue reading Solve the NSIS error
CP/M was, as you probably know, the first popular microcomputer operating system. It was good but imperfect, and its cryptic command for copying files, PIP, is often cited as an example.
Copy makes sense. Even the Unix equivalent, cp, makes sense–it’s copy without the vowels. But what does PIP mean? What’s the origin of CP/M’s PIP command?
Continue reading Origin of CP/M’s PIP command
A friend shared something about toxic blogs last week, which got me thinking to a change I made to how I find a writing topic last fall, when I set out to make my own blog less toxic.
When I write, I keep one question in mind: Is this going to help one person a week for the next several years, if not decades?
Continue reading How I find a writing topic