Some 90s computer brands are the same as today, but a lot more companies played in the field than now. Profit margins were higher then, so industry consolidation wasn’t the matter of survival that it is now.
In some ways, 1985 was a really pivotal year for computing. The industry was changing fast, but in 1985, many relics from the past were still present even as we had an eye for the future. Here’s a look back at computers in 1985 and what made that year so interesting.
I think 1985 was interesting in and of itself, but it also made the succeeding years a lot more interesting. A surprising amount of the technology that first appeared in 1985 still has an impact today.
As a security professional, I talk to a lot of people about common security attacks and countermeasures. I’m not always certain the people I’m talking to know what these things mean. I am almost certain they aren’t willing to ask.
I know it’s more complicated than it was when I took my Security+ exam a decade ago. The stakes are much higher now. The attacks I had to identify caused inconvenience, but someone conducting a successful smurf attack on your printer won’t get you in the headlines. Today’s attacks will.
Consumer routers drive security professionals like me crazy. I’m happy to say I finally found a router that doesn’t drive me nuts. I want you to buy an Asus RT-AC66U. I’m going to tell you why, and I’m going to tell you how to configure it. Here’s how to set up an Asus RT-AC66U and how to optimize an Asus RT-AC66U.
What happened to Packard Bell? It ceased operations in the United States in 2000, after a 14-year reign of terror on the consumer market.
But there’s more to the story than that. The Packard Bell story is a brilliant piece of marketing. The computers were terrible, but the marketing was as good as it gets. And that’s one of the reasons people remember it as one of the more prominent of the 90s computer brands, even if they don’t usually remember it fondly.
People frequently ask me for a list of common or useful Commodore 64 commands, including disk drive commands. Since the C-64’s built in operating system is more of a combination command line/Basic interpreter, it takes some getting used to if you didn’t grow up with it.
These commands assume a stock, unmodified C-64, freshly powered on. Many fast-load cartridges, ROM replacements, or so-called DOS wedge programs include shortcuts for these commands. But these commands work on any C-64 with a disk drive, modified or stock.
I get a lot of questions about the DD-WRT firewall. There’s a lot of talk out there that goes deep into theory and advanced firewall usage, but what if you just want to know how to set up your firewall to protect your network and open up a few ports?
Here’s how to set that up.
Note: If you have multiple DD-WRT boxes running as access points like I do, only the one directly plugged into the Internet needs to be configured this way. Disable the SPI firewall on your internal access points.