Qolsys IQ Panel: How to do Software Updates

Today we’re gonna show you just how easy it is to update the software on the IQ Panel. The IQ Panel can receive updates making sure you have the latest and greatest software on your system. Start by swiping down to access your settings tray and touch the Wi-Fi icon to make sure you’re connected…

New Features of Symantec Endpoint Protection 12.1

We all know the Internet is a nasty place, and enterprises need lots of different kinds of protection to keep from getting infected or compromised. That’s where version 12.1 of Symantec’s Endpoint Protection comes in handy. It is a powerful and full-spectrum collection of various security applications for all of your endpoint PCs. We are…

The Avigilon H4 Fisheye Camera – 360-Degree Panoramic Experience

In video surveillance, visual evidence doesn’t always come at you straight on. It comes from all angles. The left, the right or even behind you. With the new Avigilon H4 Fisheye Camera Line, we’ve got you covered from every angle. The H4 Fisheye Camera, offers a high resolution, high frame rate, 360-degree panoramic view with…

Mac Security Camera Viewer Software for iDVR-PRO CCTV DVRs

The new IDVR Pro video surveillance DVRs are Mac compatible. Macintosh users can log in to view their security cameras remotely via web browser or via the Mac DVR viewer software. In this video, I’ll demonstrate the live remote camera viewing capability from a Mac using the DVR viewer software that is included. First thing…

LGR – History of DRM & Copy Protection in Computer Games

Anytime I mention copy protection or DRM in my videos, it’s a given that someone will email me asking what the big deal is. Or, if they already know what DRM is, they’re curious about old-school copy protection methods. If you fall into either camp, or are simply bored as balls and want something to…

Discover and protect sensitive data with Windows Defender ATP and Microsoft Information Protection​

[MUSIC]>>More cyberattacks are after your most valuable assets: your data and your critical customer information. Users are storing, receiving and generating sensitive data on their endpoints every day, often without being monitored or protected. When an attack happens, your organization may not know the full extent of what’s been impacted. To address this issue, Windows…