Tag Archives: admin

Microsoft struts YouTube-style video streaming for enterprises

Microsoft on Tuesday announced Office 365 Video, a YouTube-like streaming service where enterprises and large organizations can post in-house video content for communication and training. […] Although Office 365 Video has elements of consumer streaming services like Google’s YouTube, it’s strictly an in-house affair: It will be available only to employees, and then only those whom IT administrators have assigned access rights. […] There’s a major snag on mobile, however, as Office 365 requires Adobe Flash. “Office 365 Video uses Adobe Flash Player for adaptive streaming and secure video delivery. To watch a video, you have to have Adobe Flash Player installed,” Microsoft stated. That means Apple’s iPhone and iPad can’t stream content from Office 365 Video. – Gregg Keizer,Computerworld
(Full Story: http://ift.tt/1uxUDH8 )

How to Find if Someone is Stealing your WiFi

2 Methods to find if any other devices are connected to your Wifi. […][O]ne of the most popular and Effective Tool Called Who’s On my Wifi. The Best part is its available for Free. And it Does its Job Quite well. […] You will then be Shown the list of Devices that are Connected to your Wifi, Then you may Analyze and identify which device you trust. After its Done, just Click on save changes. You Can keep the Program Running the background so that everytime someone tries to Connect to your Wi-Fi, You will Get the Notification instantly. It will Keep you Informed every time.

Your router’s administrative console can help you find out more about your wireless network activity and change your security settings. To log into the console, go to your router’s IP address. […] All routers are different, but once you’re in yours, you’ll want to look for a section related to connected devices. This could be called “Attached Devices” (Netgear) or “My Network” (Verizon routers), It should provide a list of IP addresses, MAC addresses, and device names (if detectable) that you can check against. Compare the connected devices to your gear to find any unwanted users. – Trickslove

(Full Story: http://ift.tt/1zt8kqY )