This course will teach participants about installing and configuring Python, syntax, importing, statements, types, strings, booleans, files, lists, tuples, comprehensions, functions, and classes.
Technology Goblins and Heroes
Did you know rootkits allow viruses and malware to “hide in plain sight” as they continue to compromise your machine? Resident ransomware and malware expert, Thomas Zucker-Scharff, penned this piece to help you identify these bugs and effectively exterminate them.
You can never be too careful when trying to secure your data and information, especially against ransomware attacks. Review this helpful article on different ways to prevent these threats before they can hit.
Some critics like to villainize technology and its influence on young, blossoming minds. But member Sean Lockwood disagrees and explains how technology can not only help improve education methods, but make learning more accessible to everyone in the future.
Active Directory clutter got you down? With this helpful, visual guide you receive step-by-step instructions for uncluttering unused services, users, and computer accounts from your company’s AD infrastructure.
Grab Bag of Goodies
What are the greatest takeaways from Apple’s latest software update? Community Apple expert, Justin Pierce, dives into his 5 favorite new features that can greatly improve a user’s tech lifestyle. Check them out in his recap of the iOS 11 release.
It’s been a busy couple months for VMware at Experts Exchange. To further explore this piece of technology—its evolution, its future, and how to focus a career on it—we spoke with community member and VMware expert, Andrew Hancock.
Orlando officials and Microsoft worked together to keep the much-anticipated tradeshow on schedule as expected. The turnout was fantastic, the energy was vibrant, and we found some fantastic must-have products.
What is your scariest tech experience and how did you solve it? Participate in our Tech or Treat concert to tell us your tale and be entered to win amazing prizes!
Our generous community donated toward hurricane relief efforts in an amount totaling $3,000. We partnered with CompTIA to triple the donation.
Image reaching middle age before learning you were adopted. That’s just what happened to our resident Marketo guru’s father. Read how technology helped in their quest to uncover his roots.
Curiosity Favors Those in Tech
Data Encryption—what is it, and what does it do? Check out this informational guide to better understand how data encryption works and why it’s important for protecting your personal data.
Ever heard the saying “too many cooks in the kitchen”? When it comes to designing and implementing UX sessions, that phrase often rings true, for stakeholders and designers may often be on different pages.
Imagery is a strong tool of persuasion in the arsenal of an advertiser and marketer, but not all imagery is created equal. In this helpful article, member Jasmine Williams provides great information on what visual tactics work best in campaigns and why.
BSOD, also known as the Blue Screen of Death, is a common looming threat in the life of a Windows user. While it can feel debilitating, it doesn’t have to be. Read this article to learn how to mitigate this problem.
Tricky New Updates
Top 5 Posts
New Featured Partners
Need a product that uses identity information for access while also enforcing strong security protection? Check out Okta.
Are you ready for the disaster of a ransomware attack? Prepare today with a recovery plan. CloudBerry Lab will show us how to create a disaster-proof recovery plan that will save time, money, and tears.
Storing data in the cloud? You’re ahead of the curve! Did you also know that multicloud storage is a vital part of cloud storage options? Nimble Storage teaches us how to explore multicloud options in cloud migration plans.
Tired of receiving multiple updates from us? We heard you! Later this month, Experts Exchange is launching Decoded, a one-stop shop for product updates, the latest Course of the Month, site tips and tricks, and any other special announcements you need to know.
|Password Synchronization from one Active Directory Domain to another using DSInternals||105|
|How to create an Intelligent Password Policy for Active Directory||331|
|Improve the Security of Software With These 4 Courses||227|
|Recover Exchange Mailbox Folder From EDB File – SysTools Exchange Recovery Tool||130|