professorjrod@gmail.com A dead PC at the worst moment is a gut punch—unless you have a roadmap. We walk through the exact thinking that turns “no lights, no fans, no display” into a calm, step‑by‑step recovery, starting where every system truly begins: firmware. BIOS and UEFI aren’t trivia; they decide how your machine discovers drives, validates bootloaders, and applies security like Secure Boot and TPM. That’s why a simple post‑update check of boot order, storage mode, and firmware toggles ...
professorjrod@gmail.com Storage didn’t just get bigger; it got personal. We rewind to the late ’90s and early 2000s to unpack the clash between Iomega’s Zip drive and the laser-lit world of the CD—two formats that taught a generation how to back up, carry, and truly own their data. From the pain of 30‑floppy installs to the thrill of dropping a 700 MB burn into a jewel case, we dig into what made each medium take off, where they stumbled, and why their lessons still shape how we save files to...
professorjrod@gmail.com Dive deep into the essential building blocks of secure enterprise networks with Professor J. Rod in this comprehensive exploration of network architecture, security appliances, and remote access solutions. What makes a truly secure organizational network? It's more than just firewalls and fancy equipment—it's thoughtful design, strategic implementation, and layered defenses. We break down how enterprise networks function as digital blueprints, explaining everything fr...
professorjrod@gmail.com What if the real cause of your random reboots isn’t the GPU at all—but the power plan behind it? We take you end to end through a stability-first build, starting with the underrated hero of every system: clean, properly sized power. You’ll learn how to calculate wattage with 25–30% headroom, navigate 80 Plus efficiency tiers, and safely adopt ATX 3.0 with the 12VHPWR connector—no sharp bends, modular cable sanity, and the UPS/surge stack that prevents nasty surprises w...
professorjrod@gmail.com Remember that satisfying click of inserting a floppy disk? The nerve-wracking moments waiting for your term paper to save? The frustration of "Please insert disk 5 of 12" during game installations? Join Professor J-Rod on a nostalgic yet informative deep dive into the technology that defined personal computing for two decades. This special two-part episode explores the complete evolution of floppy disk technology, from the fragile 5.25-inch bendable disks that freed u...
professorjrod@gmail.com Ever wonder what happens behind the scenes when you tap "Login" on your favorite app? Authentication is the invisible guardian standing between your personal data and potential attackers, and it's more sophisticated than you might think. Authentication systems rely on three critical principles: Confidentiality keeps your credentials private, Integrity ensures no one can fake their way past security, and Availability guarantees you can access your accounts when needed....
professorjrod@gmail.com The digital world seems like magic to many, but behind every functioning computer is a complex system of hardware components and methodical troubleshooting approaches. In this comprehensive episode, we pull back the curtain on what makes IT specialists effective problem-solvers and explore the physical heart of computing systems. We begin by examining the role of IT specialists as workplace heroes who tackle everything from simple password resets to complex network ou...
professorjrod@gmail.com Cryptology isn't just theory—it's the invisible shield protecting your every digital move. This second installment of our cryptology deep dive moves beyond the fundamentals to reveal how these powerful tools operate in real-world systems that safeguard our digital lives. Digital signatures stand as one of cryptology's most practical applications, providing the three pillars of digital trust: integrity verification, sender authentication, and non-repudiation. We break ...
professorjrod@gmail.com Have you ever wondered what invisible force protects your private messages, banking details, and personal information as they travel across the internet? The answer lies in cryptology—the fascinating science of securing information through mathematical techniques. Cryptology forms the backbone of modern cybersecurity, addressing the critical needs for confidentiality and integrity in our digital communications. Throughout this episode, Professor J-Rod breaks down comp...
professorjrod@gmail.com Step back in time with Professor JRod as we uncover the remarkable story of the 8-inch floppy disk – the groundbreaking invention that forever changed how we store and transport digital information. Before cloud storage, before USB drives, even before the familiar 3.5-inch diskettes of the 1990s, there was the original 8-inch floppy disk. Born from necessity at IBM in the late 1960s, this revolutionary storage medium solved a critical problem: replacing cumbersome pun...
professorjrod@gmail.com Cybersecurity isn't just about firewalls and antivirus software—it's about understanding the complex interplay between technical systems and human psychology. In this continuation of our Security+ series, we explore the multifaceted world of attack surfaces, threat vectors, and social engineering techniques that cybercriminals employ. We start by breaking down what constitutes an attack surface—those vulnerable points where unauthorized users might attempt to breach y...
professorjrod@gmail.com Dive deep into the world of cybersecurity threat actors with Professor J-Rod as we unpack the essential definitions from Chapter 2 of the Security+ 701 certification exam. This knowledge-packed episode breaks down the critical foundation of information security risk management through clear, actionable explanations. We start by exploring the trinity of cybersecurity concepts: vulnerability (weaknesses in systems or processes), threats (potential causes of unwanted inc...
professorjrod@gmail.com What separates career-changing advice from everyday guidance? The difference often lies in both the wisdom itself and the intentions of those sharing it. Professor JRod takes a detour from his usual CompTIA certification topics to explore something equally valuable for tech professionals: the transformative power of mentorship and pivotal advice. Drawing from his personal experience, he shares three pieces of guidance that fundamentally changed his professional ...
professorjrod@gmail.com Diving into the foundations of cybersecurity certification, Professor JRod delivers an insightful exploration of CompTIA Security+ Chapter 1, revealing why this certification might actually be more approachable than many believe. Unlike many entry-level IT courses, Security+ builds upon concepts from A+ and Network+, creating a natural progression for those following CompTIA's certification path. For career-changers considering jumping straight to Security+, this episo...
professorjrod@gmail.com Professor JRod makes a triumphant return to Technology Tap after a year-long hiatus, bringing listeners up to speed on his personal journey and diving straight into Security Plus 701 fundamentals. Having completed his doctorate and subsequently focusing on his health—resulting in an impressive 50-pound weight loss—he reconnects with his audience with the same passion and expertise that made his podcast popular. The heart of this comeback episode centers on essential c...
professorjrod@gmail.com Ever wondered how one of the largest telecommunications companies fell victim to a major cyberattack? Join us as cybersecurity students Alexis Severo and Aaron Kispe unravel the infamous Verizon hack of 2016. We kick off our discussion with an insightful look into Verizon's sprawling history and multifaceted services, shedding light on why this tech giant became such a lucrative target for cybercriminals. Discover the gripping narrative of how attackers infiltrated Ver...
professorjrod@gmail.com What happens when the very agency responsible for safeguarding government personnel data becomes the target of an unprecedented cyber attack? Join us on this riveting episode of Technology Tap as we unravel the intricacies of the infamous Office of Personnel Management (OPM) breach. I'm Professor JRod, guiding you through a special summer series episode where we dissect the 2013 cyber intrusion that compromised sensitive federal employee information. With former Navy p...
professorjrod@gmail.com Ready to ace the new CompTIA Network Plus exam, N10-009? Discover the game-changing updates and crucial differences from the N10-008, and learn how to sharpen your skills on modern tech like SD-WAN, 5G, and cloud architecture. We'll guide you through the exam's enhanced focus on practical troubleshooting and real-world scenarios. Plus, get insider tips and recommended resources to ensure you’re studying smart with the most current materials and hands-on experience. We'...
professorjrod@gmail.com How secure is your information online? In our new episode of Taf Technology, we delve into cybersecurity in Latin America through the experiences of two exceptional students: Viviana Rodas from Paraguay and Jimmy Navarro from Guatemala. They share with us how cybersecurity is perceived and managed in their countries, the cultural and educational differences with the United States and the challenges they face in their academic and professional path. Discover how cyberc...
professorjrod@gmail.com Discover how CompTIA's rebranded Tech Plus certification is revolutionizing IT education! Join me, Professor J Rod, as I reflect on my journey of earning a doctorate and how this new, more accessible certification is a game-changer for career changers and newcomers to the IT field. We'll explore who stands to benefit the most from Tech Plus, from professionals needing a broad understanding of IT to those looking to boost their job performance with enhanced tech skills....
J
Not a bad podcast but the mic quality is not great. Very fuzzy when you emphasise something. A $50 mic would easily fix this. Thanks!