Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Spot a Hacker By Investigating Their IP Address

b2ap3_thumbnail_ip_addresses_400.jpgHave you ever wondered how your PC is identified from the billions of devices out there in the world today? Just like every human being has specific physiological traits that make up who they are, your computer’s IP address is somewhat unique to your machine, and it can say a lot about you. Therefore, it’s important that you are able to identify your own IP address when you need to.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Gadget CCTV IBM IT Consultant Statistics Competition Networking Save Money Shortcut Miscellaneous Software as a Service Office Tips Solid State Drive Security Google Maps Managed Service Domains Network Management Microsoft Break Fix Managed Service Provider Risk Management Recycling Techology Business Management Work/Life Balance Processors Google Docs Smart Tech Machine Learning USB Data Recovery Apple 5G Information Technology Tech Term Augmented Reality Network Security Co-managed IT Refrigeration Wires Network Congestion Wireless Bitcoin Mobile Devices Internet Geography Consulting Managed IT services Document Management Cooperation Computing Backup and Disaster Recovery Humor Presentation Saving Money Tracking Test Multi-Factor Security Identity Theft Public Cloud Education User Tips CIO RMM Computers Point of Sale SharePoint Corporate Profile Workplace Tips Sports Social Networking High-Speed Internet Unsupported Software Update Data Cloud Computing Monitoring Files Superfish Taxes End of Support Office Router BDR IT solutions Robot Data storage Patch Management Supercomputer PowerPoint Customer Service Telephone Systems Migration Distributed Denial of Service Google Wallet Authorization Net Neutrality How To Business Owner IT Support Information Private Cloud Remote Monitoring and Management Cybercrime Safety Settings Redundancy Address Website Phone System Phishing Emoji Hosted Solutions Printing Screen Reader Permission Bookmarks Servers Password Vulnerability Typing Internet Exlporer Productivity Mobile Office Computing Infrastructure GPS Cabling Administration Flexibility Outsourced IT Android Browser Holiday Cyber Monday Employee-Employer Relationship Cost Management Mobile Security eWaste IT Management Data Breach Mail Merge Smartphones Crowdsourcing Downloads VoIP Hosted Solution Communication HIPAA Mobile Device Cyberattacks Nanotechnology Hiring/Firing Intranet Asset Tracking User Data Backup Google Lenovo Personal Information Meetings Cache Content Filtering Twitter Authentication SaaS IT Budget Ransomware Office 365 Server Management Gadgets Procurement Government Privacy Paperless Office Smart Technology Experience Software Mobile Computing Scary Stories Social Engineering Disaster Recovery Utility Computing OneNote Virtualization Automobile Administrator Cookies Mobile Favorites Recovery Theft Upgrades Star Wars Management Word Operations Laptop Notifications Google Drive Travel Sync Staffing Storage Scam Collaboration Bring Your Own Device Employer-Employee Relationship Downtime Managed IT Service Error Project Management Unified Communications Development Legislation Business Continuity Samsung Virtual Reality Digital Payment Knowledge Windows Features Uninterrupted Power Supply Entrepreneur Big Data Read Only Heating/Cooling Alt Codes Bandwidth Current Events Windows 10 Web Server Business Intelligence Chatbots Bluetooth Spyware Alert Efficiency Best Practices Social Media Analytics Security Cameras Tip of the Week Conferencing Time Management Cryptocurrency Operating System Managed Services Provider Money YouTube App Printer IP Address Employees Physical Security Microsoft Excel Firewall Access Control Tablet Licensing Fleet Tracking Motherboard IT Technicians Analyitcs Hard Drive Data Management Internet of Things IT Support Running Cable Unified Threat Management Server Mobility How To Windows 10 Facebook File Sharing Apps Vendor Management IT Services Hacking Save Time Regulations Deep Learning Touchscreen Enterprise Resource Planning MSP Best Practice Specifications Customer Relationship Management User Error Managed IT Compliance Cortana BYOD Cameras Cleaning Data Security IoT Innovation Identity Application Backup Help Desk Applications Troubleshooting Hacks Proactive IT Saving Time Proactive Quick Tips Wireless Technology Hotspot Microsoft Office Managing Stress Infrastructure Websites Legal Assessment iPhone Language Computer Business Staff Webcam History Dark Data Tech Terms Mouse Passwords Wearable Technology Remote Worker Encryption Wi-Fi Maintenance Hard Disk Drive VoIP Blockchain Data Warehousing E-Commerce Writing Consumers IT service Tech Support Health Spam Disaster communications Software Tips Dark Web Budget Two-factor Authentication Remote Monitoring Relocation Marketing Artificial Intelligence 3D Printing Fraud Botnet Motion Sickness Business Computing Modem Law Enforcement Remote Computing Hacker PDF Mobile Device Managment VPN Windows 8 Permissions Enterprise Content Management Hard Drives Fun Network LiFi Upgrade Antivirus Undo Documents Vulnerabilities Virtual Private Network Technology G Suite Technology Tips Politics Buisness Mobile Data Remote Workers Financial Zero-Day Threat Chromebook Public Speaking Business Growth Telephony Automation Google Calendar WiFi Healthcare Tip of the week Going Green Black Market Hackers Computer Repair WannaCry Identities Environment Gmail Electronic Health Records Data loss IT Consulting Finance Virus Virtual Desktop Mirgation Lithium-ion Battery Connectivity Mobile Device Management Business Technology Digital Signature Cloud Consultation Firefox WPA3 Electronic Medical Records Trending Display Programming Instant Messaging Monitors Outlook Black Friday Smartphone Training Malware Halloween Backups Avoiding Downtime The Internet of Things Alerts Drones Retail Managed IT Services Chrome Digital Human Error Disaster Resistance Comparison Small Business Hardware Technology Laws Company Culture Productivity Users Computer Care Piracy Cables Social Unified Threat Management Cybersecurity Search Email ROI

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...