What are you looking for?

TQA Weekly Show Notes for Season 5

The Maximum Length of Cables You Use
The maximum length of standard cables used in your home every day, regardless of quality or shielding.

Steve Smith talks about the maximum length of cables of every day cables in your home.

Read more

Image Tearing
Eliminating screen tearing in games and applications

Steve Smith talks screen tearing of game play images, the causes and solutions.

Read more

The DDOS
The Truth behind Distributed Denial-of-Service attacks

Steve Smith talks about DDOS, how it can be done, why anyone can do it, why it can occur, and why it happens, sometimes, by accident.

Read more

File Recovery and Total Destruction of Data
How to recover files, partitions, and how to make them disappear

Steve Smith suggests software that can recover files, partitions, and even how to make them disappear.

Read more

PCIE Lanes
How does the available PCIE Lanes in my processor affect my ability to SLI or Crossfire?

Steve Smith talks about PCIE lanes, and why knowing what you need may prevent issues with bandwidth on your new mainboard.

Read more

Port Forwarding
When UPNP is Off, Punch Holes in the Firewall

Steve Smith explains what you need to know, and what goes into port forwarding.

Read more

Fast Boot
How does one get their computer to boot faster?

Steve Smith explains how to get your new computer to boot in less than 10 seconds.

Read more

AMD A58, A68H, A78 or A88X?
How to choose your next AMD Platform

Steve Smith takes the guesswork out of building your next AMD computer and sets you up on the right track to building a modern AMD machine.

Read more

Intel H97, Z97 or X99?
How does one pick an Intel Platform?

Steve Smith explains what the key differences are between each of the H97, Z97, and X99 platforms, and who benefits most from each.

Read more

5 Famous Botnets that held the internet hostage
Viruses and Botnets that infected, controlled, spammed and then held computers for ransom.

Steve Smith talks about 5 famous botnets and how many of them spammed, controlled, defrauded and even held computers for ransom.

Read more