This is the frequently asked questions section. It's an ever evolving body of work that keeps growing because I want to resolve a lot of issues before arriving on site or even getting an email.
What is the P.E.A.C.E initiative?
The P.E.A.C.E. initiative is my way for bringing a positive effort to the community. "Positive Education Always Corrects Errors" is combined with environmental cleaning activities to better oneself and ones environment. The acronym G.U.N=Good Understanding Now was one of the designs G.O.D. (The Big 3 or the ALL in all as explained in the Kybalion. ) showed me. Be a "street sweeper" for good!!! Instead of being the one pulling out a "stick" i.e. gun to cause a mess... Be a P.E.A.C.E maker!!! Have a "Good Understanding Now " = g.u.n and learn how to "troubleshoot" problems to change your mind and the world that surrounds you for the better. See "Giving Back" for more real sh!# :)
Why did you decide to become an Emcee?
I decided to start rapping/rhyming after some encouragement from a friend. After posting on the Rap Fame App (https://rapfame.app/user/hambmc ) I got some good feedback. After gaining a couple of features, I decided to release tracks on all platforms. I wish to change the world in many ways to make a more peaceful environment (See giving back).
Why "BrowHard" county???
Broward county FL has been my home for many years now. So some years back after seeing something with Broward on it, I thought about me in Broward and just came with Brow(H)ard or "Brow_Hard" to imply hard headed. Hard headed in a good way as 4 x H= Ham Hustling Hip Hop in Broward County FL.
Hard=determination and a want to succeed (I.e "Hustle").
What are the requirements to join the crew?
*Have a want to make good music,
* Try to keep it low on expletives use,
* Write and perform creative rhymes/songs.
* Be willing to occasionally go out and promote music and also perform community enriching activities such as pick up stick championship.
What are the steps taken when cable clean up is performed?
In order to minimize downtime, the first step is to document all connected ports and what they connect to. Once all ports are documented, I'll proceed to take down the network partially or fully, in order to route cables appropriately for optimal air flow. If port labeling is requested, each port and cable end will be labeled for easier identification, and a topology diagram cand be created for an additional cost of $5, which is sent via email to the customer.
What takes place with a computer cleaning request?
I will inspect the desktop or laptop for physical external damage and note it. Then after inspection, the desktop or laptop case will be opened for internal compressed air cleaning. Note: All computer cleaning request require a equipment damage waiver to be completed by the customer. This is because in some cases the manufacturer assembled the product only to be serviced by there service center and require special procedures and tools for disassembly. External peripherals will be cleaned with approved computer cleaning solutions.
What happens if I cancel a dispatch before a technician arrives?
I will refund 50% of your dispatch fee and mileage cost if cancelled while I'm enroute. If I do arrive onsite before you cancel, your dispatch fee and mileage cost will not be refunded. Dispatch feel is $50 and the mileage to your location will be calculated and disclosed before the appointment is set. Customers is responsible for paying cost for mileage to the location. Payment for dispatch and mileage is billed before initial visit, then you will be billed for services rendered upon job completion. A receipt along with associated reports will be emailed to the customer.
What consists of a network security scan?
This ranges depending upon customer requirement, but scans will be conducted with tools such as Nmap and FING. Test are conducted in a timely manner, can consist of intrusive testing and also non-intrusive testing. Due to the nature of certain scans and the possibility of finding a flaws that can affect configuration and device operation, a data loss waiver is required (which is included in the proposal and scope of work documents that will be presented before a final service agreement form is signed and submitted). The following domains/items will be covered on a network assessment:
*Physical security assessment: i.e locks on doors, cable locks for laptops, and recommendations for better security.
*Software assessment: comprehensive report of applications installed on your unit and recommendations for software to enhance ease of use. Recommendations for Antivirus, AntiMalware, and password management software will be made during and at the end of the assessment.
*Network assessment: Each network device configuration will be viewed in order to determine if further security "hardening" is required (i.e. default password changes, Software updates applied, firmware updates completed, etc.).
How do I apply for Business and artist promotion on the BrowHard.com website?
To run a 1 month ad on my site is $10. Ads are subject to content approval guidelines. After 1 month, the add will be deleted. There is no auto renewal, so if you want the ad to continue to run another $10 payment will be needed. Here's the link to online secure payment: https://browhard.com/secure-online-payment
What does your data recovery service consists of?
First, I make no guarantee on data recovery. I will attempt to obtain data from a HDD if it will power up. If the drive motors do not spin the hard drive, it won't read and I do not repair IDE or SATA circuitry. Even if it does spin up, if the read and write heads are damaged, it may read data but the probability of data corruption is very high (this is the case where the HDD was making pinging noises for a while). With SDD, they have read and write allowances. If it's a really old SDD and it's getting daily use, the memory modules will gradually fail over time. SSDs have a limited lifetime number of writes, and also slow down as they reach their full storage capacity. So with SSD drives, I will attempt data recovery on a drive that powers up and is recognized by the operating system used for recovery at that time. File integrity checks will be done before and after recovery process is completed. Important files will be checked against a file hash checker to confirm if there was any change to the data. There is no guarantee on data recovery services and I cannot guarantee to get all data under every circumstance.
Is there any warranty on work performed?
Yes, there is a warranty on work/labor of 30 days. Products implemented (ex. Router, switch, electronic device) will have manufacturer warranty and any additional warranty purchased for that product at that time. Before exiting the site the, service verification will be completed to ensure that the site is up and functional.
Do you run Ethernet cabling?
Yes. Ethernet runs of cable can be done depending on the type of run and length. Cable runs will be visible and secured out of the way in order to not obstruct any pathways. Cat 5 & 5E or Cat6 will be used. All cabling will be plenum rated in accordance with fire code requirements. Pricing of cabling request vary due to availability of cable, and the lengths required.
What happens on a wifi analytics check?
The process for wifi dead spots hunting is simple. I will check the 2.4Ghz and 5Ghz frequencies broadcast by your modem or router from multiple spots in the office or home. This involves tools such a as a laptop, tablet, and smartphone that I use to walk around and find signal dead spots. A report is generated noting results of testing. Please note that wifi speeds are always different than wired speeds when conducting internet speed tests. Distances from the access point will affect speeds, where as an ethernet cable run that is within cable length requirements will always have a more consistent data transport result. Also, a standard check to make sure that SSIDs and default passwords have been changed will be completed.
What happens on a security check?
I check for end point configuration (existing AV, password manager, VPN software, etc.), network devices configuration, and some intrusive testing on each endpoint and network device with an Nmap scan. A report is generated and provided to the customer with possible resolution methods along with cost for such.
What does a training session consist of?
Training varies based on customer requirement. I will assist to train on software with the assistance of manufacturer documentation. Training depends on the learner and what they need help with. This ranges from ex. showing people how to click and drag, to typing commands at the CLI. Training will be in 30 min sessions, and the cost for a session is $40.
You offer research assistance?
Yes!!! This service is geared for those who are not computer savvy and need assistance with getting vital info. Research is conducted in 30 minute segments, $30. A detailed report of results and search methods used to obtain results will be provided. *Note: There will be additional cost if there are sites stating information is available but only if paid for via subscription or one time payment.
What are your accepted methods of payment?
Payments can be made via Paypal, Cashapp, or secure online payment via the BrowHard website. I do not come out onsite unless payment is made in advance for onsite visit. Cash is accepted (ex. after work is completed, customer is billed but digital payment methods are not available due to un-foreseen circumstances) but only under special circumstances but digital payment is the preferred method of payment
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data. You can click this link in order to manager your cookie settings: https://www.godaddy.com/legal/agreements/privacy-policy?target=_blank
Thank you for taking the time to visit.
Disclaimer: The songs in some instances do contain adult content and explanations on how technology might be used in negative ways. It is not my intention to promote malicious use of cyber tools, and I recommend to all my listeners to stay out of trouble and to hack ethically. In other words, please be safe.
If you have any questions about the songs I have created with the intention to be used in a positive manner, please feel free to contact me via the button below.
BrowHard County Emcees: Lyrical creativity without all the profanity