Blinded By Tech
Tech for the rest of us -- articles on the things we want to do, but never have easily explained.
Saying there’s a security flaw in Windows makes a tech’s eyes roll. Anyone who’s run Windows Update periodically know that there are flaws that crop up. However, recently, a new flaw was discovered that has yet to be fixed — a fully patched Windows XP machine with updated Norton Antivirus was able to [...]
Last week my sister pointed at a computer and called it a hard drive. The other one I’ve heard is calling a computer a CPU. I didn’t correct her, because no one really cares. No one, that is, except for techs. Techies are really annoyed when they hear this, because it’s [...]
Last week my sister pointed at a computer and called it a hard drive. The other one I’ve heard is calling a computer a CPU. I didn’t correct her, because no one really cares. No one, that is, except for techs. Techies are really annoyed when they hear this, because it’s [...]
You probably keep hearing about BitTorrent, but might not have any idea what it is. Or, perhaps you’ve downloaded a .torrent file, and have no idea how to open it. BitTorrent has been getting a lot more distribution, and it’s a good idea to understand what it’s all about.BitTorrent is a method of [...]
You probably keep hearing about BitTorrent, but might not have any idea what it is. Or, perhaps you’ve downloaded a .torrent file, and have no idea how to open it. BitTorrent has been getting a lot more distribution, and it’s a good idea to understand what it’s all about. BitTorrent is a method of [...]
In this article, I don’t want to go in depth; I just want to answer the basic question: Which wireless encryption should I use? Even as more and more people are setting up wireless connectivity for their networks, few realize the additional security risk they are adding. This is further compounded by the [...]
In this article, I don’t want to go in depth; I just want to answer the basic question: Which wireless encryption should I use? Even as more and more people are setting up wireless connectivity for their networks, few realize the additional security risk they are adding. This is further compounded by the [...]
Unless you never use the Internet and never install software on your computer, you probably need a virus scanning solution of some sort. A virus can come from pretty much anywhere: a word doc provided to you on floppy disk, an email message, a web site, downloaded programs, or even vulnerabilities in the operating [...]
Unless you never use the Internet and never install software on your computer, you probably need a virus scanning solution of some sort. A virus can come from pretty much anywhere: a word doc provided to you on floppy disk, an email message, a web site, downloaded programs, or even vulnerabilities in the operating [...]