Posts

Showing posts from 2013

How to quickly recover lost form data in your browser

This is an update of a browser extension I last wrote about a couple years back. It's too good not to revisit every so often. Just the other day, this happened: After writing a fairly lengthy post in a browser-based blog tool, I hit the Backspace key to delete something--but because my cursor wasn't inside the text field at the time, Chrome interpreted that as the keyboard shortcut for "back." In other words, back to the previous page. A big chunk of my unsaved work: gone. Crud. Read the solution at:  PCWorld :

Essential networking tips for small business

Image
So you’ve seen the light and turned your sluggish PC into a productivity powerhouse with better, fastergear. That’s a great first step. But putting together a state-of-the-art PC workstation without having a fast, reliable network to help it run at its best is like leaving your souped-up new ride on blocks in your garage. Check out the tips below for ways to upgrade your network and storage, and take your productivity to the next level. Embrace the flexibility of wireless . . . More at:   PCWorld

How to dummy-proof the PCs of friends and family!

 "BRR-RING! The phone rings at midnight, interrupting your sleep—or worse, your late night Steam session with your gaming clan. Is someone sick? Did a car hit your dog? Is it your pal, calling to tell you he got the munchies and discovered that, joy of joys, the McRib is back? Perplexed (and maybe a bit hungry), you pick up your handset, and hear the ominous words: "Hi, sorry to call you, but I'm having this problem with my computer…"" More at:  PCWorld :

How to add Windows 8's best desktop features to Windows 7

It's too bad that the modern UI has proven so contentious, because aside from the eye candy—or eye cancer, depending on your perspective—an abundance of welcome nuts-and-bolts changes makes Windows 8 the hands-down best version of Windows that Microsoft has ever released. But don't despair. Although you can tweak and tuck a few things to almost completely banish the interface formerly known as Metro from your Windows 8 life, you can also try another tactic: not upgrading at all. Many of Windows 8's best under-the-hood improvements can be yours in Windows 7 with the help of a few handy-dandy applications. Having your cake and eating it too has never tasted so sweet. More at: PC World

How I ditched the security risks and lived without Java, Reader, and Flash | PCWorld

Adobe Flash, Adobe Reader, and Oracle's Java. All three are virtually ubiquitous on modern-day PCs, and all three provide handy-dandy functionality—functionality that, in the case of Flash and Java, can't be directly reproduced by a third-party solution. If we lived in a vacuum, it would be hard to argue that the trio doesn't deserve its spot on computers around the globe." We don't live in a vacuum, though. Here in the real world, widespread adoption of the software makes all three irresistible targets for hackers and malware peddlers. The attacks reached a fever pitch in the early months of 2013, with a flood of reports about Flash, Reader, and Java exploits. Three different articles about Java exploits hit PCWorld's homepage this past Monday and Tuesday alone, and Adobe issued three critical Flash updates in February. More at: PCWorld :

Prepare an old PC for a new owner

Image
Before you give away a computer, you should make sure that your most private, sensitive files are irretrievable. You don't want them to fall into the wrong hands. But that's not all. You should also return the hard drive to its factory condition, so that the new owner can set it up as they choose. Let's discuss both topics. Securely wipe sensitive files If a file contains information that you'd rather not fall into criminal hands (or government hands), merely deleting that file isn't sufficient--even if you empty the recycle bin. Deleted files can be restored with simple, free software. Instead, you should  wipe  those files--overwriting them with new, meaningless data. As a general rule, the more times the file's former location on the drive surface is overwritten, the more secure the wipe . . .  More at:  PCWorld : Also:   Remove Sensitive Data Before You Sell an Old PC - go here .