Posts

Four Ways to Protect Your Data

Image
"A modern PC leads a kind of dual life. On the one hand, it serves as an entertainment center, offering access to games, online videos, and the entire Internet. On the other hand, it acts as a tool for collecting, creating, and storing important information of all kinds. If your computer is lost, busted, or stolen, switching to a new one has little effect on the entertainment side. But unless you've properly protected the personal data on that system, a theft or loss could become a data disaster. How can you head off such a disaster? Here are some hot ideas." More at:  PCMag.com :

Make it Count - A Nike Video

Image

Improve Your Windows 7 Registry With 7 Easy Tweaks | PCWorld

Take more control of your Windows 7 system with these quick and easy Registry tweaks. By Marco Chiappetta The Windows Registry is a powerful but confusing component of the Windows operating system. In earlier editions of Windows, editing the Registry was fraught with peril; if the user edited it with the wrong tool or altered a critical key, the result could be an inoperable Windows installation. Windows 7, however, is far more forgiving than its predecessors when it comes to modifying the Registry, if you use the built-in Windows 7 Registry Editor (Regedit)." More at:   PCWorld

Paint.NET Performance

Image
Paint.NET’s performance is an interesting topic. There are some areas, such as startup, where Paint.NET is very fast. There are other areas, such as selection manipulation, where it is quite slow, even laughably so in non-pathological situations. If you’ve ever worked with the Magic Wand tool on an image of more than about 4 megapixels, then you probably understand what I’m talking about." More at:  Paint.NET Blog :

Put Linux on a USB Drive

A flash drive is one of the single most useful tools a person can own. With it you can back up critical data, transport large files, rescue a malware-infested PC, and even run an entire operating system. Regarding this last option, a while back I explained  how to put Windows 8 on a flash drive . (It works with Windows 7, too.) Today, let's talk about putting Linux on a flash drive. Why would you want to do that? Two reasons: to see how the other half lives, so to speak, and to create a rescue tool that can work around nearly any Windows-related disaster. For example, I recently spent days troubleshooting a relative's malware-infested, effectively non-operational laptop. She wasn't concerned about getting the system working again, but she desperately wanted to retrieve her business documents, personal photos, and the like. (I did not, you'll be glad to know, take the opportunity to scold her about making backups. I waited until later.) More at:   PC World

How to Remove Malware From Your Windows PC | PCWorld

 "Is your computer running slower than usual? Are you getting lots of pop-ups? Have you seen other weird problems crop up? If so, your PC might be infected with a virus, spyware, or other malware--even if you have an antivirus program installed on it. Though other problems, such as hardware issues, can produce similar symptoms, it's best to check for malware if you aren't sure. But you don't necessarily need to call tech support or the geek across the street to scan for malware--I'll show you how to do it yourself." More at:  PCWorld

Securing Your Home Wi-Fi Network

OVERVIEW Wi-Fi networks (sometimes called by their technical name  802.11) allow people to wirelessly connect devices to the  Internet, such as smartphones, gaming consoles, tablets,  and laptops.  Because Wi-Fi networks are simple to setup,  many people install their own Wi-Fi networks at home.   However, many home Wi-Fi networks are configured  insecurely, allowing strangers or unauthorized people to  easily access your home network or anonymously abuse  your Internet connection. To ensure you have a safe and  secure home Wi-Fi network, here are a few simple steps  you should take. The key to a secure home Wi-Fi network is making sure only you have administrative access, your communications are encrypted, and that people have to authenticate to use your network More at: OUCH