8 Simple Ways to Defend Against Evil Doers Both Online and Off
by Dan Preston
There once was a time when the only option people had when shopping was to either call in or snail mail in a catalog order form or to jump in the family car, fight through traffic, and wait in long checkout lines to complete the purchase.
Have Laptop Will Travel
by Francis Ardi
Leave prepared when traveling with your notebook computer.
Internet connectivity at your destination is one thing to think about when taking your portable office with you on your next trip.
You might want to consider some of the following options:
AIM and a Half - Give your AIM a Little More
by Cameron Mount
Buttons, ads, big long menus, pictures are everywhere and they’re slowing down your AOL Instant Messenger. What is there to do? Add-ons for AIM just add things to your AIM. Aliasing, tabbed IM windows, etc. But what do you do about all of those things that are slowing down your AIM? There may be a solution.
What Is Wardriving And How Can You Prevent It
by Zackary Anderson
Imagine a car equipped with nothing more than a laptop computer, a portable GPS receiver, and a wireless network card slowly strolls through your neighborhood. Unknown to any onlookers, this is no ordinary vehicle; rather, it is a wardriving machine.
Introduction to Bluejacking
Bluejacking means sending errent messages to other people via a bluetooth enabled device without your victim knowing who sent the message. The steps are so simple that even if you are not technologically savvy, you will be able to do it after reading our blue jacking tutorial.
How to secure your small business with a PIX firewall
by Ron Jones
How protect your small business from digital harm with an enterprise class firewall
Categorizing & Organizing Electronic Data for Maximum Backup Efficiency
by Bud Stoddard
For businesses to protect their mission-critical data and keep their businesses up and running, having an efficient backup and recovery solution is key. However, in order to achieve and maintain backup efficiency, categorizing and organizing your data is also important, not only to ensure that necessary files are backed up but to minimize costs. Today, this is an especially complex task given remote offices and more and more mobile devices in use.
Protecting Today’s Data Dependant Firm
by Bud Stoddard
Most everything that is done in a law firm today, from email to preparing court documents to billing clients and keeping their information current, requires the use of the computer through which electronic data is generated. Just as malpractice insurance is an important part of protecting a firm, safeguards must be put in place to protect electronic data and to ensure that a firm is back up and running quickly following an outage.
Eight Reasons to Increase Backup Spending When the Economy Slows
by Bud Stoddard
To say we have seen a significant downturn in the economy in the past twelve months would be hyperbole at its best. As business and technology executives and professionals, it is incumbent upon each of us to go through the necessary belt-tightening and reassessment of the budget whenever the economic conditions and the stock market make a turn in a southerly direction.
Protecting Data in Today’s Fast-Paced & Uncertain Environment
by Bud Stoddard
Data is not only the foundation of businesses in all industries but remains a vital irreplaceable strategic asset. But, this asset is threatened today more than ever, given the increasing threat of disaster resulting from the impending war and recent and potential future terrorist activities. According to the U.S. Department of Labor, 93% of companies who experience a significant data loss will be out of business within 5 years.
Keep Your Computer Virus Free
by Jesse S. Somer
Help keep the computers on Earth clean and healthy: Protect your techno-friends from viruses and ‘sickness’.
Protect Your Computer!
by Michael Antonucci
An informative, accurate, and humorous approach to protecting your computer.
Have You Ever Wondered About Cookies?
by Bill Parks
Do you remember the first time you was offered a cookie
from a web site? If you were new to the Internet it was a
surprise. A web site wanted to put a cookie on your
computer. Maybe your first thoughts were, “What’s a
cookie? Should I accept it or reject it?"
The History of Printer Ink Cartridges
by Keith Kingston
With the introduction of the inkjet printer and printer ink cartridge in 1984, the task of printing your documents and changing printer ink cartridges became more convenient, reliable and cleaner than the previous methods of changing ribbons or inserting a toner cartridge.
Open Sesame - Password Security
by Terrence F. Doheny
"Open Sesame!" is probably the most famous password in literature. It gave Ali Baba access to vast treasure. In the realm of technology, computer passwords also give access to valuable treasures: precious business and personal data.
Adware - Are Downloads Safe?
by S. Housley
Adware or advertising-supported software is any software application in which advertisements are displayed while the program is running. These applications include additional code that displays the ads in pop-up windows or through a bar that appears on a computer screen. Adware helps recover program development costs, and helps to hold down the price of making the application for the user, often making it free of charge.
Save Time By Creating Email Signature Templates
by Soni Pitts
Email signatures can do so much more than share a link or announce a new product. Consider this time saving tip for smoothing out some of life's little email annoyances.
Be Careful When Following the Crazy Yellow Brick Link Trail
by Jesse S. Somer
The internet is such a huge mass of information, and like all things in existence has its dark side as well as its light. Be careful Dorothy, the yellow brick link trail can lead to the wicked witch as well as the wonderful world of Oz.
Adware, Spyware and Monitoring Software-–Whats What?
by Alexandra Gamanenko
Though the terms "adware" and "spyware" are still often used
interchangeably, they are not synonyms. Spy software is much
more similar to monitoring programs, which are widely used
for employee monitoring and parental control. What do they
have in common are the main differences?
The History of Video Surveillance – from VCR’s to Eyes in the Sky
by Lucy P. Roberts
Mention video surveillance and most people think of video cameras mounted in the corners of train stations and banks or private detectives video taping an erring spouse for a messy divorce case. The truth is that the history of video surveillance is much more complex and goes back much farther than most people realize.