How to Avoid Falling Victim to Macro-Based Malware Attacks
Macro-based malware attacks are as tenacious as dandelions. Just when you think they are gone for good, they keep popping up. These days, they are popping up in the form of bogus shipping notices, supposedly from the United Parcel Service (UPS) or United States Postal...
Help! Why Did My Email Bounce Back?
If you send email regularly, you likely have received them — those notifications saying that the email you just sent was undeliverable. Trying to determine why your emails bounced back can be frustrating since the notifications usually contain error codes accompanied...
Help! I Spilled Coffee on My Keyboard
It is hard to resist the temptation of sipping a hot cup of coffee or drinking a refreshing glass of soda while you are working on your computer. If the unthinkable happens and you spill it on your keyboard, do you know what to do? How you should deal with this crisis...
4 Things to Do after You Set Up a New Computer
Buying a new computer is exciting. Once it is set up, you might be tempted to immediately use it to surf the web or try out some new programs. It is best to resist that temptation, though. Computers right out of the box are outdated and vulnerable to cybersecurity...
Avoid Tech Support Phone Scams
Cybercriminals don't just send fraudulent email messages and set up fake websites. They might also call you on the telephone and claim to be from Microsoft. They might offer to help solve your computer problems or sell you a software license. Once they have access to...
5 Cool Things Your USB Flash Drive Can Do
Who doesn't remember their first "thumb" drive? The first USB flash drives held only 125 megabytes of data, but that seemed like a lot compared to the floppy disks most users had grown up with, and they were a lot easier to use than read/write CDs. That 125MB "memory...
5 Ways to Secure Your Company’s Wireless Router
Wireless routers are used by companies around the world. They typically serve as the core of a company's network, enabling both wired and wireless devices to connect to each other and access the Internet. The setup for a wireless router often involves connecting it...
How to wipe your hard drive.
Every year you read about confidential data being recovered from recycled computers. See Confidential data found on old state computers sold as surplus, audit says and Computer hard drive sold on eBay 'had details of top secret U.S. missile defence system'. A recent...
How to Prepare Your iPhone or Android Phone for Sale
Nowadays, smartphones are filled with all sorts of personal data including contacts, schedules, photos, videos, documents, and more. Whether you're selling or giving away your old phone, you'll want to both save this personal data and prevent others from gaining...
Some Early Information About Windows 10
In September 2014, Microsoft Corp. revealed its next operating system, Windows 10, at an unveiling event in San Francisco. Terry Myerson, the executive vice president of Microsoft's Operating Systems group, said at the event that the new OS represented "the first...