Follow Us
August 25, 2012
In earlier posts I discussed how to make and remember good passwords to keep your online presence secure. These essays, as all of my “Safe Computing” series, was written to help the non-technical, even technophobic user cope intelligently with computer technology. The...
August 18, 2012
In an earlier post I addressed, in a very simple manner for non-technical users, the topic of securing your home router, or Wifi Access Point, against intruders. In this follow-on article, I attempt to elevate the discussion just a bit. While still aimed at the non-tec...
August 11, 2012
In my previous tech note, we discussed the concept of a program. In many ways, most malware is simply another program, an undesirable one, but just a program. The term malware is a general, catch-all term for any sort of malicious program that might become entrenched i...
August 4, 2012
We “program” our VCR. That is a verb, an action. It is a process of telling the machine, in a fairly simple way, a series of things we wish it to do. Turn on at a set time, tune to a channel, record for 30 minutes. And so on.
We have programs on our computer. Nouns. Thi...
December 24, 2014
September 17, 2014
August 3, 2014
June 5, 2014
April 20, 2014
April 5, 2014
November 19, 2013
August 7, 2013
August 5, 2013
September 1, 2012