PAGE 341

So you have an antivirus guarding your system, your firewall is up, your browser plug-ins are all up-to-date, and you’re not missing any security patches. But how can be sure your defenses are actually working as well as you think they are?

about 4 years ago - by  |  14 Replies

Most of us have more than one email address these days – it makes it easier to keep different areas of life separate. But having to switch between email accounts can be a pain. With Gmail, you can set things up so you can send from multiple accounts without the need to keep switching.

about 4 years ago - by  |  25 Replies

PowerShell has four types of jobs – Background Jobs, Remote Jobs,WMI Jobs and Scheduled Jobs. Join us as we find out what they are and how we can use them.

about 4 years ago - by  |  2 Replies

Think you know the answer? Click through to see if you're right!

about 4 years ago - by  |  5 Replies

If you are a web developer and use Internet Explorer, you will be pleased to know that it includes a color picker as part of the developer tools. Here’s how to enable it.

about 4 years ago - by  |  5 Replies

The Windows Task Scheduler can automatically send email at a specific time or in response to a specific event, but its integrated email feature won’t work very well for most users.

about 4 years ago - by  |  8 Replies

If you’re new to the world of PC gaming, it can all seem a bit complicated. Consoles don’t have upgradable hardware, desktop software running in the background, or graphics settings that must be tweaked for ideal performance.

about 4 years ago - by  |  7 Replies

More than $5000. That’s how much one man’s child ran up on his credit card by playing “free” games on his iPad. Many games may be advertised as free, but they actually try to push expensive “in-app purchases.”

about 4 years ago - by  |  11 Replies

There are probably countless streaming media services that you use regularly – YouTube for music videos, and any number of websites for listening to streaming music and live radio. Forget using endless apps and website after website; Tomahawk lets you access everything in the same place.

about 4 years ago - by  |  1 Reply

Think you know the answer? Click through to see if you're right!

about 4 years ago - by  |  1 Reply

The news is full of reports of “spear-phishing attacks” being used against governments, large corporations, and political activists. Spear-phishing attacks are now the most common way corporate networks are compromised, according to many reports.

about 4 years ago - by  |  6 Replies

This week’s edition of WIG is filled with news link coverage on topics such as Windows 7 RTM (no SP1) will reach end of life support on April 9th, the Mozilla Project just turned 15 years old, an exploit has targeted 20,000 websites running Apache web server software, and more.

about 4 years ago - by  |  Comments (0)

Think you know the answer? Click through to see if you're right!

about 4 years ago - by  |  Comments (0)

Shout “Windows 8” and you’re likely to hear “Vista” echoed back at you. For Microsoft, Windows 8 has received a Vista-like reception and it’s showing in tepid sales and an abysmal market share.

about 4 years ago - by  |  33 Replies

On Linux, you install software from package management applications like the Ubuntu Software Center. But not every piece of software is available in your Linux distribution’s software repositories.

about 4 years ago - by  |  3 Replies

A new season is underway for those of you in the Northern hemisphere and we have just what you need to add a touch of Spring to your favorite computer. Make your desktop feel as fresh and alive as the new season with our Spring 2013 Wallpaper collection.

about 4 years ago - by  |  Comments (0)

Since PowerShell is based on the .Net Framework and incorporates various other technologies like WMI and CIM, there is always more than one way to accomplish the same thing. Come join us for this short post where we learn how to choose the best method to accomplish our tasks.

about 4 years ago - by  |  1 Reply

Think you know the answer? Click through to see if you're right!

about 4 years ago - by  |  Comments (0)

Whether you’re installing the latest version of Windows or upgrading your Linux distribution, most geeks agree that you should probably perform a clean installation rather than try your luck with an upgrade.

about 4 years ago - by  |  4 Replies

To help keep online accounts secure, two-step verification is becoming increasingly common. Apple is the latest firm to introduce this extra level of authentication, meaning that logging into your account requires more than just a basic password.

about 4 years ago - by  |  3 Replies