Articles tagged: bestof
Anonymous email is both very easy do to, and yet also extremely difficult. The level of difficulty involved depends on the likelihood that someone would go the extra mile to identify you.
Where to host your website depends on what kind of a website it is. Options range from free to expensive based on your needs.
Sometimes windows can inadvertently be positioned off screen where your mouse can’t reach. The keyboard interface, on the other hand, most certainly can.
DAT files are used by many different applications. To know what to do with a DAT file, you need to know which application created it.
Most music, picture, and movie files are already compressed. The result is that compressing them again won’t make much difference and could even make them larger.
Email is ubiquitous and convenient, yet surprisingly not very secure. I’ll look at why that is and when you should worry.
Libraries are a feature added to Windows 7 that allow multiple folders to viewed as if they are one. It’s not new, but it can be very confusing.
A reader left a snide remark about one of my recommendations, but it actually raised an important point about recommendations you might find online – there are many opportunities for abuse.
As platforms like Windows, Mac, and Linux have all matured, the differences in fundamental capabilities are getting smaller – in many cases, small enough that which one you choose can often boil down to simple personal preference.
NAT is a fundamental technology used by routers allowing you to share internet connections and stay safe. I’ll give a conceptual overview.
Windows Explorer tries to help by hiding some information. Unfortunately, that opens a hole that hackers can use to fool you.
Every so often, anti-malware software can go a little nuts, thinking that every email that you get is spam or a virus. Turn that scanning feature off.
Erasing your hard drive before you give it away is important. Exactly how thorough an erase you need depends on your data and level of paranoia.
Several urban legends would have you believe that when you forward an email, it can somehow be tracked. It cannot. Period. I’ll explain why that is.
Unexpected hard disk activity isn’t unusual. I’ll show you how to use a free monitoring tool to determine what program is causing it.
With email account hacking on the rise, it’s important to understand what it takes to keep your account (and its address book) safe from compromise.
‘The Cloud’ is the latest buzzword for internet-based services. Before diving in, it’s important to understand a few things about cloud security.
Possibly being labeled a spammer is another reason not to forward jokes and urban legends. Do it enough and your normal email may not get delivered.
Electronic greeting cards, or ecards, seem like a nice idea, but often end up giving the recipient more than you intended, in the form of spam or worse.
RAID is a valuable technology for improving apparent disk speed and fault tolerance, but it is in no way a replacement for backing up.
Screen resolution is a simple concept, but when combined with the myriad ways that Windows can be configured, it can quickly become confusing.
If your contacts are getting email from you that you didn’t send, then it’s very likely that your email account has been compromised.
Using BCC on forwarded email is one way to reduce the amount of spam your recipients might get as the email is forwarded further.
You hear a lot about the wireless internet, but it’s not something you can just connect to anywhere. It’s more often something you purchase and set up.
Thunderbird is a robust and powerful email program that can meet the needs of both light and power users. I use it all day every day.
Wireless internet in WiFi hotspots makes for a convenient connection. To connect to the wireless internet, you need proximity, a little hardware, and permission.
Email can be sent in several formats, the most common being plain text and HTML. We’ll look at the difference, and which might be preferable.
It may not be fair, it may not be politically correct, but the practical reality of the internet is that speaking and writing English well, matters.
It’s tempting to blame the mail service for account hacks and vulnerabilities, but in fact that’s rarely the case. Much more likely is that hackers gained access to individual accounts through more traditional means.
The “Report Spam” and “Junk” link serve an important function in the war against spam. However, used improperly, they can do much more harm than good.
Files cannot be checked for viruses before being downloaded, but there are precautions you can and should take.
Internet and on-line petitions seem like a quick and easy way to make a statement. Unfortunately at best they’re ineffectual, and at worst they do real harm.
Spammers and internet trolls harvest email addresses via a variety of means. One of the most common is to simply surf the web and look for anything that might look like one.
The best operating system in the world can’t save you from dancing bunnies.
Here’s what to do when you see appcompat.txt.
If using your company’s machine, it’s safe to assume that your boss or IT department could see your emails and instant messages.
It’s sometimes hard to tell why Word thinks a document has changed even though you haven’t done anything. We’ll provide a few clues.
Due to complexity of attachments in emails, changes you’ve made to a document that was emailed to you can disappear.
If there is a conflict with your IP address, it could result in only one of the machines on your network working at a time.
Why Do some Website Addresses have “www” and some Don’t? And Why Do some Work with or without the “www”?
The “www” in website addresses is now typically optional, but there was once a reason as to why they were required in URLs.
Virtual memory is conceptually somewhere between RAM and hard disk space; it’s disk space used to maximize the amount of RAM available to programs.
Windows often reports that a file is in use without telling you what program is using it. Process Explorer can tell you.
The term “server” is used a lot in many contexts, but it’s really just a computer; quite often, it’s one that isn’t all that special.
It’s possible to send email to someone without having their email address show up on the To: or Cc: lines by using Blind Carbon Copy, or Bcc.
Many Windows error messages can often be quickly and easily copied to the clipboard with a single keystroke.