Where discussions about computer issues will be stored
Most of my time on computers is spent on my iMac or my MacBook Pro and I am thrilled that I made the switch to Mac a few years back. But, there are occasions when I have to use my Windows 7 desktop machine at my office. I also have Windows XP Service Pack 3…
Like this:
Like Loading...
I had a minor disaster at my casa last week in which I lost all access to a VMWare Fusion Windows XP machine. Fortunately it was quickly resolved by using a backup. That started me thinking about what I have that is NOT backed up. All of my computers use backup drives that are physically…
Like this:
Like Loading...
Real estate agents are called upon to provide many services to their buyers and sellers. The services can range from finding that perfect property for their buyers to marketing a home for their sellers. At the end of both processes there is an escrow to manage (Hopefully!) with all of the attendant inspections, reports, issues…
Like this:
Like Loading...
Recently subscribers to facebook have been receiving emails from people in their networks that at first glance appear to be legitimate invitations. However, if you should click on the link in the email it will take you to a site that will attempt to install a Trojan horse program on your computer. Should that happen…
Like this:
Like Loading...
Lately it seems like my money runs out before the month runs out and I have been looking for ways to economize. Being the geek that I am, I turned to the web and did some searching. Here are some interesting web sites that I think will help you save money and maybe even put…
Like this:
Like Loading...
I’ve been on vacation since Friday afternoon. Actually, I spent all of Friday afternoon and part of Friday evening driving the 482 miles from Orinda, California to Newport Coast, California down the El Camino Real, otherwise known as US Hwy 101. During the 7, almost 8, hour drive I had plenty of time to reflect…
Like this:
Like Loading...
Let’s talk about phishing. No, not fishing with a rod, reel and some bait, but phishing where hackers try to get you to give up some personal information by exploiting a weakness in your browser or email service. Here is how it works: This weakness allows malicious coders to create Web sites that look exactly…
Like this:
Like Loading...
Here is the Cliff Notes version for those of you in a hurry: You need one. Go get one. Stop arguing. Now for the rest of you, we’ll start with a little trip back through time. Back in the days when desk top computers were just starting out, they were stand alone computers connected to…
Like this:
Like Loading...
So one day you go up to your computer and it is doing something weird or it’s not doing what it should be doing or something is wrong and you just have no clue what to do. You’ve even rebooted, but the problem has not gone away. It’s now time to call tech support…or is…
Like this:
Like Loading...
Now I’ll talk about Error Checking (A.K.A. ScanDisk or ChkDsk) and Disk Defragmentation. These two programs are essential to the continued good health of your computer. Running these two programs is like changing the oil in your car and getting a tune up. They don’t perform the same functions, but if your forget to change…
Like this:
Like Loading...