Since the early 1990s, I've had half a dozen desktop computers, five laptops, various printers, a couple of faxes, a plethora of dumb phones and a couple of smartphones. But just this week I got my first tablet computer. As I once initially thought, I had no need for a computer (my dedicated Smith Corona Word Processor was just fine for a writer), I also thought I didn't need a tablet. I was wrong.
Today's smartphones allow us mobile access to so much more information than ever before. We can take charge of our schedule, email, texts, social networking, computing, Web browsing, banking and more. But what if you weren't the only one that had control of all that sensitive information in your mobile phone?
I have been a fan of the Windows operating system since its inception. With Windows XP back near the turn of this century, things started getting better. Wireless and USB support were introduced and many enhancements were added with that edition. Improvements were made to the computer hardware, the operating system and software; it all began to run faster than ever before.
Too many computers that I've worked on recently have had insufficient protection. Some had anti-virus apps or Internet security suites installed, but they were not properly configured. Some were so outdated they were completely ineffective.
While recently attempting to print a document on a printer I've had installed for over a year, Windows suddenly advised me that I in fact, had no printer installed. I could see the Officejet across the room; I just used it the night before and my wife had printed something on it earlier that morning, so I knew it worked.
There are good places to go on the Internet for downloads and there are not-so-good places. Often when you think you are navigating to a certain website, you end up somewhere else, possibly on a rogue site. You have been redirected.
Some routes are quicker than others. From our house, I use the Ledan Road shortcut to Ga. 53 and the Wild Smith shortcut to U.S. 129 North. On my laptop, I use keyboard shortcuts.
Anyone who uses a computer eventually gets error messages. These annoying pop-ups can often be intimidating, leaving the user frustrated. Google, at least has a sense of humor with their, "Aw snap, Google has crashed" and "Jim, I think he's dead." Most messages though, leave you exasperated, wondering what to do next.
The cloud is up there somewhere on the Internet, out in an intangible place you can't put your finger on, and although it can't be seen, has become a popular locale for computer data storage.
Attempting to create an image of my hard drive to DVDs recently, I discovered I had a nonfunctional optical drive. So I ran it through all the tests I could think of and came to the conclusion that is was in fact a hardware issue. What was so unsettling is the fact that my laptop is only four months old.
My wife logged on to her eBay account early one morning this week to discover she had sold two Wii units to someone in South Carolina. Normally this would have been a good thing, except for the fact the she sells clothes online, not electronics.
It's imperative if you own a computer to know what the components are called and to know a few things about them.
Free programs are great and the Internet is full of them. The problem is that many of these so-called freebies come with a price called malware that piggyback the application or utility you are trying to download.
Passwords are part of computing; there is no way around that. If you use a computer and the Internet, you will eventually need to use them. You may or may not need a password to log onto your computer, but one was needed to get your email this morning. Even if you didn't have to manually type one in, your computer recalled it for you.
If you've ever had to call tech support for a networking issue, they most likely asked you at some point to type your router's IP address into your computer. That address would have looked something like 192.168.0.1.
There is a new phishing scheme currently circulating on the Internet. Its objective is not just to steal your money but your identity as well.
Page 1 of 1