Thoughts, information and reflections about technology


Large store ruins man’s life after he bought a phone in for repair.

Last Updated on

I know that many of our clients and potential clients are lured by the promises of “cheap” technology consulting by some of the larger chains. Claims such as “We’ll rid your computer of viruses for only $49” sound great. Especially considering that it can take us several hours to do a thorough job.

Continue reading

Preventing images from overflowing a column in WordPress with an Artisteer theme and possibly other themes.

Last Updated on

I use Artisteer to create themes for my WordPress sites. As I was testing the sites, I noticed a major issue.

  • The monitor I use for development is 1920 x 1080.
  • I revised the WordPress large image to 800 x 800 in the WordPress Media Settings.
  • The layout is three columns, a wide column for content and two thinner columns for navigation and ads.

I noticed that when I resized the browser to a more square aspect ratio, the image would start to overlap the two right columns. As I researched there were a lot of solutions posted about modifying functions.php and using plugins. The issue was that none of the instruction were really clear as to where to put the code in functions.php much less which functions. php to use.

Continue reading

Backups easier to do – but often forgotten

Last Updated on

I had 2 very lucky clients this week. Both had blue screen of death
failures. In both cases i was able to get the machine running or
retrieve the data with bartpe.

Neither person had any backups of their data. USB hard drives are
inexpensive. Now is the time to secure your data!

No tags for this post.

Great Book on Computer Security AND it’s easy to read

Last Updated on

Here is a great book that will help beginners understand computer security. The book is about 30 years old but the information in it is still relevant.

Clifford Stohl is a Berkley Astronomy Professor who found a hacker entering his system. The book details some of the ways that the hacker was able to gain access.

Continue reading No tags for this post.
Contact me
Recent Comments