As our population of windows laptops ages, we are seeing an increasing number that are failing to boot with blue screens.
- In many cases, the data is still intact. The issue is either a hardware failure or that Windows became corrupted.
An external USB enclosure can make the retrieval of your data a whole lot easier. The first thing is that you need to determine which style of enclosure you will need. Our experience has been that most laptops that are 4 or 5 years old are newer will fit in a 3.5 inch SATA enclosure. Continue reading
We were getting the following error on our netbook using our Sprint Cellular Wireless card
425 Possible PASV port theft, cannot open data connection.
Failed to retrieve directory listing Continue reading
We took the northeast regional from Philadelphia ti Washinton DC.
Coach class had 2 110v receptacles for each pair of seats.
If you use USB hard drives in rotation for backups you can run into a problem in that hard drive. letter assignments are not sticky.
In one case I ran into an additional problem in that the existing configuration mapped a network drive as D. When you added a USBdrive, it took the first available drive letter which happened to be D. This caused conflicts. Continue reading
I have a minor gripe with the design of the USB ports on the Dell Inspiron Miini. I realize that netbooks are amall but I would be happier if the USB ports were not so close together
I have been looking for something to replace Frontpage for a while. I have looked at Expressionweb but wasnt sold on that as a solution. Continue reading
We’ve had a couple of calls in the last week or so to clean up home PCs infected with Antivirus 360. Apparently this is picked up as a drive by download while web browsing.
AV 360 impersonates the Windows Boot Splash screen which makes users think that they are rebooting. It sticks a message on there about ‘registering av 360’. Continue reading
Here is a great book that will help beginners understand computer security. The book is about 30 years old but the information in it is still relevant.
Clifford Stohl is a Berkley Astronomy Professor who found a hacker entering his system. The book details some of the ways that the hacker was able to gain access. Continue reading