Articles in this category

Parent Category:Computers
This Category:Operating Systems

Sub Categories: -

Latest Articles

  1. De-fragmenting your Hard Drive for Greater Performance

    by sezer bozkurt - 2007-01-05
    De-fragmenting your hard drive is very important if you want your computer performance not to suffer as you add more and more data to your hard drive. Windows has a handy feature that easy let’s...
  2. Boot-up process

    by Sandy Tran - 2007-01-01
    1. Booting Up There are essentially two forms of booting - the soft boot and the hard boot. The warm boot or hard boot involves powering the computer up from an initial zero power supply. A col...
  3. An Introduction To Microsoft Vista Business

    by Chris Bryant - 2006-12-28
    As I'm sure you already know, Microsoft Vista is on the way!  Microsoft projects that all five versions of Vista will be available by mid-2006, and if that holds this will be the longest time per...
  4. Computer Memory Options

    by Michael Russell - 2006-12-21
    The reasons for upgrading your computer memory may vary, but with the purchase of additional hardware, you can easily upgrade your computer memory when it becomes necessary to do so. Upgrading your me...
  5. The Modern Wild West

    by Fiaz Sadiq - 2006-12-13
    Marauders of today do not come moseying up bow-legged into your path with a six-gun slung across their hip telling you to, "Stick ‘em up, or else." Instead, today’s modern outlaw...
  6. Resolve to Get Your PC in Shape This Year

    by Will Hanke - 2006-12-13
    Once you finally had all of the cables properly mangled into an unmanageable ball, you powered on, the screen lit up and off you went.  The PC was fast, programs loaded in the blink of an eye, an...
  7. Virus or Spyware - What's the Difference?

    by Dave Fraser - 2006-12-12
    This month's article is one of the things I still find comes up as a frequent question, "what's the difference between Viruses and Spyware"?  I will try and clarify that here. One of th...
  8. Hacking, are you at risk?

    by Steve Barrett - 2006-12-09
    Rooted, the facts.Looking around several irc networks you will inevitably see bots in most of the wares channels. You know the sort, something with the nick Wares-[-0001-] amd the like. Now basically ...
  9. Tips on understanding the dangers of spyware and adware

    by Paul Wilson - 2006-12-07
    Programs like Eudora mail client display advertisements in lieu of charging registration fees for use of software. It helps developers recover program development costs.  Kazaa the file sharing a...
  10. Spyware: It's Hidden Agenda

    by Julian Pereira - 2006-12-04
    We have all heard about spyware. Spyware is regularly featured in various news media and is a topic of much discussion in computer circles. The reason for this is the constant bombardment of spyware r...
  11. Adware: Are Your Business's Computers Secure?

    by Joel Walsh - 2006-12-01
    Adware is, by definition, something reasonable people don't want on their computers. That's why adware can't just come out and ask people to install it. Often, the computer owner is completely unaware...
  12. Adware - How to Beat the Sneakiest Software

    by Joel Walsh - 2006-11-25
    Adware is, by definition, something reasonable people don't want on their computers. That's why adware can't just come out and ask people to install it. Often, the computer owner is completely unaware...
  13. Spyware, this time it's personal!

    by Doug Woodall - 2006-11-17
    First the basic definition of Spyware: It is a type of software which is installed onto your computer without your permission... It can log your keystrokes, which websites you visit, read you email, a...
  14. It's War I Tell You!

    by Doug Woodall - 2006-11-17
    As you may or may not know, a new computer is extremely vulnerable when you first get online with it. There are ways to insure security though. You can get the Windows Update CD from Microsoft and ins...
  15. How to thwart the Barbarian Spyware!

    by Doug Woodall - 2006-11-17
    Today,on most internet user's computers, we have the ability to employ software, along with our intelligence, to prevent viruses and spyware. To put this article into proper perspective, we'll use Med...
  16. Another Fine Mess!

    by Doug Woodall - 2006-11-17
    I was reading an excellent article today titled "Identity Theft" by Judith Collins at eWeek.com, when it got me to thinking.... I'm in the Anti-Spyware business, and I'm doing a lot of adver...
  17. From Spyware with love!

    by Doug Woodall - 2006-11-16
    Its late. You've been scouring the web for that perfect present for your Aunt Bess in Idaho. You finally find it at presents4aunties.com. The site looks a little rough on the edges, weird colors and s...