Here is the latest story written by Lisa Gray: Hudson arrives early for dinner getting the better seat before Julia…
Author: Stephen Burke
Alternatives to Windows 10
Cornwall Ontario – Last week I addressed the upgrade to Windows 10. I have also suggested that some people may wish…
MICRO NEWS: Taking the Plunge, Part 2
Last week we had you make backups of your hard drive and data files and have the driver and software…
MICRO NEWS: 3D Scanning
We’ve all been told that a picture is worth a thousand words, and we all know that photographs certainly add…
Choosing Your Next Computer
The next few columns will be a bit of a departure from computers specifically, but they will still be about…
Choosing Your Next Computer
Buying a computer based upon price is unwise. However, paying 30% to 50% more for a computer just because it…
Choosing Your Next Computer
The standard home user typically surfs the Internet, writes e-mails, uses an “office” suite (word-processing, spreadsheet, and other apps), might…
Conclusion: Best Practices for Computer Security
If you have been following this series about computer and software security, you’ve learned about ransomware and socially engineered exploits.…
Be A Hard Target
You wouldn’t leave your new and expensive car unlocked with the keys in the ignition. Likewise, you should ensure that…
Website Hacks and Browser Attacks
Last week we learned about ransomware and socially engineered exploits. We learned to hang up and don’t click. We also…
Ransomware, Social Engineered Exploits
Ransomware and related socially engineered exploits of computer systems are on the rise, especially amongst our aging population. Does this…
