This guest article is written by Ken Myers, the founder of http://www.longhornleads.com/.
Unlike many adults prior to the Generation X movement of technology, children are subjected to computers and electronics at an earlier age than we were. While many of us grew up with Commodore 64s, Nintendo, and Atari, our children are bee-bopping around the Internet as early as kindergarten. There wasn’t a single computer in the elementary school I attended. With this ever persistent technology, how do we keep our kids safe while they browse the Internet? Continue reading
Windows keyboard shortcuts can save you time using your computer. Keyboard shortcuts are the use of one or two keys to represent a Windows operation. For example, to copy highlighted text or graphics you can touch ctrl key plus the c key; to past it’s the ctrl key plus the p key. There are a lot of these shortcuts for all kinds of commands and functions that will save you time in your computer use.
By following a few simple guidelines, you can maintain your computer, help increase its speed, and help keep it running smoothly. This article discusses how to use the tools available in Windows 8, Windows 7, Windows Vista, and Windows XP Service Pack 3 to help make your computer faster, maintain your computer efficiently, and help safeguard your privacy when you’re using the Internet. Continue reading
Denial of Service Attack (Photo credit: kryptyk)
I try to explain what terms and acronyms mean as a way to educate our readers. In that light, Zen Technologies has written a guest article on one such term they know a lot about: DDoS attacks.
What is a DDoS attack?
DDoS stands for Distributed Denial of Service. As the name suggests, a DDoS is typically launched from a distributed network of computers, and may be coordinated by one computer. By overloading the target computer or network with requests to access some part of it, the computers carrying out a DDoS may be able to overwhelm the target system. As a result, Continue reading
Each Internet computer user has the power to improve his or her security for free, in less than 5 minutes and without downloading anything.
Much of our vulnerability to malware and identity theft begins with the choices we make when using our computers to travel the Internet and even managing our email. We make choices when we visit websites, when we backup our computers, when we open our email, and when we click on links. Choices that Continue reading
Have you ever “lost” a document you created in the past, and wondered where it might be found on your computer? Good file and folder organization is a great help in storing your documents and data in such a manner that they will be easily found when you need them. Continue reading
Microsoft offers a free digital book called “Own Your Space—Keep Yourself and Your Stuff Safe Online”. “Own Your Space” was written by Linda McCarthy, for computer and Internet savvy “tweens” & teens, and their parents or educators. The book is available for download at Continue reading