In this, the second article of the Optimize your Workflow series, we delve into the methods of Optimizing your Computer…because we do most of our work on the computer. In 7 steps, you will have a fully optimized computer. What are you waiting for, an invitation? Well, you probably wouldn’t be able to find it if I said it was somewhere on your computer. If you read the article, you’ll find it :O)
Hard Drive Security
Let me give you a hypothetical situation: you’re selling your computer on eBay or Craigslist and you clean out your hard drive so no one can get your personal information. You clean your hard drive by reformatting, removing the partition, or deleting all your personal files, moving it to the recycle bin, and emptying the […]
Microsoft Needs Security Help…From Apple
Wow Zach, that’s a little obvious. Of course Microsoft needs help with security from Apple…haven’t you seen the commercials? Well, I have and Linux is just as secure because it too is built on UNIX (Hence techies like myself calling it *nix…* (an asterisk) represents any character(s), U and Li both work here making it […]
Password Security
How often have you been asked for a password? Most people are prompt at least once a day. If you use a computer, you are probably aware that passwords, like passcodes, keep your data slightly safer. It is like an ATM code. Most people keep their passwords simple to remember and as a side effect, […]