So you’ve been hacked or someone sent an email using your account without your permission. Often times, these attacks create phishing emails and send those emails out to people in your contact list. Don’t be a jerk, rectify the situation immediately. Here are some steps to take ASAP to remedy the situation.
Optimizing your Workspace
Your workspace is, ideally, an extension of your mind. We must remember the Einstein quote, “If a cluttered desk signs a cluttered mind, of what, then, is an empty desk a sign?” At the same time, Thomas Leonard said, “Clarity affords focus.” How do we reconcile these two into an optimized middle ground?
Optimize Your Workflow
When it comes to getting things done, most people have a duality of opinion, either you focus on one thing or multitask. There are pros and cons to both like focus (higher focus in the single task) and speed (higher speed in multiple tasks -kinda). Interestingly enough, I disagree that these are the only two […]
iTunes Tips and Tricks
So you have a 100 GB music library? How many duplicates do you have? Incomplete track data? Incomplete album art? Bad sound quality? As a musician, this happens to me constantly. Included with this blog post is a video of me demoing all the software I recommend and how to implement that software (and a […]
Hard Drive Security
Let me give you a hypothetical situation: you’re selling your computer on eBay or Craigslist and you clean out your hard drive so no one can get your personal information. You clean your hard drive by reformatting, removing the partition, or deleting all your personal files, moving it to the recycle bin, and emptying the […]
iWork and Microsoft Office
You have a Mac. You want to be able to create documents and there are 4 options for you. 1) iWork 2) Microsoft Office 3) Open Source Software 4) Web Based Software Both options 3 and 4 are valid and reasonable options, for your office needs. For this particular post we will be covering iWork […]
Microsoft Needs Security Help…From Apple
Wow Zach, that’s a little obvious. Of course Microsoft needs help with security from Apple…haven’t you seen the commercials? Well, I have and Linux is just as secure because it too is built on UNIX (Hence techies like myself calling it *nix…* (an asterisk) represents any character(s), U and Li both work here making it […]