Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

Sunday Beauty #113 (and a Sunday Ugly too)

Here’s another interesting image for your Sunday.

Lion, Kruger Park, South Africa

Click on image to see more by this artist

“Lion, Kruger Park, South Africa” by Dimitry B, courtesy of Flickr Commons

(How’s that for a “unforgettable face”?)

Sunday Ugly:

spam1_26_13

Beware the Easy e-card

Here it is – 2013 – and criminals still think sending this *crud* is an effective money-making strategy. Why?
Certainly, the cost of mailing is negligible (aka “free”) but why bother if nobody answers?
Oh. Some *humans* must still be responding to them.

rocks.jpg

Don’t have people comparing your IQ to a box of rocks: resist the “curiosity” and simply practice the Basic Rule of Email – Do Not Open Email from People You Do Not Know. (sorry, “Dr Peters”.)

Today’s quote:The best way to cheer yourself up is to try to cheer somebody else up.” ~ Mark Twain

(Yes, I’ve posted this one before. But my spidey-sense tells me to post it again today…)

Copyright 2007-2013 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

January 27, 2013 Posted by | cyber crime, Digital Images, spam and junk mail | , , , | 8 Comments

Topics Of Interest

Busy day here, but I found some good articles whose topics I hope you will find interesting, and the info provided, valuable. Some “recommended reading”, if you will.

How The New ‘Protecting Children’ Bill Puts You At Risk

A bill now makes the online activity of every American available to authorities upon request under the guise of protecting children from pornography..

“Protecting Children” forces ISPs to retain customer names, addresses, phone numbers, credit card numbers, bank account numbers, and dynamic IP addresses..

It’s like having your wallet plus the web sites you visit tracked and handed over on request. These logs are now going to be retained for the scope of one and a half years.Read more..

(Those of you with a brain might wanna make a point of reading this one.. This is just plain wrong [IMHO]. The article contains a link for voicing your opposition.)

• 10 ways to safeguard your college-bound student’s computer

You protect your corporate systems, but what about that back-to-school laptop you just bought your kid? Here are some things you can do to keep your student safe from cyber dangers.Read more..

Five reasons Android is superior to the iPhone

While on vacation, I was reminded (yet again) how superior the Android platform is to the iPhone.Read more..

Creating Shortcuts to Google’s Gmail, Docs, Tasks, Calendar and Contacts

I am a big Gmail user and have come to depend on Google’s Gmail and many of the other Google apps as an online personal information manager.Read more..

Three things Chromebooks need to fix to win buyers

While Chromebooks have the potential to win corporate customers, I still think three things need to happen before Chromebooks will attract consumers and businesses in large numbers.Read more..

The 10 Best Apps Of July From The Daily App

From Google+ for iPhone to Firefox for Android, here’s a glimpse at the best mobile apps we’ve featured in July on The Daily App blog.Read more..

10 things you should still do to every Windows PC

There are at least 10 things you should take a few minutes to do to every new Windows PC to get it ready for daily use. Don’t let your back-to-school PC drag your first semester down. Read more..

10 Cool Security Features In Mac OS X Lion

No doubt, when it comes to security, Apple’s new Mac OS X Lion is shedding its spots and is ready to roar. As the dust has settled on the release of Apple’s Mac OS X Lion, unveiled July 20, experts have started asking, “Yes, but is it secure?”Read more..

And for the super-Geeky.. (Here at T4E Headquarters, “geek” is a compliment.)

i-NVMM: Securing non-volatile memory on the fly

Computer memory is a treasure of unencrypted information. Fortunately, power off and it disappears. That’s not the case with next-generation memory.Read more..

10 Biggest Cyber Attacks Of July

The lazy days of summer were anything but for hackers this month. If anything, hackers were ramping up their efforts under increased pressure from international and domestic law enforcement agencies.Read more..

(Hmmm.. maybe you all should look at this one also..)

Today’s quote:I never had a policy; I have just tried to do my very best each and every day.”  ~ Abraham Lincoln

Have a great day, everybody. And what do you say, let’s do the right thing.

Copyright 2007-2011 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


August 2, 2011 Posted by | advice, Android, Apple, computers, cyber crime, Google, Internet, Microsoft, mobile, News, security, tech | , , , , , , , , , , , , , , , , , , , , , , , | 11 Comments