Member-Submitted Links to Articles of Interest

Top Reason: M$ in absolute panic mode to push up Windows 9 RTM from Apr 2015 to Nov 2014 to stem $22 Billion loss in the business channel!
/ Posted by: Scott K. Anderson / April 2014
Heartbleed vulnerability. What it is, and what you need to do.
/ Posted by: Steve Shank / April 2014
Chromebooks begin a new generation of easy to use, fast, low maintenance and inexpensive computer appliances. Some benefits and limitations are discussed.
/ Posted by: Steve Shank / April 2014
New USB 3.1 Spec Expects finalization in July. Could replace both standard and micro usb. Reversible, plug it in either way. Also faster and smaller.
/ Posted by: Steve Shank / April 2014
An interactive and continuously updated submarine cable map showing fiber optic cables runs across the globe.
/ Posted by: Christian Martin / March 2014
Christian Martin's slides from the February presentation on Office 2013 and Office 365 for IT Consultants.
/ Posted by: Christian Martin / March 2014
Windows 9 coming in 2015, will try its hardest to distance itself from the Windows 8 train wreck!
/ Posted by: Scott K. Anderson / March 2014
DuckDuckGo offers great search results and no data collection. I show how to make it the default in Chrome and Firefox browsers, and on Android mobile devices.
/ Posted by: Steve Shank / February 2014
Google admits data mining student emails in its free education apps, even when ad serving is turned off.
/ Posted by: Christian Martin / February 2014
These instructions will guide you through disabling the Backstage screen and changing the default location to which Office 2013 saves files.
/ Posted by: Christian Martin / February 2014
Two days after leaving the last OCCA meeting, where I admitted that "I always stay logged in" I learned a lesson. Coincidence? ;)
/ Posted by: Scott Hendison / February 2014
This is the powerpoint slideshow for the presentation I made to the OCCA on January 28,2014.
/ Posted by: Lis Baccigaluppi / January 2014
Introducing Windows 8.1 For IT Professionals [Kindle Edition] by Ed Bott.I haven't read it all yet, but hey, the Kindle edition is free.
/ Posted by: TimC / January 2014
Each year the EFF publishes a report on what major internet companies are doing to protect our privacy. This year's report is now available.
/ Posted by: Steve Shank / January 2014
The power of crackers at breaking passwords has increased tremendously. What this means and what to do.
/ Posted by: Steve Shank / October 2013
PC World did an excellent job selecting and describing 10 Open Source free business software applications.
/ Posted by: Steve Shank / October 2013
Excellent free SSL Server test. Use it to test SSL connections to important places. This article explains the test and how to interpret the results.
/ Posted by: Steve Shank / August 2013
A categorized list with links of my favorite Android Apps, including those for work, news, and clients.
/ Posted by: Steve Shank / June 2013
An explanation of and guide to using truecrypt as a file,with an entire partition, or on a flash drive.
/ Posted by: Steve Shank / June 2013
EFF checks which major Online companies fight for our privacy from government prying. Here's their table.
/ Posted by: Steve Shank / May 2013
Miscreants can make money from attacking your computer even if you just use it for email. This article explains how they make money attacking your computer.
/ Posted by: Steve Shank / April 2013
How to turn on Click to Play in Firefox and Chrome. This prevents Flash, Java and Silverlight from running without permission.
/ Posted by: Steve Shank / April 2013
George Shubin sent me a link to Scott's video, and I decided it was so important I put it on every Windows 8 machine that leaves my office.
/ Posted by: Steve Shank / February 2013
It's always more efficient to keep your hands on the keyboard as much as possible. Here are some Windows 8 keyboard shortcuts that are good to know.
/ Posted by: George Shubin / February 2013
How to add a signature to a PDF file so you don't need to print, sign and scan to return a signed copy electronically.
/ Posted by: Steve Shank / February 2013
A look at the scope and marketing used to spread the Zeus (Citadel) Trojan. It is one of the most widely spread trojans ever made.
/ Posted by: Steve Shank / December 2012
Three mini book reviews related to computer security: two novels by Mark Russinovich and a biography by Kevin Mitnick, the world's most famous hacker criminal.
/ Posted by: Steve Shank / December 2012
Help creating a multiple boot cd or usb drive for data recovery, virus recovery and other troubleshooting. Puts multiple tools on one disk.
/ Posted by: Steve Shank / December 2012
Make Windows 8 Useable for development and testing. Just for GRINS - say NO to METRO!
/ Posted by: Scott K. Anderson / November 2012
Windows 8 vs. OS X Mountain Lion, Macs: 10 Reasons to Pick Apple. M$ should have kept Win7 on DT & LT and Win8 on Mobile Dev & Tablets like Apple!
/ Posted by: Scott K. Anderson / November 2012
Official inside Intel IT position: "Windows 8 is too cumbersome & disruptive to deploy!"
/ Posted by: Scott K. Anderson / November 2012
Intel Windows 8 development team uses Classic Shell to switch between METRO & classic windows shell to get REAL development work done.
/ Posted by: Scott K. Anderson / November 2012
Will Windows 8 Succeed: An Analysis of the Tablet & PC Markets
/ Posted by: Scott K. Anderson / November 2012
Windows 8 launch: three year user backlash predicted
/ Posted by: Scott K. Anderson / November 2012
Windows 8: Not even Microsoft thinks businesses will use it.An entire enterprise cycle binned in Metro madness.
/ Posted by: Scott K. Anderson / November 2012
7" tablets and E-ink readers, covering various ecosystems and DRM. I also compare the Nexus 7 with the new Kindle Fire HD.
/ Posted by: Steve Shank / October 2012
How are passwords stored? What are hash tables and salting? What are the clues that a website is using insecure methods?
/ Posted by: Steve Shank / October 2012
With or without touchscreen, Windows 8 offers few advantages and poses a severly business disruptive learning curve.
/ Posted by: Scott K. Anderson / October 2012
The Immaturity & Reliability Of The Cloud Business Model including Multiple Regional Critical Business Connectivity Failure Issues Impedes Adoption.
/ Posted by: Scott K. Anderson / October 2012
Ars Technica article on the release of a new and improved BlackHole 2.0 Hacker exploit kit. Examine the new features of this top notch package.
/ Posted by: Steve Shank / September 2012
This is a wonderful book, well worth your time, thoroughly enjoyable, and eminently readable: a balanced telling of an unbalanced life.
/ Posted by: George Shubin / September 2012
An article clarifying the need to vacuum computers in order to reduce heat. Links to free fan and heat reporting programs are provided as well as guidelines.
/ Posted by: Steve Shank / August 2012
Don't let these three myths prevent you or your company from considering development of a new mobile application.
/ Posted by: George Shubin / July 2012
These 7 sins of custom programming may not always be deadly, but they can endanger the programmer if he's around when the new software is tested in the office!
/ Posted by: George Shubin / June 2012
Governments are buying exploits from hackers and keeping them secret. This changes the economics of hacking making the Internet more dangerous.
/ Posted by: Steve Shank / June 2012
What if having a house designed and built was treated the same way many software projects are treated?
/ Posted by: George Shubin / June 2012
The ICSI research group at Berkeley has created a tool for troubleshooting your Internet connection issues and providing a very useful diagnostic report.
/ Posted by: Steve Shank / May 2012
SQL Server 2012 brings important changes, not all of them good.
/ Posted by: Kurt Survance / May 2012
When configuring your router, it is important to turn off WPS because it is a gigantic security hole. Here's how.
/ Posted by: Steve Shank / May 2012
Back to Top