Monday , 6 May 2024
Home 4 John Black (page 9)

John Black

A professional fast learner, with experience in the IT management, capable of technical troubleshooting to identify and solve problems.

How private are your private files

We all have digital information we wish to keep private, from a word document filled with improvisational notes about surprise party to work files and folders that contain commercially sensitive facts and figures, but knowing how to keep such data secure and away from nosy-parkers is not always obvious. For starter, there are many different ways to make files and folders private, and some options available in Windows XP are not offer in Vista and vice versa, finding the right stating point can be tricky. Where to start Begin by deciding what it is your want to achieve, for some the privacy problem will relate to using a work computer to store private files, perhaps to work on updating a CV during your lunch break, things you rather your boss didn’t see, I’m not going to delve deeply into this area because ensuring privacy on a PC you don’t own …

Read More »

Mobile Web Browser Will Travel

There’s no question that today’s smart phones are godsend to high tech travellers, but what good is a web enabled phone if its browser is cumbersome of slow, with the right handset and browser software, you can surf all manner of desktop level site, without having to carry a laptop with you or find a nearby desktop PC. Great out of the gate, Skyfire with its first full release candidate (Skyfire 1.0) which displays flash, Silverlight and AJAX content that the Iphone trips over and leaves blank, this browser starts up quickly and the main screen leaves plenty of room for the pages display plenty of room for the page display and windows mobile fans struggling with IE mobile should head straight for Skyfire Labs, It also work on Symbian powered Nokia E-series and N series smart phones. BlackBerry can run java apps out of the box, while newer models …

Read More »

Why Twitter needs security

The concept of twitter building networks to share teeny-weeny bits of information, who need to read a steady of people’s random thought each in 140 character or less, yet twitter is taking the world by storm, it’s number of active users has grown 900 percent from 2007 to 2008, and actually twitter can be quite helpful if you want to receive news updates, promote your business and connect with colleagues and friends. As great a tool as twitter is there are some significant security risks due to its very nature, as a result of imposing a 140 character limit on each tweet, user replace real URL with shortened ones, such as those created by the service TinyURL or Bit.ly.  Those who read the tweets have no way of knowing where the link leads until after they click it, making it extremely easy for mischief makers to funnel traffic to malicious …

Read More »

Switch phone call to Internet Calling

A phone line is indispensable, but its cost can sometimes seem intolerable, internet calling lets you use a phone or computer to place call to and from “real” phone number on the public switched telephone network (PSTN), internet calling plans can help you save money by capping call expense; they combine local, long distance and calling features, such as voice mail and caller ID that can cost extra on landlines. You should consider only those services that include unlimited incoming calls and no per-minute fees for outbound call, some packages include or allow to other country, such unlimited packages often have a time limit per month, tap cable and DSL bundle VoIP has a reputation for cracking sound quality and dropped calls, broadband operator have an advantage, they manage both your side and their side of the phone call, the gear they provide for your network talks directly to the …

Read More »

Make your computer go faster

Using the performance tab of task manager, you can access exactly how much of an impact program that hog lot of memory are having on overall performance, the constantly updating graphs show processor and page file, referred to as virtual memory usage but the really useful information is in the four panels that sit below them. Total panel, which records how many handles, threads and processes are currently in use, processes have already been identified as the individual task the PC is running, the number of threads tell you how many separate sets of instructions are being executed by those processes and the number of handles is the total number of resources of all types that windows is juggling. Although these figures offer a guide as to how busy windows is at any time, they’re only useful if you regularly keep an eye on them and have managed to detect …

Read More »

Trusted Sources Car insurance

Selecting a Car Insurance company is as personal as choosing a doctor. You need to find a Car Insurance company that offers what you need, grows with you as your family grows, and changes as your lifestyle changes. Of course, you also want to find the best deal, because while Car Insurance is a necessary expense, that doesn’t mean it has to be enormously expensive. Everybody would love to know which Car Insurance company is cheapest car insurance and affordable car insurance than all of the others, car insurance is an insurance policy that covers you for any likely repair costs if your car breaks down, you might have heard that you are more likely to get into a car accident than ever to get into a plane crash. For obvious reasons, this might be a good thing, but it also shows how often car crashes occur. If you park …

Read More »

The Connection between Online Sex and Online Security

Visiting any adult website can compromise your computer’s security, that notion is widely bandied about, even though common sense tells us that if it was that common then surely the online that is does, 12 million people whose computer were compromised by a virus over 6 month period, one million of them were result of visiting an adult web site, of course, all 12 million infections occurred because the hapless victim either had no anti-virus protection or out of date protection, but still that one million in six months infection rate for the online porn industry does reinforce the nation that, whether on the internet or in real life, the red light district is always a hazardous part of town. Another bit of research that found suggest that 31% of all the most dangerous web site out there contain adult content, based on a study of some 19 million site, …

Read More »