|
"They that can give
up essential liberty to obtain a little temporary safety deserve neither liberty nor
safety. " Benjamin Franklin ![]() |
Got a Problem? |
| Computing
News you can Use | Computing
News Quick Clicks |
Albion | Freeware
| Freeware From A-Z | Search this site | Security
| Virus Information
| Updated 11/05/09
| Disclaimer
|
Menus - Open a folder for associated links
10+
essential (and free) Windows applications
Copy
an Excel chart to the desired spot in a Word document Firefox
Vulnerable Through Old QuickTime Bug Hacked
.gov Sites |
How can you be sure your data is safe when off doesn't
mean inaccessible? A remote-control technology that is part of Intel's
VPro architecture raises some security questions.
How to troubleshoot a computer problem Video
Feed | What steps do you go through in order to diagnose a
computer problem? There's more than one correct answer, of course, but
here's one way to work through the troubleshooting thought-process. Tech
Republic's
most popular Windows XP resources
Bo's How To's: |
![]() |
![]() Even in the most carefully managed shops, software tends to get installed without authorization, and so from time to time you may need to reset the Microsoft Windows XP product key. Brien Posey shows you two effective ways to change the Windows XP product key: editing the registry and using a Microsoft WMI script. | TechRepublic ![]() |
Shortcut For Maximizing a Window This tip should save you some time throughout the day. If you ever need to maximize a window of some sort, don't fumble around looking for the maximize button in the upper right corner of the window. Just double click on the title bar instead. You won't have to worry about being precise for fear of hitting the close or minimize buttons instead. |
3 stubborn PC problems you can fixEver notice how each PC has a personality of its own? Or maybe even multiple personalities? In the course of a week, your computer may act friendly, moody, and sometimes downright mean. These tips, from Microsoft's How Tos may be just what you're looking for.
|
||||||
Artificial
brains for robots? Roland Piquepaille: An international team of European researchers has implanted an artificial cerebellum -- the portion of the brain that controls motor functions -- inside a robotic system. ![]() ![]()
|
![]() Robin Harris: Data loss is painful and all too common. Why? Because your file system stinks. Microsoft's NTFS (used in XP & Vista) with its de facto monopoly is the worst offender. But Apple and Linux aren't any better. ![]() ![]() |
Customization
tricks to save you time in Windows XP
From adding Safe Mode to the Boot menu to including UNC information in the
command prompt to displaying My Computer as a menu of drive options, these tips
will give you some great ideas about how to tweak WinXP to help you work more
efficiently.
Want more? See Bo's How to Pages
One
&
Two
Featured Freeware: |
|
CCleaner
1.29.295 - FreewareClean
up junk files and invalid Registry entries from your system, allowing it
to run faster and more efficiently. OS: Windows (all) McAfee
SiteAdvisor for Internet Explorer - Freeware |
|
![]()
101 Microsoft Windows XP Tips, Tweaks, and Hacks
|
![]() Microsoft Patches, Collect them all...impress your friends! |
![]() |
![]() ![]() |
![]() ![]() |
Check out Bo's
Recent Virus List
Check
out some Security Freeware
Digitally-Signed
Malware
We've got another case of malware being digitally signed. What does it mean for
the usefulness of this technique?
Read
this story | PCMag.com
Defendants
Convicted in 1st Criminal CAN-SPAM Trial
In what could be a highly-significant case, the perpetrators of a fairly big
spam operation have been convicted of violating the CAN-SPAM statute.
Read
this story | PCMag.com
Peer-to-Peer
Predator Pinched
Seattle Resident Gregory Kopiloff was arrested for identity theft and related
fraudulent activities related to his abuse of peer-to-peer networks.
Read
this story | PCMag.com
Spam
that just might kill you
Those who patronize unsolicited online pharmacies risk not only possible
identity theft, but their personal health as well, thanks to counterfeit
medications. CNET editor Robert Vamosi looks into the consequences of responding
to pharmacy spam and reminds us that if the prices are too good to be true,
chances are you're not getting the legitimate drugs you're supposed to be
taking.
When
is it safe to order drugs online?
More
on spam 'brandjacking'
News:
Net drug dealer gets 30 years in prison
All
Security Watch columns
SECURITY:
Beware Malicious RTF Files
There's
a mailware threat lurking that's been under our noses for years, lying wait in
embedded RTF files. Have you been hit?
Vinoo Thomas of McAfee's Avert Labs stumbled onto a malware issue that has been sitting under our noses for years: embedded objects in RTF, or Rich Text Format files. (He writes about it here www.avertlabs.com/research/blog/index.php/2007/05/ 25/rich-text-malware.)
Threats
Innobate
Product Key Recovery - Freeware
Recover and backup your Windows product keys.
Security Freeware | |
![]() |
IObit Security 360™ 100%
Freeware
![]()
Scan and Remove the Deepest Malware that Your Antivirus/AntiSpy
Missed
IObit Security 360 is an advanced malware & spyware removal utility that detects, removes the deepest infections, and protects your PC from various of potential spyware, adware, trojans, keyloggers, bots, worms, and hijackers |
For more on computing and security news,
click
here
Security Freeware Worth Your Download Time:
![]() |
Fake
Antispyware Fake antispyware software has been a problem for years, and this week we have two new examples. BraveSentry hits all the hot buttons: drive-by installs, false positives, and exaggerated claims in advertising. Read about it in the Fake Antispyware section. ![]() ![]() |
Dangers children face online
A recent study found that one in five children online is approached by a
sexual predator, a predator who may try to set up a face-to-face meeting. In a
Dateline hidden camera investigation, correspondent Chris Hansen catches some
of these men in the act. http://www.msnbc.msn.com/id/6083442/
Parents
shaky about kids' safety online
special feature Most parents say they
use monitoring software or content-filtering tools, according to new study.
C|Net
| Read full story
More protection through freeware
ParentalControl Bar is an add-on for Internet Explorer that helps parents
prevent their children from accessing adult-oriented Web sites. It comes with a
set of pre-defined filters based on sexual material, strong language, violence,
and other criteria, allowing the parent to select the appropriate filtering
options for their kid.
You can also add your own sites to a blocking list, or allow specific sites
by simply clicking a button in the newly added IE toolbar. The current version
only works with Internet Explorer.
Click
here to get your copy
For more Family Matters,
click
here....
Going Phishing? Hackers
are.
When crooks go Phishing, don't bite:
Top
Phish
Who wouldn't want to collect $20 just for answering a few questions in an online
survey? Find out what you pay for your free money in this week's Top Phish.
Read
this story
For more on Phishing,
Click
Here....
If you use
Microsoft Internet Explorer as your Main Browser, try
PhishGuard
a free service to detect scam sites.
This
week in phishing
Phishing
attacks skyrocket in 2004
5 Steps For Users
To Protect Themselves From Phishing Scams
Here are a few resources that you can check out to see
what scams are running rampant, and how you can avoid them:
FDIC
warns about e-mail 'phishing' scam
Internet ScamBusters
Avoiding
Internet Scams
ScamWatch
Internet
Scams - General Information
Go to
The
Page Index
& How To's -
Tired of Elevator music from your tech support personnel? Then skip the always on hold
dogma and come over to the light. Try:
Bohunky0's Tech Support Help Web
Latest Addition:
Add
Windows XP systems to Vista's Network Map with the LLTD Responder
Greg Shultz
Vista's
new networking interface, the Network and SharingVista's new networking
interface, the Network and Sharing Center, allows you to check your connection
status, troubleshoot connection problems, and see a graphical view of how the
computers and devices on your network connect via the Network Map -- but
normally, it can only see Vista systems and devices. Here's how
to add Windows XP to the Network Map and have Vista recognize it using LLTD
Responder.
Clean
Out Unused Device Drivers
More from Bo's Help and HowTo
Windows
Microsoft Office
The
Browser Wars
Found a problem? click
here
Go
to The Page Index
Questions and answers submitted to Bohunky0 or BLCOW are the property of Blaisdell's Little Corner of the Web and are not open for negotiation.
BLCOW reserves the right to edit, expand, or make clarification to any submissions to be used for instruction set without prior consent. News items are offered in capsulated form and is displayed under the American Freedom of Speech Amendment 1, and Citizens Freedom of Information Act (Citizens Right To Know Laws). If you feel your content was used improperly, please click here with an explanation and the location on this site of the questionable material. We will review, and in most cases, remove any content which is an infringement on intellectual or creative property. News snippets however, are not considered intellectual or creative property, they are considered News. If available, the site on which the news snippet was found, contains a link to that site's start or front page. We recognize that while we do not advertise or charge for space, others do and will never intentionally attempt to circumvent that right. It is up to the reader, rather or not, they wish to view the entire article.
No payment or sequesterment is asked for nor received on any of BLCOW content. It is free to view and free to use as long as we are showing these pages to the public. If there is something you would like to see on this site that has to do with computing, and isn't here now, why not drop us a line, maybe we can help. Click here
BLCOW is a family oriented site and is safe for use by anyone. Unfortunately, many of our pages are linked to off-site content. On occasion, these links may be sold to another party. The purchasing party may be porn sites or even hate group sites. We make every effort to monitor some links but unfortunately, some slip by us from time to time. We depend on your reports to keep this site safe and acknowledge that this would be impossible without your help. If you find objectionable content on this site, please drop us a line and let us know about it. We will make every effort to either rewrite the content or dispose of it. To tell us of objectionable material, please click here and tell us on what part of the site you found the material. Also, please copy and paste the material into the email form you will receive by clicking on the above link. The subject header is designed to alert our server of questionable material and is given top priority when it arrives in our inbox. We then pay strict attention to that email. In that light, please do not alter the subject header. Thanks, Bo.
Attention Telemarketers:
| Try Bohunky0's Tech Support Help
Web | Bo Explains
Internet Security Needs | Bo's Requested Conversions
|
Go to The
Page Index |
You are visitor Number
FastCounter by bCentral
As of November 1999
Bohunky0's Nature Tip
Preserve Nature
Pickle a Squirrel Today
Return to Comp.
News Index