You have your new installation of Kubuntu on your computer. But you’ve found that it’s missing a few programs that you need to get up and running at full steam. How do you install what you need? This article aims to explain the different ways of installing programs in Kubuntu.
This article serves as a one-stop place to determine the Top Green IT Companies. It is a compilation of different lists with the reasons when applicable.
Cryptography. It’s not just the stuff of spy novels. Cryptography is found in places that you wouldn’t even imagine. You’ve probably been using cryptography, and don’t even realize it. This article will show you a few of those hidden locations.
You’ve looked into encryption procedures and protocols and have decided on the type that you want to use. But, how do you actually go through the process of encrypting a file or message? This article will serve as a step-by-step guide on encryption.
No one is really discussing how technology and going green go hand in hand. How are your computers going green? While everyone is discussing the need to go green, they’re not really helping you do it. This article will have tips for how to make your technology and computer a little greener.
If you use Outlook Express, Windows Mail (on Windows Vista) or Windows Live Mail (on any version of Windows including Windows 7), then you need to secure the client. This article will help you to maximize your security levels, and reduce your threat level.
If you are using Microsoft Outlook it’s fairly secure. However there are still steps that you should take to maximize your security– and minimize the risk of infection or phishing. This article will present the steps that you will want to consider.
“Hackers have infiltrated the power grid.” “Hackers stole credit card data.” “Hackers created a virus.” We’ve all heard and read these stories on the news. What are hackers though? In this article, I will discuss what hacking is, and what hacking isn’t.
When System Restore first appeared in the market, computer manufacturers and other companies claimed that it gave users “Peace of Mind” and that it could remove viruses and fix other problems with the computer. In this article, I will explore this concept, and shed some light on it.
In this article I will describe what a rootkit is, a little about the history of rootkits (including the famous Sony/BMG rootkit), the different types of rootkits, and finally I’ll touch on how to detect and remove rootkits.
You are looking for a free encryption solution. The two choices that you’ve narrowed it down to are Free OTFE and TrueCrypt. Read on for a comparison to help you decide which one to use.
Energy conservation is in. With the environment and today’s economy, money and energy saving go hand in hand. Microsoft helps you to calculate how much energy you will conserve in your Information Technology systems with their energy saving calculators.
Microsoft added something for Mozilla Firefox in their latest Service Pack for the .NET Framework 3.5 in February. An addon for firefox that enabled “Click Once” and the .NET Framework to function inside of the browser. In this article I will tell you how to remove it permanently.
Today the talk is “Green” and saving energy. One of the standards of “Green” is the Energy Star rating. But, how do you find an energy efficient computer? I will show how in this article.