Deciphering the Hardware Specifications - RAM: Part 1
Purchasing hardware is not as easy as going to the local Electro-Mart and following the salesperson. You can choose on your own, but you must be …
Continue ReadingPurchasing hardware is not as easy as going to the local Electro-Mart and following the salesperson. You can choose on your own, but you must be …
Continue ReadingThe Epson Stylus Pro 4800 is a photo printer meant for professional photographers and graphic designers. It is a large format printer with 8 ink …
Continue ReadingIf you’re a Windows user looking to migrate to Linux then you might be concerned about a replacement for Outlook. Fortunately there is an …
Continue ReadingNo segment of the mobile PC market was more exciting then netbooks in 2008. 2009 promises to continue the endless stream of interesting netbook …
Continue ReadingThe GeForce GTX 285 is Nvidia’s newest powerhouse video card, but does it bring enough to the table to warrant an upgrade? We’ll take a …
Continue ReadingNvidia recently released a dual-GPU monster: the GeForce GTX 295. This card boasts high performance, but an equally high price tag. With this in mind, …
Continue ReadingWe’ve learned what ActiveX controls are. We’ve discovered the risks to installing them. So, what do you do if you already have ActiveX …
Continue ReadingNeed to convert a delimited text file into an Access 2007 table? This step-by-step guide will walk you through the importing process.
Continue ReadingThe Conficker worm’s rapid proliferation demonstrates the dangers of keeping systems in production that are not patched, or not patched …
Continue ReadingWe all know and agree that the User Account Control (UAC) is annoying in Windows Vista. Some users choose to disable the UAC completely, but we …
Continue ReadingIn the first part of this article series, I talked about what ActiveX controls were. Now I’ll discuss the potential risks involved with …
Continue ReadingEver wonder if what we type in a browser, email, chat, password managers and other popular application is safe from keyloggers or snoopers? In this …
Continue Reading