If you have been following this column for past couple of weeks, and I know that you have, you may have noticed a subtle trend. First the go...

The Non-Technical Tech Blog
If you have been following this column for past couple of weeks, and I know that you have, you may have noticed a subtle trend. First the go...
Connecting to the internet, is a major function of many home computer systems. To this end, the method by which you choose to make that conn...
Tis the season for 8. Version 8 that is. By now I’m sure that you are aware that both AOL and MSN have released the 8th upgrade to their sof...
Hard working, methodical, efficient, and reliable. These are all descriptions that can be used to extol the virtues of our essential tool, t...
For a variety of reasons privacy or clandestinity may become necessary. Computing is no exception to this rule. Therefore, this week we will...
This week I thought that I would take the time to address a serious problem. That problem is known as “Macaphobia”. Quinceys’ lexicology def...
We are a society that is obsessed with mobility and being in the information loop. There is an entire niche market whos’ sole purpose is to ...
One thing that I have noticed, is that the more that you learn about your PC, the more that you want it to do. Therefore, I guess that is on...
If you read the column last week then you are aware of some of the security measures that you can take to fortify your system against attack...
One of the often used buzzwords in our tech savvy society is hacker. People fear them, want to be them, but very few really understand them....
Do you have the need for speed? Our computers are our one-seated sports cars that take us on our travels through the cyber autobahn that you...
The world today can be a place of perils. Unfortunately, this also holds true for the cyberworld. One of the concerns of parents in the info...