While in the Dominican Republic I made it my personal mission to gain data access on my smartphone. Over the years, this process has become easier as the companies have accommodated smartphone users. With an unlocked smartphone, you can get reliable and useful pre-paid cell phone and data access in the Dominican. I’ve learned a few things along the way that you’ll want to know if you plan to do this.
The marketplace for entertainment is a changing fast. A large number of people are moving away from cable television, and looking for lower cost alternatives. They want the flexibility of seeing TV shows and movies on their terms, but also want a better selection than the cable television providers offer. This article is for you, cord-cutter. Here is what I consider the ideal path to killing that ongoing cable TV package.
For this guide, I wanted to show you the steps involved in creating your first Windows program. For many, learning to create an application seems out of reach. When I’m trying to understand something, it can be good just to start and explore. This guide will show you the basics of building a Window program; from downloading the free development tools, to coding a basic application, to testing it. There are many tools, languages, and environments from which to develop, but if you just wanted to get started with something simple – this is a good place to start.
Taking screenshots is one of the most common things you’ll do with your computer. You may want to record something you can’t easily save, and want it clearer than taking a picture of your monitor would yield.. Screenshots are also great for grabbing an error on your screen and sending it to a support person for help. In some cases, you can use them to tell a story. Today’s Basics article is about taking screenshots.
iPhone, iPad, iMac. Apple makes all sorts of devices that you may want information about. If you want to find out how old your iDevice is, or whether you qualify for warranty support – you will need your serial number and modem number. Sometimes, it’s easy to find, but you may not know how to find it on all your iDevices. Today’s basics column covers the basic process of finding out your device’s serial number and model number.
The scenario: You need to get a copy of Microsoft Office 2010 installed on your Windows-based computer, but don’t wish to buy a copy the Application. You heard there were free options available for this software but we’re sure how to get the application installed. Included in Microsoft Office 2010 Starter are stripped down versions of Microsoft Excel, and Microsoft Word. In this article, you’ll install a copy of Microsoft Office 2010 Starter or a trial version for free on your Windows 7 or Windows 8 computer (sadly, Windows XP is not included).
So, you have a website or domain and are hosting useful services like email, a website and possibly even cloud storage. This is all great, but the day comes when you want to make changes or an expiry happens and the “Hosting” word rears it’s ugly head. Who is hosting my servers? What do I need to have a website or keep it online? What are all the key elements of a domain or website? Look no further, I will explain this (and more).
When asking a Tech Support person, or someone you trust to remotely assist you, they may ask you “What is your computer name?” or “Please find me your computer name”. This process can be quite challenging for some people since every new operating system seems to change the process ever so slightly (while manufacturers, don’t).. Well, fear not – I’m going to list the simplest of ways to get that information so you can supply the details you need and move on.
Recently, I was asked a question “How can I tell if someone has placed spyware in my computer to track my stuff or remote control to see what I’m doing?”. This is probably one of the more common questions I’m asked from people who fear the worst from an ex boyfriend, employer or perhaps that suspect room-mate. It’s natural to fear the worst when complicated systems might have been left in the hands of those who might be somewhat untrustworthy. In this article, I’ll try to go over some of the ways you can tell if these things might be happening, and how to prevent some of them from occurring altogether.
Right now, one key reality of supporting Windows computers is that they get viruses. There are more viruses for Windows than on any other computer Operating System that you can get. So, it should come as no surprise that I’m quite interested in what can be done to combat threats on a Windows computer with tools you already have. Today I’m going to look at three tools you’ll find on most any Windows flavour out there: Windows XP, Windows Vista, and Windows 7. Namely, wmic and taskkill. This is going to be more of a beginning overview of how you might use these tools to identify and stop a rogue application on your computer