While in the Dominican Republic I made it my personal mission to gain data access on my smartphone. Over the years, this process has become easier as the companies have accommodated smartphone users. With an unlocked smartphone, you can get reliable and useful pre-paid cell phone and data access in the Dominican. I’ve learned a few things along the way that you’ll want to know if you plan to do this.
For this guide, I wanted to show you the steps involved in creating your first Windows program. For many, learning to create an application seems out of reach. When I’m trying to understand something, it can be good just to start and explore. This guide will show you the basics of building a Window program; from downloading the free development tools, to coding a basic application, to testing it. There are many tools, languages, and environments from which to develop, but if you just wanted to get started with something simple – this is a good place to start.
The most important line users cross with any software is the point of running (or installation). This is usually where you have a need to fulfill (like play video), and a software title in mind (like VLC media Player). But, since you’re a cautious user who doesn’t assume a virus scanner is perfect, and you don’t wish to be infected by malicious software – you want to be proactive about protecting yourself. What do you, then? Here are some proven strategies to help ensure you stay safe.
Taking screenshots is one of the most common things you’ll do with your computer. You may want to record something you can’t easily save, and want it clearer than taking a picture of your monitor would yield.. Screenshots are also great for grabbing an error on your screen and sending it to a support person for help. In some cases, you can use them to tell a story. Today’s Basics article is about taking screenshots.
The scenario: You need to get a copy of Microsoft Office 2010 installed on your Windows-based computer, but don’t wish to buy a copy the Application. You heard there were free options available for this software but we’re sure how to get the application installed. Included in Microsoft Office 2010 Starter are stripped down versions of Microsoft Excel, and Microsoft Word. In this article, you’ll install a copy of Microsoft Office 2010 Starter or a trial version for free on your Windows 7 or Windows 8 computer (sadly, Windows XP is not included).
So, you have a website or domain and are hosting useful services like email, a website and possibly even cloud storage. This is all great, but the day comes when you want to make changes or an expiry happens and the “Hosting” word rears it’s ugly head. Who is hosting my servers? What do I need to have a website or keep it online? What are all the key elements of a domain or website? Look no further, I will explain this (and more).
When asking a Tech Support person, or someone you trust to remotely assist you, they may ask you “What is your computer name?” or “Please find me your computer name”. This process can be quite challenging for some people since every new operating system seems to change the process ever so slightly (while manufacturers, don’t).. Well, fear not – I’m going to list the simplest of ways to get that information so you can supply the details you need and move on.
Recently, I was asked a question “How can I tell if someone has placed spyware in my computer to track my stuff or remote control to see what I’m doing?”. This is probably one of the more common questions I’m asked from people who fear the worst from an ex boyfriend, employer or perhaps that suspect room-mate. It’s natural to fear the worst when complicated systems might have been left in the hands of those who might be somewhat untrustworthy. In this article, I’ll try to go over some of the ways you can tell if these things might be happening, and how to prevent some of them from occurring altogether.
Right now, one key reality of supporting Windows computers is that they get viruses. There are more viruses for Windows than on any other computer Operating System that you can get. So, it should come as no surprise that I’m quite interested in what can be done to combat threats on a Windows computer with tools you already have. Today I’m going to look at three tools you’ll find on most any Windows flavour out there: Windows XP, Windows Vista, and Windows 7. Namely, wmic and taskkill. This is going to be more of a beginning overview of how you might use these tools to identify and stop a rogue application on your computer
When you’re in this business of fixing and maintaining technology – one of the most common questions you’ll be asked is “What do I look for in a new computer?”. While I’m usually obliged to ask for more about the prospective computer in question – sometimes the brand names come up and sometimes it’s just a general question because the customer wants to buy a new one. Coming to me (the IT Guy) is a good step and a worthwhile use of time, but without me, what kind of stuff can you do to find the computer that’s best for you?