• techlady

    March 31, 2010

    Fun Twitter Tools

    By / March 31, 2010

    Twitter is here to stay. That is a fact that cannot be disputed. Nevertheless, how it evolves and sustains itself is something that cannot be envisioned yet. With Twitter CEO Evan Williams announcing the launch of the @anywhere service promulgation of Twitter, practically anyone connected to the web will have access to Twitter without necessarily… Read more

    The Mysterious Green Light on the Motherboard

    By / March 27, 2010

    Opening up a PC is a task for those who know what they are doing. In the event that you have opened up the casing and just glanced inside, you might have noticed a strange green light on the motherboard. The mystery behind this little green LED light is actually quite simple. To understand this… Read more

    Get Rid of Piggybacking Spyware

    By / March 27, 2010

    Although the thought of software taking a piggyback ride on another sounds funny, the results of downloading and using such software are not. Piggybacking occurs in two forms, malicious and non-malicious. The non-malicious kind comes along with “decent” software. For example, reputed software providers like Adobe include an already pre-selected option to install a web… Read more

    Connecting a Laptop to a TV

    By / March 19, 2010

    There are various reasons as to why users would want to connect their Laptops to their TVs. Doing so is not really a difficult task, but it does require a basic knowledge about ports and cables. If you have to hook up your laptop and TV, then the first thing to do would be to… Read more

    Computer Rental as an Alternative to Purchasing

    By / March 19, 2010

    Renting a computer is an option that works for a select few. Anyone who wishes to own a computer should not consider this option as the rental cost in the long run will be greater than the cost purchasing a computer. For example, assume that a computer costs $1000 and rental costs $50 a month…. Read more

    The Basics of IPV6

    By / March 13, 2010

    TCP/IP is the protocol used for communication on the internet. IPV4 is the version of the protocol that is currently in use. You may be surprised to learn that this protocol has been in service from a time before the internet. In computer tech terms, that is a very long time. The time has finally… Read more

    Choosing a Virus Scanner – The Basics

    By / March 13, 2010

    It is surprising that many users do not bother with virus scanners until they have been infected. Actually many users do not even know that they have been infected and continue using their PCs without a virus scanner, blissfully unaware of the havoc these viruses are wreaking. Viruses come in many forms and this is… Read more

    USB or eSata?

    By / March 6, 2010

    One major grouse of any computer user is the lack of storage space. As hard drives grow in size, files also seem to grow exponentially. It is hard to imagine a time when 1.44 MB floppy disks allowed a user to carry around multiple files. As users run out of storage space and physical space… Read more

    A Short Introduction to Biometrics

    By / March 5, 2010

    Through the ages, verification of a person’s identity has always been an issue. Many different methods have been used over time, each replacing the previous one when loopholes were found. As successive technologies “fail”, security breaches and transaction fraud grows in numbers and in magnitude. This is why researchers are trying to perfect security systems… Read more

Back to Top