A Joe job is the use of a fake return address in a spam message to make the message look like it's coming from a domain or sender other than the … [Read more...]
How to Use File Shredder to Permanently Delete Files
In the article "How to Securely Delete a File" we saw that using Windows to delete a file is not the way to do so securely. To completely delete a … [Read more...]
Social Engineering
There are far too many social engineering techniques than could be listed here but by giving a few examples you can get the idea of what sorts of … [Read more...]
What Do Those 404 and Other HTTP Return Codes Mean?
You try to access a web page but all you get is a mysterious code number. What do they mean? This page attempts to address that topic. Governing … [Read more...]
Things That Might Indicate Your Computer Is Infected
Despite the title, it's important to note that if your computer is infected you may not have any indication of that infection. Much malware leaves no … [Read more...]
Hardware Threats
Hardware problems are all too common. We all know that when a PC or disk gets old, it might start acting erratically and damage some data before it … [Read more...]
Original TUTOR(dot)COM
In 1985, Computer Knowledge prepared a basic tutorial about microcomputers and DOS. The exercise was to help students and to help me learn … [Read more...]
Tutorial Which Explains TUTOR.COM
A tutorial that explains the TUTOR.COM program itself and includes the shareware order forms (with address information redacted since it's now free). … [Read more...]
The Expanded Keyboard
A tutorial that explains the expanded keyboard (the keyboard with the function keys at the top). Below are the 22 screenshots that make up this … [Read more...]
The Original Keyboard
A tutorial that explains the original IBM keyboard (the keyboard with only 10 function keys on the left side). Below are the 23 screenshots that … [Read more...]