Avoid the Nasty Internet Bugs

Everywhere you go on the internet, there are pseudo buttons for fake downloads. These fake downloads can actually be advertisements to legitimate software downloads, the only difference is they are bundled with toolbar add-ons, ad-ware, spyware and other junk that will make your internet computing time very frustrating, to say the least!

Learning how to avoid the pitfalls of loading these programs on to your computer is a valuable skill. The people doing this have got so sneaky about how they are promoting these that it is difficult for even the experienced geek to catch them! Many of us fall for these tricks or they wouldn’t be so widely used. Continue reading Avoid the Nasty Internet Bugs

Forty Maps That Explain the Internet

A Vox article shows you how to better understand the Internet via forty maps.   Some of the information is truly stunning, like who has the world’s best overall broadband speeds.


Permanently Deleting Files on a Mac

I had a staff member ask me how they could permanently delete/erase a file off an Apple Mac hard drive.    I thought it was a good question for a “Tip of the Week”.

The below Macworld article  talks about two built in Mac utilities that you can use to permanently delete/erase a file off a  hard drive.


Windows 7 and Windows 8 Shortcut Keys

This week’s “Tip of the Week” concerns shortcut keys for Windows 8 and Windows 7.   The link to an online Yahoo Tech Article below by well-known tech writer David Pogue notes eleven useful shortcut keys for Windows 8.

However, eight of those shortcut keys also work for Windows 7 (I tried all the shortcuts on my Windows 7 workstation).   Only shortcuts #3, #10 and #11 listed in the article work for Windows 8 solely.


This is What it Sounds Like When You Put Tree Rings on a Record Player


This is an excerpt from the record Years, created by Bartholomäus Traubeck, which features seven recordings from different Austrian trees including Oak, Maple, Walnut, and Beech. What you are hearing is an Ash tree’s year ring data. Every tree sounds vastly unique due to varying characteristics of the rings, such as strength, thickness and rate of growth.

Keep in mind that the tree rings are being translated into the language of music, rather than sounding musical in and of themselves. Traubeck’s one-of-a-kind record player uses a PlayStation Eye Camera and a stepper motor attached to its control arm. It relays the data to a computer with a program called Ableton Live. What you end up with is an incredible piano track, and in the case of the Ash, a very eerie one.

Hats off to Traubeck for coming up with the ingenious method to turn a simple slice of wood into a beautiful unique arraignment. It makes you wonder what types of music other parts of nature would play. (see video below)

Source/credits: Bartholomäus TraubeckLive Science , VimeoExpanded Consciousness, where this was originally featured.

Find My iPhone Users Using App to Track Down Thieves Themselves

Apple’s “Find My iPhone” feature has been very helpful in law enforcement tracking down stolen Apple iPhones, Apple iPads and Mac laptops.  In fact, the New York City Police Department highly recommends the use of “Find My iPhone”.

But some iPhone victims are using “Find My iPhone” to take the law into their own hands by tracking down thieves themselves.  As a result, it’s potentially putting those victims at risk.

Internet Explorer Zero Day Exploit

Microsoft, along with several news organizations this morning, is warning users this morning that there is a newly found security flaw in all version of Internet Explorer and that there have been known attacks by malware software writers to take advantage of this flaw.

Microsoft, as well as KrebsonSecurity, a well-known IT Security news web site (which I highly recommend), is recommending that users download and install EMET, which will protect Internet Explorer from potentially being hacked due to this security flaw.  EMET stands for “Enhanced Mitigation Experience Toolkit”.    EMET by default protects all Microsoft Office Suite products and Internet Explorer.   I currently run EMET on my computer.   You can download and install EMET by clicking on the link below. Continue reading Internet Explorer Zero Day Exploit