Would you like to protect your Windows, Macintosh, Linux, or handheld computer from known "phishing" web sites? Would you like your computer to correct typo errors when you enter web... More > addresses? Would you like your computer to run faster when surfing the web? One service can do all that. Best of all, it is available free of charge.
Would you also like to have your computer automatically correct your typo errors when you enter web addresses (URLs)? For instance, if you enter "www.eogn.cm," wouldn't be nice if your computer "knew" that you wanted to end the address in "com" and automatically took you to www.eogn.com instead?
Would you like your computer to surf the web faster than ever before?
Best of all, would you like to do make these improvements to your computer in a minute or two at no charge?< Less
I own and operate a number of web sites, including http://eogn.com for this newsletter. I realize that having graphics, especially a site logo, adds appeal to the site, encouraging visitors to return... More > time and again. Creating such a logo is a problem for graphics-challenged individuals, such as myself.
Until recently, I had a choice of two methods of creating logos: (1.) do it myself, resulting in something that is rather crude looking, or (2.) hire someone to create the logo and other graphics for me. Now, thanks to computer software, I have a third choice.< Less
Podcasting is the latest method of distributing multimedia files, such as audio programs or videos, over the Internet for playback on personal computers or on portable music players. These broadcasts... More > are rapidly becoming very popular on the Internet. What began as a way of broadcasting music to iPod devices (hence the term “podcast”) has grown to include many kinds recordings that anyone can enjoy from any computer connected to the internet. It’s now easy and cheap enough that people like you and I can add recordings to our own web sites or to the web site of our local genealogical society, historical society, or museum.< Less
I used to have a spam mail problem. Everybody receives spam mail these days; but because my e-mail address is plastered all over the Web, I get more spam mail than most people. The "spam... More > harvesters" that scour the web looking for e-mail addresses always find mine. About 400 spam messages per day bombard me, many more than the number of legitimate e-mail messages I receive.
A few months ago I found an easy solution. It works on Windows, Macintosh, and Linux. It deletes about 99.9% of the junk mail, and more importantly, it never deletes a legitimate message. I went from 400 or more spam mails per day in my in-box to less than five.< Less
Sending large files to other people, such as photographs, GEDCOM files, word processing documents, PowerPoint slides, video from your digital camera, or other large amounts of information can be... More > problematic. To be sure, there are many ways of accomplishing the task, but none of them are very convenient.
All of this is complex enough make it difficult to send files to only one person. How about situations when you want to send pictures or other files to everyone at the last reunion? Perhaps 50 or 100 people? Perhaps some of them are using Windows while others use Macintosh. How do you handle that?
The "simple" task of sending a few files to a group of people quickly becomes complex. Luckily, there is an easy answer. Best of all, the solution is available free of charge.< Less
Computer malfunctions can destroy your data at any time without warning. The most common cause of data loss, however, is human error. More than once, computer users have exclaimed, "Oh... More > @#$%^&*, I didn't mean to delete that!"
Having a recent backup available is the best way to recover from both manmade and other file losses. Computer experts will also tell you to store backup copies of your files "off site" to protect them from major catastrophes, such as fire, flood, tornado, hurricane, or other damage that can destroy computers and backups alike.< Less
Genealogists often scan old family photographs. Once digitized, it is easy to use these photographs in any number of ways. For instance, I carry a few hundred photographs with me most everywhere I... More > go. Luckily, I can easily carry thousands of old family photographs inside my shirt-pocket.
This is a great convenience at family reunions, genealogy meetings, and elsewhere. It is easy to show photographs to others when you carry a huge photo collection in your shirt pocket or in a purse.< Less
Many people believe that, when a computer dies and will not boot any more, all data is lost forever. They assume that all the files on the hard drive have disappeared and that nothing can be done... More > about it. In some situations, that may be true. However, after repairing many computers over the past 36 years (starting long before the invention of the PC), I can assure you that most or all the data can be recovered in a high percentage of computer failures.< Less
Computer prices keep dropping and dropping. You can now find desktop computers selling for less than $500. One low-priced example may be found at Wal-Mart.com. It is now cost-effective to use two or... More > mroe computers. Also, wwhen you purchase a new computer, you may wish to continue using the old one also.
Do I have room for two monitors, two keyboards, and two mice (or is that "mouses?") on my shrinking desk? Absolutely not! Could I connect the same monitor, keyboard, and mouse to whatever computer I need at any given time?< Less
Your computer is under attack! If you ever connect your computer to the Internet, it is constantly exposed to viruses, spyware, password-stealing programs, and more. The unprotected computer can be... More > compromised within seconds after going online.
This article will discuss Windows systems. To be sure, viruses, spyware and other attacks theoretically could exist for Macintosh and Linux systems. However, experience has shown that such problems are very rare on Linux and Macintosh. Ninety-nine percent of the attacks occur on Windows systems because of its popularity and its many security holes. Luckily, a few simple precautions can keep your Windows computer safe and secure.< Less