Article archive

03/03/2012 11:26

A hacker is a person who

A hacker is a person who creates and modifies computer software and computer hardware, including computer programming, administration, and security-related items. The term usually bears strong connotations, but may be either favorable or denigrating depending on cultural context (see the Hacker...
03/03/2012 11:24

Why Is Wireless Technology Is Taking Over How We Live

Wireless Internet technology, also known as WiFi, is really taking over the way people access the Internet and it has become widely popular in a very short time. The reason for this is it allows individuals to access the Internet via a network hot spot without the use of cables or wires. The...
03/03/2012 11:22

Introduction to Microsoft .NET Technology

In 2000, Microsoft announced its .NET software environment, a new addition to Windows. The .NET (“dot – net”) environment is effectively a “virtual computer” that runs on a real computer, with the advantage that any program written for it will run on any computer which is running .NET. One...
15/12/2011 19:36

Learn How To Set Up Your Domain Correctly

When setting up your web page there are more things to consider than the banners, font, pictures, forums, and colors you employ. In fact, one of the most important aspects of your web page is your domain name. Domains are important because they are the first thing people see in order to get to...
15/12/2011 19:33

My PC Is Slow, What Should I Do

No matter how good your system is, there’ll sure be a time when you face the slow pc performance syndrome. This is a universal problem every user sure to bounce into. So when do you consider your PC slow? When you discover that the booting up time is more than the usual loading time, there is...
27/11/2011 14:35

AMD Versus Intel CPU War

If you are in the market to purchase a computer there are many options in existence. You can purchase a Hewlett Packard, Gateway, IBM, or a custom built system. But there is one thing that all of these computers will utilize and that is a CPU (central processing unit). The CPU is responsible for...
27/11/2011 14:33

Internet Security and You - Take Action

It amazes me that for whatever reason people tend to overlook this problem time and time again. With the expansion of the Internet comes more threats. There are people in this world that want to cause harm to your computer, just because they can. You may not know when or where these attacks will...
07/11/2011 08:51

Spyware Protection - It's Not An Option Any More

The next time you nonchalantly browse the web, think about this: Someone could be watching you! If you have never felt the need for spyware protection on your PC, you may want to reconsider. Spyware and adware are universal terms used for software that performs particular activities such as...
07/11/2011 08:49

How To Choose Voice Recognition Software

Voice recognition software allows the user to use their voice as an input device so they can dictate text directly into the computer as well as give the computer commands such as open, save or close. Current software has come a long way from the first voice recognition software that was...
19/10/2011 19:11

How to Stop Spam in your Email

Spammers commonly find email recipients by using a spambot by searching for addresses on websites, forums, or Usenet groups, for example. Another way is to use a name generating type of software which produces likely common words, names, or numerical combinations of email addresses for the sole...

Search site


Follow MarikaGroulx on Twitter
SocialTwist Tell-a-Friend


Join the Mailing List
Enter your name and email address below:
Subscribe Unsubscribe