For many years now security experts have been warning others about fraudulent e-mails and scams. Even after the warnings, there are still people who are taken in by these frauds and scam artists. The cost to those who are taken…Continue Reading →
For many years now MP3 music files have become mainstream. With the enormous number of MP3 players on the market, it seems everyone owns one. It is hard to walk down the street and not see anyone listening to their…Continue Reading →
I have written several posts with regards to securing your wireless network connection. In many of those posts I have talked about choosing WPA over WEP, and briefly explained why I do that. In a post titled Network Glossary of…Continue Reading →
Like many of you, I have been surfing the Web for many years and have visited hundreds of Web sites. I have found Web sites through search engines, e-mails, and other Web sites. Many of these Web sites have a…Continue Reading →
A little while ago I wrote a post titled How To Keep Your Computer Running Smoothly where I explain several tools you should install and use to help keep your computer running. In this post I will provide step-by-step instructions…Continue Reading →
In a previous post title Designing Web Pages: Tables or CSS, I briefly talked about using CSS to layout the content of a Web page. I didn’t go into detail about how CSS files are used in conjunction with Web…Continue Reading →
I recently created a post titled Securing Linksys WRT54G Wireless-G router in which I provided step-by-step instructions on securing the WRT54G router. The Linksys WRT54G Wireless-G router is a popular router, but it isn’t the only one on the market. In this post I will discuss how to secure another wireless router, the D-Link DI-524.
There is some debate recently about the best method to design and layout a Web page. Traditionally, HMTL tables have been used to handle the layout of a Web page. Today, however, a new layout method is gaining more popularity…Continue Reading →