It’s a common enough occurrence to hear about (or encounter) bugs in computers. Usually this refers to mistakes in the code, but every once in a while, it doesn’t. Case in point, twice now I have had literal bugs in my screens. Continue reading AIC: Bug in Screen→
Commentary From Elsewhere: In Defense of 8 Chan (aka 8ch.net)
If someone used a chemistry book to build a bomb (and kill people), do we outlaw libraries (as they can hold chemistry books)? Continue reading CFE: In Defense of 8ch→
Ever find an empty folder and wonder why it’s there? Realized you made a folder, but never got around to using it? Between backup tools, duplicate finders, and a habit of deleting files (not folders), I run into this sort of thing on a regular enough basis. No idea how common it is for everyone else, although I suspect it’s moderately rare. Continue reading TIFU: RED→
At a recent meeting I observed, a website was mistyped, which brought up a scam about the computer being infected (it wasn’t, it was fine). As typos are a thing, I’m sure this sort of thing happens all the time. So what do you do to prevent the scary scams? Continue reading uBlock, again…→
While I can understand why Microsoft would force updates, it can easily clash with the owner of a device being able to actually use their device. Thus it can be useful to prevent updates from happening at all. Continue reading Windows 10: Preventing Forced Updates→
For reasons, I found myself needing to know my brothers addresses. I knew where, in a physical sense, both of them lived, but not what to put on an actual letter to send through the postal system. While I could, and eventually did, ask them directly, I actually didn’t need to. I just wandered the street, virtually. Continue reading AIC: Brothers Address→
Computer drives being what they are, it is inevitable that yours will fail. The question is what you do when that happens. Much of the answer to that depends on how much of a ‘crisis’ that failure is. A good backup strategy mitigates the issue, but even then you might have data you want recovered. Absent paying expensive professionals there are steps that can be taken. Continue reading Recovering Dead Drives→
Much like in the ‘real’ world, so to on the internet: Any given point will eventually fail. Thus, either be ready for it’s failure, or have alternates in place to compensate. Continue reading SPF: FTL→
First up, I have to say the name is terrible. While it is an accurate enough description of the program, as it scans your computer, ‘Scanner‘ itself is too broad of a term and searching for it will find a ton of other things before this program. ‘Scanner pie chart‘ on the other hand, will find it right away. Continue reading TIFU: Scanner→
The red cross has done an impressive job of implementing various technologies into their operation. From the simple needles and tubes used to gather the blood, to signing up online the day of the donation, to the machines that filter and then return your own blood to you. They have found many a way to leverage technology in the collecting of blood. Continue reading AOT: Red Cross→