Ever have a problem with the windows registry, or a pesky virus? Have no fear, fix it with a bootable copy of windows no further away than your pocket or key chain.
Link: Windows In Your Pocket
“A new Trojan horse is so good at hiding itself that some security researchers claim a new chapter has begun in their battle against malicious code authors.”
Here is the list of the ideas that made a big time.
Here is a look at the default set of services that come with a fresh installation of Windows XP. “We’ll tell you the ones that you don’t need and try to tell you why, so you can disable them without any problems.”
The 28-year-old webmaster designs the whimsical logos that decorate Google.com’s otherwise Spartan Web site on special occasions.
Some might ask why you would want or need to modify camera settings manually when the camera can do it for you ‘just fine.’ If you really want to end up with expressive photographs instead of mere snapshots, this beginner’s guide is a must-read. I personally didn’t really get into photography until I learned the manual controls. Check it out.
Wi-Fi Protected Access version 2 (WPA2) is becoming the de facto standard for securing wireless networks, and a mandatory feature for all new Wi-Fi products certified by the Wi-Fi Alliance. We all know the security weaknesses of its predecessor, WEP; this time they got it right. Here’s how to implement the WPA2 protocol on a Linux host.