program

Wed
17
Feb
Dennis Faas's picture

Move Files from Old (Non-Bootable) Laptop to New Laptop?

Infopackets Reader 'Kapilarora' writes: " Dear Dennis, I own two laptops. One laptop is not booting (I.E.: I can't load Windows on it) and therefore, I can't access my files. The second laptop works fine, and I want to transfer all my data from the ... first laptop to the second laptop. How can I do this? " My Response: There are a number of ways to do this. In short, my suggestion is to get the non-bootable laptop temporarily working (bootable), copy over all your files over to an external harddrive, then copy them back onto the other laptop. This will surely be the fastest method as you won't ... (view more)

Wed
13
Jan
Dennis Faas's picture

Freeware Pan-And-Scan Virtual Desktop for Vista, Win7?

Infopackets reader 'DL' writes: " For nearly a decade I've been able to use a pan-and-scan virtual desktop in Windows 98 and XP. For clarification, a pan-and-scan virtual desktop is a desktop that actually extends beyond your monitor's maximum ... screen resolution to give you about twice as much real estate. For example, when you move your cursor to the edge of the screen using a pan-and-scan virtual desktop, the screen moves to reveal more desktop. This enables you to open, say a document full page and not have to use those darned time-consuming scroll bars. It's an incredible productivity ... (view more)

Wed
25
Nov
Dennis Faas's picture

MS Accused of Bait and Switch, Negative Cashback Rewards

For the past few months, Samir Meghani has been the proverbial "thorn in the side" of Microsoft. First, the co-founder of price comparison search engine Bountii.com posted ways in which users could exploit the Bing cashback rewards program . Now, ... Meghani is claiming that this same promotion is responsible for making some products appear more expensive on the web than their actual retail price. Bing 'Negative Cashback' Rewards Acccording to Meghani, Bing has a hidden feature that he refers to as 'negative cashback'. It is his belief that the program, and more specifically, vendors associated ... (view more)

Wed
14
Oct
Dennis Faas's picture

Ashampoo Burning Studio 9 Review

Update 2011/06/16: We've managed to finagle yet another amazing deal for our readers! Act now and save a whopping 60% off Ashampoo Burning Studio 9 until June 28, 2011 (regular price $39.99 now only $15.99) -- proceeds support our website. This ... fabulous program is used to make CD, DVDs and Blu-Ray discs using your PC and is especially GREAT for beginners / intermediate computer users because it's SUPER EASY to use. A full 30 day money back guarantee is offered if you're not completely delighted! The full review of Burning Studio 9 is below. Details and link to discount offer are at the bottom ... (view more)

Tue
15
Sep
Dennis Faas's picture

Registry Mechanic 8 Review

Excellent news for anyone who uses MS Windows -- Registry Mechanic version 9 has just been released! Registry Mechanic is the long-standing market leader among Windows Registry Cleaners -- and it's not because of great marketing or a massive ... corporation behind it -- no, Registry Mechanic has the #1 slot simply because it works! Subscribers to the Infopackets email newsletter will have read Dennis Faas raving about this product for years; now I've tried it for myself, I can only agree with his praise. And with this very special release, we've arranged an exclusive offer just for you! Why do ... (view more)

Wed
29
Jul
Dennis Faas's picture

US Spy Program Operated in Secret, Beyond Wiretaps

A massive data mining system aimed at identifying terrorists may have continued to operate under an executive order signed by President Bush in October 2001, despite an order to shut it down by Congress. In 2001 the Defense Department was briefed on ... the Total Information Awareness (TIA) program developed by Admiral John Poindexter. TIA was concocted to created a massive database program that would be accessible to the CIA, the FBI, and numerous other police agencies around the U.S. President Continued Program In the summer of 2002, JetBlue, Inc. turned over the names and addresses of 1.5 ... (view more)

Wed
24
Jun
Dennis Faas's picture

Non-Literate Computing: Assistance in Reading and Writing

Infopackets Reader 'feckinbricks' writes: " Dear Dennis I am trying to find a program for a friend who cannot read or write in order to assist him in being able to use his computer -- and maybe even have the program teach him some skills in the ... process. He loves his computer but can not use it to the capacity that he would like to. Any help or suggestions would be greatly appreciated. Thank you! " My response: Great question. There are two things that are universal when using a computer for literate and non-literate users: and that is it requires (and provides) both input and output in order ... (view more)

Tue
19
May
Dennis Faas's picture

Botnet

Botnet is a jargon term for a collection of software robots, or "bots," that run autonomously and automatically. The term is often associated with malicious software but it can also refer to the network of computers using distributed computing ... software. Zombie Computers and Botnets While the term "botnet" can be used to refer to any group of bots, the word is generally used to refer to a collection of compromised computers (called Zombie computers) running software, usually installed via worms, Trojan horses, or backdoors, under a common command-and-control infrastructure. How it ... (view more)

Thu
14
May
Dennis Faas's picture

Device Driver

In computing, a device driver or software driver is a computer program allowing higher-level computer programs to interact with a hardware device. How it Works A driver typically communicates with the device through the computer bus or ... communications subsystem to which the hardware is connected. When a calling program invokes a routine in the driver, the driver issues commands to the device. Once the device sends data back to the driver, the driver may invoke routines in the original calling program. Drivers are hardware-dependent and operating-system-specific. They usually provide the ... (view more)

Thu
07
May
Dennis Faas's picture

Executable File

In computing, an executable file causes a computer to perform indicated tasks according to encoded instructions, as opposed to a file that only contains data. Files that contain instructions for an interpreter or virtual machine may be considered ... executables, but are more specifically called scripts or bytecode. Executables are also called "binaries" in contrast to the program's source code. Binary Files A binary file is a computer file which may contain any type of data, encoded in binary form for computer storage and processing purposes. For example, a computer document file that contains ... (view more)

Pages

Subscribe to RSS - program