user

Thu
13
Apr
Dennis Faas's picture

Linux 101

Linux is on the rise and we can all thank Microsoft for it! People around the world are tired of Microsoft's heavy handedness in their marketing ploys and in foisting off a lousy Operating System commonly known as Windows. After years of putting up ... with high pricing, program bloat, and the constant need to Update and Upgrade because of coding errors and insufficient operation, people are turning to Linux in greater numbers. Are you one of them? This article is offered to help you decide which Linux will be right for you and to give you a few resources so you can make an educated decision. At ... (view more)

Fri
24
Mar
Dennis Faas's picture

'Windowless User Interface', and 'Outlook Attachment Enabler'

Windowless User Interface Traditionally, Windows applications are built upon the GDI windowing hierarchy, and thus restricted in several areas. While you can certainly generate a nice application quickly with the built-in control-set and get a ... standard clean look, you will soon enough stumble upon the limitations of the Windows controls - especially if you want to build something that looks a little more flashy. The native Win32 custom-draw/owner-draw technique is limited, next to no support for transparent windows, rigid control scaling/resizing and the Common Controls are merely remnants of ... (view more)

Tue
10
Jan
Dennis Faas's picture

'Auto Patcher', and 'Naive User Guide To Running Windows More Securely'

Auto Patcher How often do you install Windows? Most people install their operating system regularly, whether they want to or not. After a while, you will get sick of going to Windows Update and continuously downloading patch after patch, update ... after update. Well, we have just the thing. AutoPatcher is a comprehensive collection of patches, addons and registry tweaks that give you peace of mind in the knowledge that your Windows system is up to date, even before you connect it to the Internet. It's designed to quickly patch a system with the most current updates and tweaks available, and ... (view more)

Wed
04
Jan
Dennis Faas's picture

Trojan Horse Computing

In the context of computer software, a Trojan horse is a malicious program that is disguised as legitimate software. The term is derived from the classical myth of the Trojan horse. In the siege of Troy, the Greeks left a large wooden horse outside ... the city. The Trojans were convinced that it was a gift, and moved the horse to a place within the city walls. It turned out that the horse was hollow, containing Greek soldiers who opened the city gates of Troy at night, making it possible for the Greek army to pillage the city. Trojan horse programs work in a similar way: they may look useful or ... (view more)

Wed
02
Nov
Dennis Faas's picture

Mouse Computing

A mouse is a handheld pointing device for computers, involving a small object fitted with one or more buttons and shaped to sit naturally under the hand. The underside of the mouse houses a device that detects the mouse's motion relative to the flat ... surface on which it sits. The mouse's 2D motion is typically translated into the motion of a pointer on the display. A mouse is called a 'mouse' primarily because the cord on early models resembled the rodent's tail, and also because the motion of the pointer on the screen can be mouse-like. In popular usage, the plural can be either mice or ' ... (view more)

Wed
12
Oct
Dennis Faas's picture

Windows Form Parking Window Error?

Infopackets Reader Jimmy B. writes: " Dear Dennis, I'm running windows XP and use Webroot Spy Sweeper and Norton Anti Virus. Sometimes I'll be using my computer when -- all of the sudden -- I get this very strange error message that reads 'Windows ... Form Parking Window' error and it shuts my computer down. What is Windows Form Parking Window and how can I stop it from appearing? I've done a Spyware and AntiVirus scan of my computer and haven't come up with anything. Can you help? " My response: From what I read via Google, the "Windows Form Parking Window" or " ... (view more)

Sun
11
Sep
Dennis Faas's picture

Popup Ad

Pop-up ads are a form of online advertising on the world wide web intended to increase web traffic or capture email addresses. It works when certain web sites open a new web browser window to display advertisements. The pop-up window containing an ... advertisement is usually generated by JavaScript, but can be generated by other means as well. A variation on the pop-up window is the pop-under advertisement. This opens a new browser window, behind the active window. Pop-unders interrupt the user less, but are not seen until the desired windows are closed, making it more difficult for the user to ... (view more)

Fri
26
Aug
Dennis Faas's picture

Phishing

In computing, phishing (also known as carding and spoofing) is the act of attempting to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business with a real need for ... such information in a seemingly official electronic notification or message, such as an email or an instant message. It is a form of a social engineering attack. The term phishing comes from the fact that Internet scammers are using increasingly sophisticated lures as they "fish" for users' financial information and password data. With the growing ... (view more)

Mon
22
Aug
Dennis Faas's picture

Malware

Malware Malware , or "malicious software" is a generic term used to describe various types of malevolent programs. Below are some of the most common forms of malware. Virus Viruses have used many sorts of hosts. When computer viruses first ... originated, common targets were executable files that are part of application programs and the boot sectors of floppy disks. More recently, most viruses have embedded themselves in e-mail as Email attachments, depending on a curious user opening the viral attachment. In the case of executable files, the infection routine of the virus arranges that ... (view more)

Thu
11
Aug
Dennis Faas's picture

Spyware

Spyware is a broad category of malicious software intended to intercept or take partial control of a computer's operation without the user's informed consent. While the term taken literally suggests software that surreptitiously monitors the user, ... it has come to refer more broadly to software that subverts the computer's operation for the benefit of a third party. Spyware differs from viruses and worms in that it does not usually self-replicate. Like many recent viruses, spyware is designed to exploit infected computers for commercial gain. Typical tactics furthering this goal include ... (view more)

Pages

Subscribe to RSS - user