Failure to connect with the Internet wasn’t the only problem Lounge members had this week, but it showed up several times — each instance different from the others.
Lounge member jshollis, for example, can’t figure out why his Internet connection intermittently stops working. Despite his orderly series of tests and scans, the reason eludes him. He reboots, and all is well — until the connection disappears again.
A phishing victim’s pain persists as he cleans up his PC after a bad encounter with an e-mail that turned out to be from a thief, not his stockbroker.
As Lounge member georgelee discovers, the hazards and headaches multiply after you bite on a phishing lure.
We love freedom of movement — for ourselves — from machine to machine in our wireless networks.
But we ought to be concerned, as forum member PossumGirl is, about the security of our systems.
The careful parent needs to be tech-savvy.
Lounge member John S0603 is the wary parent of a clever child, who can get around Windows XP Parental Controls, change file and folder ownership, and delete or disable Norton Internet Security. He wants to know how she did it so that he can block future hacking adventures on the family machine.
Why did an Access query produce a different sort order?
One test of a good forum discussion is the solution of a problem brought to it. Another test might rest in general illumination.
Whether you’re naming your baby, your play, or your domain, you contend with associations.
Lounge member Lounger1000 might have thought he was asking purely practical questions when he broached the topic of his personal .com e-mail address, but forum members immediately picked up nuances to discuss.
You can lose some cooperation between Word and Windows — and other conveniences, too — if you overzealously remove files from your computer or use the wrong cleaning product.
Lounge member hmbterry reports that he “used one of those cleaner programs” and lost his list of pinned and recent documents that used to be available to him through the Windows 7 Start menu. He wants his very useful list back.
The practice of keystroke logging comes under scrutiny at Windows Secrets this week.
Jan Bultmann’s Best Practices column, “Companies track Web use — and keystrokes,” notes how some employers use keylogging for monitoring employee behavior on company-owned machines. And the topic comes up again in the Lounge — for use at home.
Accidents, bad ideas, and abuse are possible in any congregation of human beings, and the workplace suffers its share.
For businesses large and small, the best tools for keeping inappropriate behavior to a minimum are company guidelines and policies — and the law of the land.
These days, many companies make agreements with their employees regarding the business and personal use of mobile devices.
When the employee owns the smartphone and takes it with her when she quits, is the company within its rights to wipe the data on the mobile device remotely? After all, some of that data belongs to the company.