We love freedom of movement — for ourselves — from machine to machine in our wireless networks.
But we ought to be concerned, as forum member PossumGirl is, about the security of our systems.
The careful parent needs to be tech-savvy.
Lounge member John S0603 is the wary parent of a clever child, who can get around Windows XP Parental Controls, change file and folder ownership, and delete or disable Norton Internet Security. He wants to know how she did it so that he can block future hacking adventures on the family machine.
Why did an Access query produce a different sort order?
One test of a good forum discussion is the solution of a problem brought to it. Another test might rest in general illumination.
Whether you’re naming your baby, your play, or your domain, you contend with associations.
Lounge member Lounger1000 might have thought he was asking purely practical questions when he broached the topic of his personal .com e-mail address, but forum members immediately picked up nuances to discuss.
You can lose some cooperation between Word and Windows — and other conveniences, too — if you overzealously remove files from your computer or use the wrong cleaning product.
Lounge member hmbterry reports that he “used one of those cleaner programs” and lost his list of pinned and recent documents that used to be available to him through the Windows 7 Start menu. He wants his very useful list back.
The practice of keystroke logging comes under scrutiny at Windows Secrets this week.
Jan Bultmann’s Best Practices column, “Companies track Web use — and keystrokes,” notes how some employers use keylogging for monitoring employee behavior on company-owned machines. And the topic comes up again in the Lounge — for use at home.
Accidents, bad ideas, and abuse are possible in any congregation of human beings, and the workplace suffers its share.
For businesses large and small, the best tools for keeping inappropriate behavior to a minimum are company guidelines and policies — and the law of the land.
These days, many companies make agreements with their employees regarding the business and personal use of mobile devices.
When the employee owns the smartphone and takes it with her when she quits, is the company within its rights to wipe the data on the mobile device remotely? After all, some of that data belongs to the company.
Trouble started with disappearing desktop icons and then cascaded into much worse. Then Windows 7 wouldn’t boot, and the error moved into a second drive, taking out the system’s XP boot loader.
Forum member Diogenes had some ideas about what he might have done to complicate the process of returning his computer to working order, but it still felt like a bad April Fool’s joke to him.
The mythical fire-breathing Chimera looked to the Greeks like a lion-goat with a serpent’s tail, but who’s to say she doesn’t look like a networked system today?
Lounge member axiomatica brought a year-old Windows 7 networking mystery into clearer focus this week after investigating a Teredo Tunneling Pseudo-Interface problem he’d had for a while. He got a helpful clue from Woody Leonhard in last week’s Top Story, “Caution: Bumps in the road to IPv6.” He learned there’s a connection between Teredo Tunneling and IPv6.