The practice of keystroke logging comes under scrutiny at Windows Secrets this week.
Jan Bultmann’s Best Practices column, “Companies track Web use — and keystrokes,” notes how some employers use keylogging for monitoring employee behavior on company-owned machines. And the topic comes up again in the Lounge — for use at home.
These days, many companies make agreements with their employees regarding the business and personal use of mobile devices.
When the employee owns the smartphone and takes it with her when she quits, is the company within its rights to wipe the data on the mobile device remotely? After all, some of that data belongs to the company.
Trouble started with disappearing desktop icons and then cascaded into much worse. Then Windows 7 wouldn’t boot, and the error moved into a second drive, taking out the system’s XP boot loader.
Forum member Diogenes had some ideas about what he might have done to complicate the process of returning his computer to working order, but it still felt like a bad April Fool’s joke to him.
The mythical fire-breathing Chimera looked to the Greeks like a lion-goat with a serpent’s tail, but who’s to say she doesn’t look like a networked system today?
Lounge member axiomatica brought a year-old Windows 7 networking mystery into clearer focus this week after investigating a Teredo Tunneling Pseudo-Interface problem he’d had for a while. He got a helpful clue from Woody Leonhard in last week’s Top Story, “Caution: Bumps in the road to IPv6.” He learned there’s a connection between Teredo Tunneling and IPv6.
Forum members have some pressing needs this week, and they know what to ask for.
They need training, tutorials, macros, status bars, and the return of missing e-mail messages.
This week, more than one forum member expresses concerns about slow progress of tasks in Windows 7.
Forum member Real Woodworm thought at first that one payroll application was dragging down his network of Windows 7 machines, but he found the problem occurring with Excel and Word as well.
When you really need an undelete program, it’s usually dire straits. Use your computer as little as possible until you’ve loaded an undelete utility.
Happily, this week gave a number of forum members eureka moments as they solved their computing puzzlers with a little help from their forum friends.
Some days (upon days), we spend more time working on our tools than on our work.
This past week in the Lounge, we see a heightened level of frustration. Post after post describes problems that arise after a software upgrade or hardware repair. Many of these queries are cleared up by helpful solutions, and the forum member happily gets back to work.
Lately, Lounge members have been pondering data security: can (or should) one accord greater or lesser degrees of trust to workers, depending on where they’re doing their jobs any given day.
Lounge member Neil asks whether it’s possible to configure
Terminal Services in Small Business Server 2008 to differentiate network services, giving users broader access to data at the office than at home.
Most people establish handy ways to use their software, so when they move to new versions, they regret some of the changes.
Lounge member mikemullett misses an easy feature of older Word and wants to find it in his newer Word.