What’s the Difference Between “Image” and “Clone”? – 

The difference between image and clone is both simple and confusing, because the terms are used interchangeably to mean different things. Image and clone are two very confusing backup terms. One reason is a deep, dark, dirty little secret of the industry: we don’t all agree on what these two terms mean. Quite literally, one person’s clone is another person’s image, and vice versa. It gets confusing, and if you’re hearing different things from different

Use Windows 7 Event Viewer to track down issues that cause slower boot times

Greg Shultz shows you how to use some of the new features in Windows 7's Event Viewer to investigate a slow boot time. Overview Windows 7's Event Viewer includes a new category of event logs called Applications and Services Logs, which includes a whole host of subcategories that track key elements of the operating system. The majority of these subcategories contain an event log type called Operational that is designed to track events that can be used for...

Missing Drivers for a dc7800p and Windows 7 | DIYTechTools.com

For reasons none of us will ever understand, though HP offers drivers for the dc7800 and Windows 7, there are a few drivers missing from the HP download page. Specifically, the HECI and LMS_SOL devices appear, after installation, with yellow check marks (no drivers installed). If the names of these rascals don’t ring a bell, they are identified in the Device Manager – as I recall – as  ”Unknown Serial Port“, and, “Unkown Device“.   It’s something like that

8 TIPS FOR PROTECTING YOUR PC FROM HACKERS

by The Windows Club When it comes to the Internet, there is nothing called 100% security. One of the best method to keep Hackers out of your computer, would be to turn off Javascript and Flash as these two are widely used to inject malicious scripts into your system. But that may be impractical for some, as the Internet relies on Javascript and Flash for quite a few features or functions – from logging in to websites, to browsing, serving search function

Too old for technology… NOT!

Too old for technology… NOT!
You are never too old to learn a new skill or hobby. by Sherri Meinke This winter, I had one of my computer students attempt to teach me to knit. Needless to say, I was dropping stitches, pulling the yarn too tight… it windows was an absolute nightmare. I was frustrated that I could not master the simple skill of a basic knitting stitch. It definitely humbled me and made me think of how many of my students get frustrated in class with computers. Do I left

Create a Secret Hiding Space in Windows

How to create a secret hiding space for your data within Windows. by The Windows Club The Windows operating system offers many tweaks and tricks. If you are aware of these, then you can complete your tasks quickly and in a simple way. You may never need to use any third-party software, if you are good at using those tricks. Among those many tweaks available, I will let you know, how to hide data in a secret text file compartment, created using a Notepad i...

Error deleting – File name is too long

I am almost positive you have run into this error before. Recently I have had 1000s of files like this. Where did they come from? Both times it was a hidden cache folder for DropBox and AeroFS. I had been playing with both to see if I wanted to use them to sync my files. Well, I found a simple way to blow these away in one shot, and you can use a tool within windows to do it. It seems that robocopy can handle these long file names. What you do is you ...

Two-Factor Authentication

I am a strong proponent of two-factor authentication but the worrying thing is the way it's being advertised or pushed as a holy grail of security. The weakest link is still the person using the service/device and if they continued to use weak passwords then it just become the matter of loosing your token device or mobile. When enabling two-factor authentication users still must advised to setup secure passwords with at-least 10 digit length containing Alp