(updated 11/17/2012)

Tips, news and views, for 07-13-2006...


To email PCN, try cam at concordnorth dot ca...


Topics...

Inside your PC, spammed again, trucks, securing mobile files, top viruses, fastest computer, IMDb, addicting games...


07-13-06...

Inside your PC...

Follow this link to an animated and audible peek inside your PC.

This informative and entertaining tour can easily be followed by even the most novice of us. Learn about the innermost workings, and why it is that your PC can work quite well for the most part, yet occasionally have problems when "someone drops the ball".

For best results, be sure to maximize your browser window and viewing area, and have your sound on and up.

If you have a MAC, follow this link instead. (Note: the most obvious difference between a PC and a MAC is the Zamboni.)


07-13-06...

Curses, spammed again...

Once the world gets your email address, it is hard to prevent getting spam.

I again recommend reading about email in my article on it. You will see how your friends may be the ones who have caused you to get all this spam. You can also see what you can do to help prevent causing spam for others.

I use Mailwasher, a free program for one account, to examine my email prior to downloading. It has spam filters and can quickly clean them out for you. It may also help prevent spam's return by bouncing the email back to the source.

To learn more, find Mailwasher midway down on my downloads page.


07-13-06...

An observation...

Garbage trucks, beer trucks, gravel trucks, cargo trucks... What's up with fire trucks?


07-13-06...

Securing mobile files...

Many of us are using flash drives to carry data from place to place. A lost or stolen flash drive or notebook PC (or even a stolen desktop PC) can cause headaches if the content of the data files is personal, private or otherwise sensitive. To reduce your concern over lost data files, learn how to password-protect your files.

Files created in major programs like Word, Wordperfect, Excel, Quattro Pro, and Powerpoint can be password-protected. Each program version will have its own technique, so you may have to do a little digging to find out how to take care of your own situation.

A simple deterrent to PC theft is a Kensingon lock - a cable lock that can be secured to a PC with a Kensington receptacle or with a custom fitting, then around the most immovable object near the workstation. LCD monitors can be secured in the same way.


07-13-06...

Melissa, ILOVEYOU...

A list of the 10 most destructive viruses and very interesting comments on each can be found on this webpage.

CIH (Chernobyl), Melissa, ILOVEYOU, Code Red, SQL Slammer, Blaster, Sobig.F, Bagel, MyDoom, and Sasser comprise the list, which dates back to 1998.

ILOVEYOU tops this list for estimated economic damage of between 10 and 15 billion dollars.


07-13-06...

Blue Gene, baby!...

According to a recent news article, "Two hundred and forty-three of the world's top 500 supercomputers are IBM systems, including the most powerful, Blue Gene.

The company said their supercomputer is optimized for bandwidth, scalability and the ability to handle large amounts of data while consuming a fraction of the power and floor space required by today's fastest systems.

Blue Gene/L at Lawrence Livermore tops the list with an unprecedented sustained performance of 280.6 Teraflops, or trillions of floating point calculations per second.

The computer is used for a variety of applications including life sciences, finances, hydrodynamics, quantum chemistry, molecular dynamics, astronomy, space research and climate modelling."

To view a series of pictures of Blue Gene, as it was being built, visit this page...


07-13-06...

IMDb...

...the Internet Movie Database, is a great resource for movie trivia. Use the IMDb search function to find information about a movie, an actor, a writer, a director, plots, locations, etc. Many movie trailers are also available.

IMDb can also provide you with movie ideas - perhaps to help you find a movie in a particular genre, or with a particular cast or crew member.

An example - films by director George Roy Hill are listed here, with biographical information about him. (Some movies he directed are: Butch Cassidy and The Sundance Kid, Slaughterhouse 5, The World According To Garp, and The Sting.)

Note: there is an A9 Web Search window just below the IMDb search window, into which I have accidentally put search criterion. No harm, but it does take you away fom the IMDb site. (Click "back" to return to IMDb.)

Did you know that producer/director/writer James Cameron (The Titanic, True Lies, Point Break) is from Kapuskasing, Ontario?


07-13-06...

Addicting games...

Two free programming "languages" required to run some of the better games and animations on the Internet are Shockwave and Java. Both have provided a platform on which programmers have built some impressive products, considering the small size of the required download.

Addictinggames.com has some great examples, like in their Top 10 - Kitten Cannon, Ping Pong, Boneless Girl and Miniputt.

If you do not have the latest versions, download Shockwave here, and Java here.

Note: short commercials may precede game commencement. (A small price to pay.)

Other game sites that I would consider quite safe would be...


© Products of Concord North Ltd. Home