Thumbtack

Personal computer repair – my page on Thumbtack
I have been using Thumbtack to generate leads for my businesses. It is very effective and I always get good responses from potential customers even if they do not pick my service for their needs. Thumbtack is reasonably priced and I am sure it will help make your selection of a service provider, easier and successful. If you are a service provider, I highly recommend that you give Thumbtack a try. It will help drive business your way.
Danville Computer Doc.

Microsoft Camera Codec Pack

FINALLY!!!! The day has finally arrived!!!! All you Canon users that shoot raw format and use windows 64 bit OS, rejoice! Microsoft has finally released a codec pack that will enable you to view canon raw and some others in windows explorer!!!

Get the file here:

http://www.microsoft.com/en-us/download/details.aspx?id=26829

Webmaster tools

Are you a webmaster or a wanna-be webmaster? Not using Google webmaster tools? Why not? Google webmaster tools will give you a leg up on the competition when it comes to understanding how your website is being viewed on the web. Linked to Google analytics, and you have a very powerful suite of tools to manage all of your web presence’.

http://www.google.com/webmasters/tools/

Sugar Sync

Sugar sync is a new web-based file repository and sharing service. Files are stored in the cloud and you get 5gb of storage space for free. Files can be shared with others. You can download a desktop application and/or a mobile app and automatically keep files and folders of your choice, in-sync with your files on Sugar Sync. Takes your files with you and access them from the web, on your phone, or on your pc. I suggest giving it a try if you need web-based storage or your files and folders. It is a new service but seems to have tighter security and sharing options than the dropbox service.

–Danville Computer Doc

Internet Explorer 9 final release

Having reviewed the beta release of IE9, I was pleasantly surprised with its performance even though there were some glitches, but it was beta, so all was forgiven. Now after having used the final release, I can say positively, that you should stay as far away from IE9 as possible. It will slow your computer, crash your computer , steal memory from other applications and generally provide terrible performance on even the fastest computers.

Fortunately you can go into windows control panel and uninstall IE9 and roll back to IE8, which while far from perfect, is a much more stable browser and will provide a much more trouble free browsing experience.

Get firefox or google Chrome. You will be much happier!

Internet out of IPv4 Address Space

http://www.networkworld.com/news/2011/020111-ipv4-apnic.html

The Internet Assigned Numbers Authority (IANA) assigned two of the remaining blocks of IPv4 addresses – each containing 16.7 million addresses – to the Asia Pacific Network Information Centre (APNIC) on Tuesday, as predicted.
This action sparks an immediate distribution of the remaining five blocks of IPv4 address space, with one block going to each of the five Regional Internet Registries (RIR).
Related ContentYahoo IPv6 upgrade could shut out 1 million Internet users
Facebook, Google, Yahoo commit to ‘World IPv6 Day’ trial
U.S. military strong-arming IT industry on IPv6
Los Angeles County Museum of Art Telepresence Case StudyWHITE PAPER
Mobility drives IPv6 urgencyBLOG
The American Registry for Internet Numbers (ARIN), which doles out IPv4 addresses to carriers and other network operators in North America, is expected to receive its last allotment of IPv4 addresses today.
Experts say it will take anywhere from three to seven months for the registries to distribute the remaining IPv4 addresses to carriers.
Once the registries hand out all of the IPv4 addresses, network operators must either deploy complex, expensive network address translation technologies to share IPv4 addresses among multiple users or adopt the next-generation of the Internet Protocol called IPv6.
PANIC TIME QUIZ: How prepared are you for IPv6?
The IANA distributions of IPv4 addresses hit a bulls-eye mark on predictions that Internet experts made that the free pool of IPv4 addresses would exhaust on Feb. 1, 2011.
Internet policymakers said they will host a press conference on Thursday to discuss the depletion of the IPv4 address space and what it means for future growth of the Internet.
The press conference, which will be held in Miami, will feature speakers from IANA, an umbrella group of the RIRs known as the Number Resource Organization, the Internet Corporation for Assigned Names and Numbers (ICANN), the Internet Architecture Board and the Internet Society.
Now that IPv4 addresses are gone, Internet policymakers will be ratcheting up the pressure on network operators to migrate quickly to IPv6.
COMPARISON: IPv4 vs. IPv6
Created 30 years ago, IPv4 has a 32-bit addressing scheme and can support approximately 4.3 billion devices connected directly to the Internet. The Internet engineering community has known for a decade that IPv4 addresses would eventually run out, and so they created IPv6 as an upgrade to IPv4.
IPv6 features a 128-bit addressing scheme and can support vastly more devices — 2 to the 128th power. IPv6 also includes built-in security with IPsec and easier management through autoconfiguration of devices.

Best to skip wordpress 3.1 release for now.

From WordPress administration, it is better to skip release candidate 3.1 for now, many bugs were implemented and the changes have been rolled back, it you installed it already, you might want to return to a previous backup of your site.

–Danville Computer Doc

WordPress 3.1 Release Candidate 3 is now available. After careful evaluation of the 3.1 features in RC2, we recognized the need to make some adjustments. There are some significant differences from previous versions of 3.1, so please review the changes if you have been developing against a beta or RC version.

The biggest change is the removal of AJAX list tables, which had been an effort to move all of our list-style screens to full AJAX for pagination, searches, and column sorts, and to consolidate the list-style screens into a single API that plugins could leverage. Unfortunately, with more testing came realizations that there were too many major bugs and usability issues with how the functionality was implemented, so we’ve spent the last week rolling back the most important portions of the feature.

  • For users: AJAX has been entirely disabled for the list tables. We hope to bring this back again, in a form that is properly and fully implemented, in a future release. Column sorting remains, but everything else has returned to its 3.0 state.
  • For developers: The entire list table API is now marked private. If you attempt to leverage new components of the API, you are pretty much guaranteeing that your plugins will break in a future release, so please don’t do that. :-) We hope to enable all the fun new goodies for public use in a future release.

This is the only way we could prevent any regressions in functionality and usability from WordPress 3.0 to 3.1. That’s right, users and plugin authors can still do everything you used to be able to do (and a little bit more).

Because of the code churn between RC2 and RC3, this release candidate needs a lot of testing. Every list screen needs testing. In particular, the comment moderation screen needs testing, especially with keyboard shortcuts (if you didn’t know about those, now’s your chance to try them out).

Other fixes in RC3 include:

  • Properly display the author dropdown in Quick Edit
  • Various important fixes to numerous taxonomy query variables
  • Fixes to the theme deletion process
  • Fixes to pages used for posts
  • IIS and Multisite: Avoid resetting web.config on permalink save
  • Properly validate post formats and their rewrite rules

Anti-virus Removal

Ever open an email and the next thing you know, you are staring at a screen full of error messages, pop-up windows or “system” messages that look real, indicating some computer problem or another.? Are you left scratching your head wondering what happened and worse, how to fix it without loosing all of your data you haven’t got around to backing up yet?
Well, you have probably been infected by a computer virus, or a piece of malware. In general the infections are classified as a “virus”. They may be of a whole host of more technical classifications, but you get the point. These little programs can cause great headaches if you don’t know how to deal with them or you simply ignore the problem thinking it is a real computer error but things seem to be working for the moment. This is a mistake, as the longer you let these things go, the deeper they can bury themselves into your system, making it almost impossible to remove without a full system reset.

Anti-virus removal is not a simple process and very rarely is it an automated one. Everything from hidden folders to registry tweaks can be required to fully remove mal-ware from your system. If you are not sure of the process, it is best to let someone with experience handle the disinfection as you can very easily erase important files and folders, leaving your system useless and unable to boot.

If you decide to try it yourself, I recommend Avira for anti-virus, Spybot for malware removal and hijackthis v.1.99 to stop hidden services from running. If you want a professional removal, I am glad to help. I have never failed to successfully remove a piece of malware or a virus from a computer in 20+ years.

Give the Danville Computer Doc a call for an after hours pc-antibiotic injection and get your pc feeling better quick.

— Danville Computer Doc

Internet I.D.

If you value privacy at all, please pay very very close attention to this story. If this is passed, within a few months, your access to a free and open internet will cease to exist.

I am not sure where this story originated, but it is too important not to post the full text. The url that I got it from is: http://www.cbsnews.com/8301-501465_162-20027837-501465.html
 — Danville Computer Doc

STANFORD, Calif.–President Obama is planning to hand the U.S. Commerce Department authority over a forthcoming cybersecurity effort to create an Internet ID for Americans, a White House official said here today.

It’s “the absolute perfect spot in the U.S. government” to centralize efforts toward creating an “identity ecosystem” for the Internet, White House Cybersecurity Coordinator Howard Schmidt said.

That news, first reported by CNET, effectively pushes the department to the forefront of the issue, beating out other potential candidates, including the National Security Agency and the Department of Homeland Security. The move also is likely to please privacy and civil-liberties groups that have raised concerns in the past over the dual roles of police and intelligence agencies.

The announcement came at an event today at the Stanford Institute for Economic Policy Research, where U.S. Commerce Secretary Gary Locke and Schmidt spoke.

The Obama administration is currently drafting what it’s calling the National Strategy for Trusted Identities in Cyberspace, which Locke said will be released by the president in the next few months. (An early version was publicly released last summer.)

“We are not talking about a national ID card,” Locke said at the Stanford event. “We are not talking about a government-controlled system. What we are talking about is enhancing online security and privacy, and reducing and perhaps even eliminating the need to memorize a dozen passwords, through creation and use of more trusted digital identities.”

The Commerce Department will be setting up a national program office to work on this project, Locke said.

Details about the “trusted identity” project are remarkably scarce. Last year’s announcement referenced a possible forthcoming smart card or digital certificate that would prove that online users are who they say they are. These digital IDs would be offered to consumers by online vendors for financial transactions.

Schmidt stressed today that anonymity and pseudonymity will remain possible on the Internet. “I don’t have to get a credential, if I don’t want to,” he said. There’s no chance that “a centralized database will emerge,” and “we need the private sector to lead the implementation of this,” he said.

Jim Dempsey of the Center for Democracy and Technology, who spoke later at the event, said any Internet ID must be created by the private sector–and also voluntary and competitive.

“The government cannot create that identity infrastructure,” Dempsey said. “If it tried to, it wouldn’t be trusted.”

Inter-agency rivalries to claim authority over cybersecurity have existed ever since many responsibilities were centralized in the Department of Homeland Security as part of its creation nine years ago. Three years ago, proposals were circulating in Washington to transfer authority to the secretive NSA, which is part of the U.S. Defense Department.

In March 2009, Rod Beckström, director of Homeland Security’s National Cybersecurity Center, resigned through a letter that gave a rare public glimpse into the competition for budgetary dollars and cybersecurity authority. Beckstrom said at the time that the NSA “effectively controls DHS cyberefforts through detailees, technology insertions,” and has proposed moving some functions to the agency’s Fort Meade, Md., headquarters.

One of the NSA’s missions is, of course, information assurance. But its normally lustrous star in the political firmament has dimmed a bit due to Wikileaks-related revelations.

Bradley Manning, the U.S. Army private who is accused of liberating hundreds of thousands of confidential government documents from military networks and sending them to Wikileaks, apparently joked about the NSA’s incompetence in an online chat last spring.

“I even asked the NSA guy if he could find any suspicious activity coming out of local networks,” Manning reportedly said in a chat transcript provided by ex-hacker Adrian Lamo. “He shrugged and said, ‘It’s not a priority.'”

.

Posts navigation

1 2 3 4
Scroll to top