4

One thing is for sure with Windows XP and Vista computers, over time you will have installed many hotfixes and a service pack or two from Windows Update. For many people, you may not have to worry about which updates are being applied to your system

But what if one day, you need to verify if a hotfix has been installed on your computer. One way you can check is to open up Add or Remove Programs from the Control Panel.

As you can see, viewing updates from Add or Remove Programs don't offer much information for each update and is pretty useless. Instead there are better alternatives that provides more useful hotfix and service pack information installed on your system.

read more: How To Display List Of Hotfixes Installed On Your Windows XP Or Vista Computer

0

Happy New Year everyone from Watching The Net!

Once again a new year is upon us and it's time to take a few days off and enjoy the holiday. So if you somehow can still read this post after ringing in the new year all night long, there is probably one thing on your mind. How to get rid of that hang-over.

Drink a lots of liquids and watch College football all day!

Happy New Year 2010!


Filed under Computer How-To by  #

0

happyholidays.jpgFrom us to you, Seasons Greetings to everyone from Watching The Net.

It's time to get away from your Computer and Internet problems (Ho Ho Ho, hopefully Santa fixed you Computer today!) and enjoy these great Computer parodies of 'The Night Before Christmas'.

Happy Holidays From Watching The Net

'Twas the Night Before Christmas For Computer Owners
(WTN Comment - floppies!! what are floppies?):

' Twas the night before Christmas and all through the nets
Not a mousie was stirring, not even the pets.
The floppies were stacked by the modem with care
In hopes that St. Nicholas soon would be there.
The files were nestled all snug in a folder.
The screen saver turned on, the weather was colder…
.
continue reading

'Twas the Night Before Christmas (Computer Version 1)
(Scroll down to second version)

' T'was the night before Christmas, and all through the shop,
The computers were whirring; they never do stop.
The power was on and the temperature right,
In hopes that the input would feed back that night.
The system was ready, the program was coded,
And memory drums had been carefully loaded;
While adding a Christmasy glow to the scene,
The lights on the console, flashed red, white and green…
continue reading

'Twas the Night Before Christmas (Computer Version 2)
(Scroll down to third version)

' Twas the night before Christmas, when all through the house
Not a peripheral was stirring, not even a mouse.
The modem was plugged to the phone line with care
In hopes that a download soon would be there
….continue reading

'Twas the Night Before Christmas (Computer Style)

' Twas the night before Christmas, when all through the house
not a peripheral was stirring, not even the mouse.
The stockings were hung by the chimney with care,
in hopes that new software soon would be there.
The children were nestled all snug in their beds,
while visions of the Internet danced in their heads…
continue reading

'The Night Before Christmas: Microsoft Version

Twas the night before Christmas, when all through the house
Not a creature was stirring, except Papa's mouse.
The computer was humming, the icons were hopping,
As Papa did last-minute Internet shopping…
continue reading

Filed under Computer How-To by  #

2

Unlike big Corporations that you may work for, having a strict policy for changing your own GMail, Yahoo Mail, AOL, Windows Live Hotmail or any other email password probably does not exist.

If you are like many users who use Internet based email, most likely you have not changed your password recently, or for that matter, still have the same password since the day you first created the email account.

If you never experienced having your email account hacked, consider yourself lucky. Believe me, you don't want to experience it. Worse, having a false sense of security in thinking that no one will ever find out your email account password is just ridiculous thinking.

read more: Take The Poll: When Do You Change Your Email Password?

Filed under Computer How-To by  #

8

In today’s online world, having a strong password is a must. However, the problem with strong passwords is that they can be difficult to remember.

Altering the passwords you currently use by adding a meaningful symbol is one step toward making them difficult for Internet thieves to crack. Here is a list of symbols, some suggested uses, and some examples of how to incorporate them into your passwords:

read more: How To Create Strong Passwords…And Remember Them

Filed under Computer How-To by  #

53

inetsafety.jpgYou heard the old saying "were not alone". Well, the same can be said about your Wireless Home Network.

Have you ever wondered if someone else is on your network, with out your knowledge, watching every site you visit or stealing account information from your GMail or bank account?

Sure you probably went to great lengths to implement and secure your wireless home network, but any Network Security professional will tell you NOTHING is bullet proof.

While nothing is bullet proof, being proactive with monitoring can catch the un-wanted guest…off guard.

read more: How To Tell If Someone Is On Your Wireless Home Network

Filed under Computer How-To by  #

1

winlogo.jpgJusched.exe is the Java Update Scheduler. This process is installed by Sun Microsystems' Java to periodically check for updates related to Java handling, runtime environment and internet browsing and install them whenever present. By default, it is installed as a service and set to start automatically.

This process is a nonessential process and can be safely terminated since it sits there eating memory space only to check once a month for updates from the Sun community. Note that terminating the process will prevent automatic updates to Java.

read more: What is Jusched.exe Process on My Windows Computer?

Filed under Windows Tips by  #

0

winlogo.jpgFiles ending with the extension TMP are frequently found on computers. So what are these TMP files?

Well, as the file extension might suggest, they are temporary files. These files are typically created by applications to store some form of temporary data, in a permanent form than RAM, on your hard disk. TMP files are commonly produced either when a program can't allocate enough memory for its tasks, or as part of inter-process communication.

read more: What Are TMP Files and How Can I Delete Them?

Filed under Windows Tips by  #