Worst inventions in computing

The sheer number of inventions in the field of computing easily surpasses the grand total of the human inventions outside this field. It is no surprise that some of them backfire and some of them quickly age.

Scroll Lock button on a computer keyboard, with its indicator light on

Scroll Lock button on a computer keyboard, with its indicator light on

Today, I’d like to introduce you to some of them that are still alive and desperately need to die or evolve. I started with five that irritate people around me the most. I am hoping that by the time you see the name of the last, you think: Well, that’s a huge shock and surprise but judging by the other five, this writer is very much sane. And hopefully, by the time you finish reading it, you feel I have a point there. Read the rest of this entry

Advertisements

Installing Windows 8.1 Update 1 demystified

This article assumes you have heard about the new features of Windows 8.1 in Update 1 and decided to give it a try. So, you’d install a stock Windows 8.1 from a DVD and then proceed to Windows Update to install Update 1.

But you don’t find it there.

Find out why…

Copying NTFS permissions between folders

Let’s assume you have created a folder called “Programs” in your D: volume and now you want its NTFS permissions to match that of “C:\Program Files”, thus having the same level of security.

Basic NTFS permission of "Program Files" folder in Windows 7

Basic NTFS permission of “Program Files” folder in Windows 7

There are more than one ways:

  1. Via icACLs and Notepad
  2. Via Windows PowerShell
  3. Via XCopy
  4. Via Robocopy

This article only elaborates on the first two. Since the subject of NTFS security is one that requires intermediate knowledge of Windows, I will skip elementary details such as how to run a certain program with elevated privileges. Read the rest of this entry

CNET’s security blunder

CNET certainly gets a kick out of criticizing security issues of Microsoft products, but how good is its own most basic security measures?

For security purposes, we require all email address updates to be confirmed by the email address owner. A confirmation e-mail with the subject "Confirm your updated email address" will be sent to the updated email address provided. Click the confirmation link within the e-mail to confirm this change of address.  Continue.

CNET reports that changing email address requires verification for security purposes. But is it?

Let’s if it indeed is…

Finding wallpaper location in Windows 7 and Windows 8

This article introduces two PowerShell scripts that help you find the wallpaper location in Windows 7 and Windows 8.

View of Garachico, Tenerife, Spain by Diego Delso

View of Garachico, Tenerife, Spain by Diego Delso


Read the rest of this entry

Shortcuts that everyone must absolutely know

Whether you are beginners who just want to survive in the post-2012 computing ecosystem that Microsoft created or a computer guru, there are shortcuts that you must absolutely know.

A backspace key on a rock, having been removed from a keyboard.

As soon as you see these shortcuts, you’ll be laughing and saying: “Ha! I knew them!” But I am not sure that would be the case when you are done reading.

Read the rest of this entry

Internet Explorer 11 cannot connect to local host – Redux

Updated 11 November 2013

In a previous blog post, I detailed how Internet Explorer 11 for Windows 8.1 Preview fails to open http://127.0.0.1 while it has no problems opening http://localhost, given an appropriate web server is installed. Well, here is an update.

Screenshot - 1. IE11 cannot connect to 127.0.0.1

Read the rest of this entry

%d bloggers like this: