I have already wrote about the evils of plain text and how it is one of the worst inventions of the computing field. But as if I needed a tangible example for my readership, yesterday, I received a cryptic text (I mean SMS) on my mobile phone, which run as follows:
Tried my best; knew your life depends on it:
It was a very tough situation: My life depended on a corrupt text. But fortunately, I had a Windows computer at hand and I could fix it. Read the rest of this entry
I download a computer program that had a bug: Its installer created a folder named “Bin “; i.e. “B”, “i”, “n”, plus a space character at the end. Its uninstaller cannot delete it. Read the rest of this entry
This article introduces a simple way to list and delete all files with a certain name pattern in a folder and all its sub-folders. A common scenario is deleting the hidden thumbs.db files which Windows XP (and in some cases, Windows 7) stores in each folder that contains pictures or video files.
Perhaps you know about Microsoft’s effective recommendation for safe computing: Always log in as a limited user account (LUA) and run program that require administrative privileges using Run As command in the context of another a user with administrative account. Windows Vista is the first operating system to put this philosophy into practice, making it default behavior. Read the rest of this entry