Blog
Computing is not about computers anymore. It is about living. ~ Nicholas Negroponte
Circuit 1 & Circuit 2
TWO CIRCUITS ON THE SAME MOTHERBOARD (This blog post was originally published prior to Mel Culp's...
Malicious Software
There are viruses, there is spyware/adware/malware, and then there are cookies. All are...
Estate Planning For Your Computer
Estate Planning For Your Computer by Kimberly A. Hughes, Kimmunitee The Whys and Wherefores Connecting people with one another is gratifying work, especially when the individuals involved are some of the best in their field. Even better when their raison d'être is...
Don’t Let Your Data Be Held Hostage
Don’t Let Your Data Be Held Hostage That’s not a catchy title — it’s a warning. There’s a dangerous Trojan called Cryptolocker that encrypts the user data residing on your computer (irreplaceable documents, photos, music, etc.). Then you’re sent a message. It reads...
Client Profile: Maria Zanoni, Elm Grove Physical Therapy
If you’ve been told that you have to live with pain, consider talking to Physical Therapist Maria Zanoni. If you’re looking for a more holistic approach or want the benefit of extensive experience, again, talk to Maria. She has, after all, been in her profession for...
Client Profile: Bill and Susanne Gay of Menomonee Falls, WI
Imagine yourself Marco Polo in the 13th century chronicling his adventures in the Far East. Or a 17th century French fur trader experiencing Niagara Falls for the first time. Now try a 19th century Chinese laborer emigrating to California and working on the...
2 Good Reasons to Donate Your Computer to IndependenceFirst
Actually, there are many reasons why I’m asking you to donate your computers to IndependenceFirst. Using “2” in the header was just my way of grabbing your attention. After all, preserving our environment and helping non-profits is important stuff and I want to...
Computer Disposal
What To Do With Old Computers, ‘Cause Tossing Them In the Garbage Is Not an Option I. Decide What To Do With Your Hard Drive This is where all your data has been stored, so take every precaution to prevent it from being misappropriated. Whether you decide to...
Another Golden Rule in Computer Security
Cover Your Webcam Malicious software exists that allows computer hackers to commandeer your webcams and turn them into bugging devices. At the very least, that means your private life becomes public. To avoid that happening, take the lead from Mark Zuckerberg and...
Your Secret Weapons to Combat 2 Common Computer Support Scams
Scam 1 You’re checking email or browsing your favorite sites when all of a sudden the screen is filled with a dire message: “Your computer is severely infected with dangerous viruses. Immediate action is required to remove these threats. Do NOT turn off your...
Gmail Ninja
Just like birds chasing after bits of colored string, many people spend lots of time searching for the next great app or software package. They spend little time learning all about the wonderful functionality they currently have at their fingertips, like Google Mail....








