CNET también está disponible en español.

Ir a español

Don't show this again


Defensive Computing Cheat Sheet

A review of the postings on this blog

Since this blog went live in July 2007, there have been over 70 postings. For my all but mandatory end of the year review, below is a cheat sheet to the postings to date. I maintain a full blog index on my personal web site.

2007 Individual Postings

Prepare for networking failures by reading the lights on your router July

The pros and cons of LEDs for backlighting LCD screens July

Ask Leo Notenboom your computer questions July

Be careful when downloading software August

Task Manager in Windows XP August

Scan a suspicious file with 29 anti-virus programs August

What makes a good surge protector September

Create a second Windows userid for backup September

Why Apple isn't selling for Macs September

A new approach to securing USB flash drives September

Is Linux right for your mother? October

One Web site, many names: an introduction to domain forwarding October

Disgracefully unreliable software October

Why Java can't do addition correctly October

Avoiding new software November

60 Minutes on TJX computer security November

Be careful when shopping for a replacement laptop battery December

Sweet spot in monitors December

Antimalware software suites December

Am I the real John Hodgman? (the only humorous posting all year) December

IE6 crashes in Windows XP: fixing the fix December

Get Spyware Doctor for free - a first look at the Starter Edition December

2007 Topics With Multiple Postings

RAID Level Zero

Don't get burned by RAID Zero July
Following up on RAID Level Zero July

The Mozy online backup service

Everybody likes Mozy--except me Part 1 July
Everybody likes Mozy--except me Part 2 July


Every Windows XP user should drop their rights August
DropMyRights part 2: Installing and configuring August
DropMyRights part 3: Living with it August
Restricting insecure applications November


Backing up e-mail August
Thunderbird August
A new e-mail scam August
Portable Thunderbird September
Defending against a phishing email message October
Test your email program October
Is that e-mail message legit? How a computer nerd analyzes it November

Second Guessing Walter Mossberg

Wall Street Journal Readers - check this out September
Debunking Walter Mossberg - better PC buying advice October
Improving on Walter Mossberg's PC-buying advice November
Parsing disk-partitioning advice December

Windows XP vs. Vista

I pity the fool (Windows XP good, Vista bad) September
When to convert from Windows XP to Vista, Part 2 September
Putting Windows Vista on trial October
More FUD for Windows Vista November
IBM Recommends Windows XP December
Windows Vista gripes from Lenovo December

Amazon's MP3 Download Store

Amazon's MP3 Download store--a book report September
Defensively shopping at October

Microsoft Updates Your Computer Whenever They Feel Like It

Windows is Spyware September
Defending yourself against Microsoft September

Sending Files Too Big To E-mail

Sending big files with SendThisFile November
Transferring big files with EatLime, SendThisFile, and FTP November
Transferring big files with DropSend and TransferBigFiles December

Dealing With Software Crashes

Dealing with software crashes - Part 1 November
Dealing with software crashes - Part 2 November

The System Restore feature of Windows XP

Four Tips to Using System Restore on Windows XP July
No restore point for you December

Bugs in the Flash Player

Update your copy of the Flash player now. And do it right December
Problems updating the Flash player in Firefox? Here's Help December


OpenDNS provides added safety for free December
More about OpenDNS, including adult site filtering December


Finally, avoid reading comments by tenc21. He, she or they were stalking me, doing nothing but griping about anything and everything I say. All the comments made by this CNET user were on this blog, no others. They may appear to be on the topic at hand, but in reality, the purpose of these comments is not to debate anything just to argue. The comments are personal in nature, but thinly disguised as being technical.

See a summary of all my Defensive Computing postings.