How to use WordPress’ drafts feature to your advantage

In 1994, I was a rookie columnist for my college newspaper. My predecessor, Judd Slivka, had stepped aside to become sports editor. Judd asked me one day how my new gig was going, and I observed that ideas were coming to me faster than I could write them. “Write them down,” he urged me. “You’ll need them later.” And he was right. It took about a month for me to learn that  ideas come in waves and droughts, and survival as a weekly columnist depends on stretching those waves far enough to cover the droughts.

And bloggers face exactly the same challenge. Otherwise, they run out of ideas and become people who post something only occasionally, and, eventually, not at all.

Read more

Upgrade diary: Compaq Presario C552US

The Presario C552US shipped from the factory with a 1.6 GHz Celeron M single-core CPU, 512MB of RAM, and Windows Vista Home Basic.

It’s the most miserable computing experience I’ve seen in a very long time, if ever. I don’t know how they ever sold a single one of these machines, performing like that.

Fortunately, there’s room to improve it.

Read more

Should journalists hack?

I experienced an interesting collection of contrasts going to journalism school in the mid 1990s. Inside the same building, we had investigative journalists who specialized in advanced use of databases and stodgy editors who missed the days of manual typewriters and wore technological ignorance as a badge of honor.

And yet, there were textbooks that said journalists ought to be learning computer programming, because there was going to be a need for journalists who had the ability to do both. It took a while, but it seems that day has come. Maybe not to sit down and write applications software, but to hack.

But is it ethical for a journalist to hack?
Read more

A snapshot in history of Gates and Microsoft, 1992

Hard Drive: Bill Gates and the Making of the Microsoft Empire is a 1992 autobiography of Microsoft co-founder Bill Gates. It’s old. But it’s a compelling snapshot of what the industry thought of Gates and Microsoft before Windows 95, before Microsoft Office, and before Internet Explorer. Indeed, it gives an early glimpse into the struggle to bring Windows to market, some of the bad bets Microsoft cast on its early productivity software, and just how close Microsoft came to betting the company on the success of the Apple Macintosh.

If Microsoft’s history were written today, many of these stories would probably be forgotten.

Read more

How to clean an MBR and recover drive partitions

Sometimes it’s necessary to recover drive partitions because you accidentally repartitioned a drive you didn’t mean to, or because your MBR got infected or otherwise trashed. Here’s how to recover them, for free.

Infecting MBRs with malware is popular with virus writers again. And I fully expect chaos to ensue, because that’s what happened the last time there was more than one virus floating around that infected MBRs. They quit doing it for a good reason.

So here’s how to clean up the mess when an MBR gets infected, or when multiple infections blitzes the MBR and the hard drive loses the ability to boot, just displaying a message like Missing Operating System or Operating System Not Found.

We’ll be using the Gparted Live CD. Many Linux live CDs have the proper tools, but GParted works well and it’s a small download. You can try to use another Linux live CD, and it will work fine, but the icons might not all be where I say they are.

Read more

Using ATA Security eXtension BIOS to add hard drive password protection

Most desktop PCs don’t have the ability to set an ATA password in the BIOS, precluding you from enabling the onboard AES-128 encryption in a drive like the Intel 320 SSD.

If you’re willing to hack your BIOS or burn a boot ROM to put in a network card, Arne Fitzenreiter has ATA Security eXtension (ATASX, or ATA SX)–a way for you to add that support to computers that lack it. Read more