Who still uses Wordperfect?

Who still uses Wordperfect?

I had an odd question come up the other day: Who still uses Wordperfect? It’s a fair question. Wordperfect, as you may know, is still very much in production. Corel releases new versions every year or two. It’s the #2 word processor in the market, still. Someone is still using it, then.

Wordperfect is a software classic, especially the old version 5.1 that ran under DOS. For a time, Wordperfect 5.1 was one of the two most famous programs for IBM compatible PCs. The other was Lotus 1-2-3.

Read more

What can I do to improve the security of my digital information?

On Monday, March 13 at approximately 10:30 AM CST, I will be appearing on KFUO Radio’s Faith and Family program to discuss home computer security with host Andy Bates. One of the questions he’s planning to ask: “What can I do to improve the security of my digital information?”

This, fortunately, may be the easiest question to answer and the easiest step to implement.

Read more

Is my IT department spying on me?

Is my IT department spying on me?

There’ve been some stories floating around about how to make your IT department spy on you. The advice is good. The question you may be asking is how much does your IT department really know? Or, more directly, is my IT department spying on me?

I can’t answer the second question with certainty. But the first question is a lot. I’ll tell you a story.

Read more

Advantages and disadvantages of Windows 3.0

Advantages and disadvantages of Windows 3.0

I hear the question from time to time what the advantages and disadvantages of Windows 3.0 were. Windows 3.0, released in May 1990, is generally considered the first usable version of Microsoft Windows. The oft-repeated advice to always wait for Microsoft’s version 3 is a direct reference to Windows 3.0 that still gets repeated today, frequently.

Although Windows 3.0 is clumsy by today’s standards, in 1990 it had the right combination of everything to take the world by storm.

Read more

Lenovo and Best Buy team up for a $149 laptop this year

Cheap laptops are nothing new this time of year–they’ve been practically a holiday tradition since 2002 when Sotec released a decent laptop for $900, which was jaw-droppingly low for the time–but this year, Best Buy is selling a Lenovo Ideapad 100s for $149.99, which, while not jaw-droppingly low given the number of $199 laptops that were available last year, is still the cheapest name-brand laptop I’ve seen. Note: Best Buy has since raised the price to $199, but Ebay has limited stock of the same item for $129.

I’ve seen some reviews, but there is one thing I haven’t seen anyone bring up yet: This is a netbook in every way, except I think we’re supposed to call them cloudbooks now. So keep that in mind. The machine is probably worth $149.99, but it made some compromises to reach that price point.

Read more

Application whitelisting on Windows, even home editions

One of the very best things security measures you can take is application whitelisting–limiting the apps that are allowed to run on your computer.

The Australian Signals Directorate–the Australian counterpart to the NSA–says doing four things cuts security incidents by a whopping 85 percent. You probably do three of the things. The fourth is application whitelisting.

  • use application whitelisting to help prevent malicious software and unapproved programs from running
  • patch applications such as Java, PDF viewers, Flash, web browsers and Microsoft Office
  • patch operating system vulnerabilities
  • restrict administrative privileges to operating systems and applications based on user duties.

Read more

Data breaches don’t cost anything–so here’s why they matter

What seems like a million years ago, when Sony Pictures got breached, some pundits were predicting that was the end of the company. I always thought that was hyperbole, but I have to admit I never went to the extreme of saying breaches are nearly harmless, which seems to be the current popular thinking.

Indeed, a financial analyst went on the Down the Security Rabbit Hole podcast and said breaches are an investment opportunity. Just buy the dip.

Read more

Why every breach is different

I’ve grown used to being asked what unpatched vulnerability was used in the most recent breach, in an effort to make sure some other company is protected.

I appreciate the desire to learn from other companies’ mistakes and not repeat them. But there are several reasons why the answer to that question is complicated, and not necessarily helpful.

Read more

The Fujitsu Scansnap iX500 deserves its reputation

I don’t buy a lot of hardware anymore, but we purchased a Fujitsu Scansnap ix500 document scanner this month. It has a fantastic reputation, and it only took an hour to live up to it for me.

Read more

PDQ Deploy looks like an interesting tool for a Windows sysadmin

I’ve been looking into ways to manage Java where I work, and I have some ideas, but wanted to see how other people are solving the same problem I’m trying to solve.

PDQ Deploy looks like an interesting solution for someone who needs to remotely push a lot of software packages but wants something cheaper than Microsoft SCCM that has an easier learning curve. In a small or medium-sized environment, it looks like something that could save server and desktop administrators alike a lot of time. The $250/year price per administrator doesn’t seem hard to justify in my mind.

I’m sure one thing that’s kept some environments from replacing Microsoft Office with something like Libre Office is the time and effort required to keep it up to date. PDQ Deploy would take care of most of that problem.

Since we have a large investment in other tools at work, I’m not sure PDQ Deploy is really the answer there, but I think it would be helpful for some people.