Home » Microsoft Office

Microsoft Office

Who still uses Wordperfect?

I had an odd question come up the other day: Who still uses Wordperfect? It’s a fair question. Wordperfect, as you may know, is still very much in production. Corel releases new versions every year or two. It’s the #2 word processor in the market, still. Someone is still using it, then.

Wordperfect is a software classic, especially the old version 5.1 that ran under DOS. For a time, Wordperfect 5.1 was one of the two most famous programs for IBM compatible PCs. The other was Lotus 1-2-3.

Read More »Who still uses Wordperfect?

What can I do to improve the security of my digital information?

On Monday, March 13 at approximately 10:30 AM CST, I will be appearing on KFUO Radio’s Faith and Family program to discuss home computer security with host Andy Bates. One of the questions he’s planning to ask: “What can I do to improve the security of my digital information?”

This, fortunately, may be the easiest question to answer and the easiest step to implement.

Read More »What can I do to improve the security of my digital information?

Advantages and disadvantages of Windows 3.0

I hear the question from time to time what the advantages and disadvantages of Windows 3.0 were. Windows 3.0, released in May 1990, is generally considered the first usable version of Microsoft Windows. The oft-repeated advice to always wait for Microsoft’s version 3 is a direct reference to Windows 3.0 that still gets repeated today, frequently.

Although Windows 3.0 is clumsy by today’s standards, in 1990 it had the right combination of everything to take the world by storm.

Read More »Advantages and disadvantages of Windows 3.0

Lenovo and Best Buy team up for a $149 laptop this year

Cheap laptops are nothing new this time of year–they’ve been practically a holiday tradition since 2002 when Sotec released a decent laptop for $900, which was jaw-droppingly low for the time–but this year, Best Buy is selling a Lenovo Ideapad 100s for $149.99, which, while not jaw-droppingly low given the number of $199 laptops that were available last year, is still the cheapest name-brand laptop I’ve seen. Note: Best Buy has since raised the price to $199, but Ebay has limited stock of the same item for $129.

I’ve seen some reviews, but there is one thing I haven’t seen anyone bring up yet: This is a netbook in every way, except I think we’re supposed to call them cloudbooks now. So keep that in mind. The machine is probably worth $149.99, but it made some compromises to reach that price point.

Read More »Lenovo and Best Buy team up for a $149 laptop this year

Application whitelisting on Windows, even home editions

One of the very best things security measures you can take is application whitelisting–limiting the apps that are allowed to run on your computer.

The Australian Signals Directorate–the Australian counterpart to the NSA–says doing four things cuts security incidents by a whopping 85 percent. You probably do three of the things. The fourth is application whitelisting.

  • use application whitelisting to help prevent malicious software and unapproved programs from running
  • patch applications such as Java, PDF viewers, Flash, web browsers and Microsoft Office
  • patch operating system vulnerabilities
  • restrict administrative privileges to operating systems and applications based on user duties.

Read More »Application whitelisting on Windows, even home editions

Data breaches don’t cost anything–so here’s why they matter

What seems like a million years ago, when Sony Pictures got breached, some pundits were predicting that was the end of the company. I always thought that was hyperbole, but I have to admit I never went to the extreme of saying breaches are nearly harmless, which seems to be the current popular thinking.

Indeed, a financial analyst went on the Down the Security Rabbit Hole podcast and said breaches are an investment opportunity. Just buy the dip.

Read More »Data breaches don’t cost anything–so here’s why they matter

Why every breach is different

I’ve grown used to being asked what unpatched vulnerability was used in the most recent breach, in an effort to make sure some other company is protected.

I appreciate the desire to learn from other companies’ mistakes and not repeat them. But there are several reasons why the answer to that question is complicated, and not necessarily helpful.

Read More »Why every breach is different