My boss’ management is clamoring for metrics. They want to know, at a glance, what we’re doing and how far along we are. Sounds like a job for stacked bar charts in Excel to me. So here’s how to create a stacked bar chart in Excel.
Figuring out a way to track our progress was fairly easy. Figuring out how to make Excel display that chart in a meaningful fashion… Well, that took about five hours. I’ll try to make it easier for you than it was for me. Read more
Every couple of months or so, we have to collaborate at work on a Microsoft Word document and submit it without all the distracting markup in it. And it seems like it always takes four of us half an hour to re-figure out how to accept all changes in Word and remove the comments. This applies to Word 2007 and all newer versions.
Sometimes I also find the tracked changes and other markup causes weird problems, and the fastest way to make them go away is to get rid of the markup.
So I figured it might help someone. This is something that either takes you 30 seconds or 30 minutes. If you don’t do this every day, it’s likely to take too long. This is for those of you who can’t do it in less than 30 minutes. Read more
The Commodore 64 didn’t have an operating system in the traditional sense that we now think of one. It most certainly did have a method of interacting with the user and handling I/O, including disk files. But the way it all worked seems strange today. Here’s what made the native Commodore 64 operating system different, and the alternatives that surfaced during the 64’s long life.
I had an update on my system in a partially installed state. Our vulnerability scanner determined one file, MSO.dll, was still out of date. It recommended a patch to apply. Running it gave me an error message. Here’s what to do when Windows says the update is already installed on this system and refuses to let you do anything but click OK.
Because hey, from a security analyst’s point of view, this is anything but OK. I get questions about patches in a partially deployed state all the time, so I figured I’d write about it. Here’s what I do when security updates fail to apply with this error.
Longtime computer columnist and science fiction author Jerry Pournelle died on Sept 8, 2017. I count Dr. Pournelle as one of my influences.
I was never a big sci-fi fan, so I’ve never read any of his novels. I really enjoyed his computer journalism, however. He was a tech curmudgeon, and he was blunt, but frequently that was what we needed, especially in those early years when computers didn’t work as well as they do today.
DOS veterans may remember messing with expanded and extended memory to get memory above 640K. Here’s what you need to know about expanded vs extended memory, or EMS vs XMS. They are two different approaches to solving the same problem.
One of the most popular add-ons for an Apple II added CP/M compatibility. So I guess it should be no surprise that Commodore tried the same thing. But the Commodore 64 CP/M operating system and the associate Commodore 64 Z80 cartridge was a flop. Why?
One of my clients asked me to explain superseded patches and how they relate to vulnerability management and patch management. This is a common question about a common complaint. Knowing the meaning of superseded patches and how to handle them is absolutely critical for running a successful security program.
An 8086-series microprocessor, the 8088, powered the original IBM PC. Its direct descendants power PCs to this day. Not only that, they power modern Macs too. This was always controversial, especially running Mac OS on Intel chips. Why? What are the disadvantages of the 8086 microprocessor?
I had an odd question come up the other day: Who still uses Wordperfect? It’s a fair question. Wordperfect, as you may know, is still very much in production. Corel releases new versions every year or two. It’s the #2 word processor in the market, still. Someone is still using it, then.
Wordperfect is a software classic, especially the old version 5.1 that ran under DOS. For a time, Wordperfect 5.1 was one of the two most famous programs for IBM compatible PCs. The other was Lotus 1-2-3.