A Joe job is the use of a fake return address in a spam message to make the message look like it’s coming from a domain or sender other than the spammer. A Joe job can be an intentional thing where the actual sender is attempting to make the owner of the falsely-used domain name […]
The post Joe Job – Use of a Fake Return Address in a Spam Message appeared first on Computer Knowledge.
In the article “How to Securely Delete a File” we saw that using Windows to delete a file is not the way to do so securely. To completely delete a file you have to overwrite it multiple times with different patterns; something Windows has no capability to do. In this article we discuss how to […]
The post How to Use File Shredder to Permanently Delete Files appeared first on Computer Knowledge.
There are far too many social engineering techniques than could be listed here but by giving a few examples you can get the idea of what sorts of things you might look for. In general, the objective of any social engineering attack falls into one of two overall categories… An attack trying to get you […]
The post Social Engineering appeared first on Computer Knowledge.
You try to access a web page but all you get is a mysterious code number. What do they mean? This page attempts to address that topic. Governing Document Web standards are governed by documents prepared by standards committees, approved, and then implemented world-wide. Following are notes extracted from RFC2068, the draft governing document for […]
The post What Do Those 404 and Other HTTP Return Codes Mean? appeared first on Computer Knowledge.
Despite the title, it’s important to note that if your computer is infected you may not have any indication of that infection. Much malware leaves no visible evidence of its presence. But, some does and below are a few of the things that should cause you to investigate further… Your browser takes you to odd […]
The post Things That Might Indicate Your Computer Is Infected appeared first on Computer Knowledge.
Hardware problems are all too common. We all know that when a PC or disk gets old, it might start acting erratically and damage some data before it totally dies. Unfortunately, hardware errors frequently damage data on even young PCs and disks. Here are some examples. Power Faults Your PC is busy writing data to […]
The post Hardware Threats appeared first on Computer Knowledge.
In 1985, Computer Knowledge prepared a basic tutorial about microcomputers and DOS. The exercise was to help students and to help me learn programming. The first goal was somewhat successful; the second, not so much as I look back on the code. 🙂 One of my ultimate goals is to recreate that tutorial in different […]
The post Original TUTOR(dot)COM appeared first on Computer Knowledge.
A tutorial that explains the TUTOR.COM program itself and includes the shareware order forms (with address information redacted since it’s now free). This tutorial is left as part of the complete archive but, frankly, you can probably skip it and not even notice you’d done so. 🙂 Below are the 15 screenshots that make up […]
The post Tutorial Which Explains TUTOR.COM appeared first on Computer Knowledge.
A tutorial that explains the expanded keyboard (the keyboard with the function keys at the top). Below are the 22 screenshots that make up this tutorial. Click on each thumbnail to expand it and/or move through all 22 (assuming you have JavaScript active for this site). Title screen: Notes on The New Enhanced PC Keyboard. […]
The post The Expanded Keyboard appeared first on Computer Knowledge.
A tutorial that explains the original IBM keyboard (the keyboard with only 10 function keys on the left side). Below are the 23 screenshots that make up this tutorial. Click on each thumbnail to expand it and/or move through all 23 (assuming you have JavaScript active for this site). Title screen: Notes on The PC […]
The post The Original Keyboard appeared first on Computer Knowledge.