Helping lawyers get up to speed on the technology they need to use starts with honesty about what they need. Several organizations offer approaches to help lawyers get the technology competence they’re expected to have. That training is required goes without saying. D. Casey Flaherty warns against
Read more →Increasing numbers of organizations offer documents to be completed as PDF forms. Just open them using Adobe’s free Reader software, click the fields you want to complete and start typing. The point of offering forms as PDFs is to help people reduce the amount of time it
Read more →Oddly, in the four years or so since the MacMost.com video below was published, not much has changed in the world of phishing. Phishing commonly refers to the activity of tricking people into surrendering financial or other important information using official-looking emails.
Read more →If I want to access your work computer, I’ll look for, and probably find, your password in one of these places: under the keyboard under the phone under the mouse pad on the monitor in the top drawer under the desk How’d I know that? Simple. I
Read more →It sounds like it ought to protect you, but you’re not entirely sure how – or even if your computer has one!
Read more →Ever wondered how to speed up a slow computer? For starters, you can try a few tools in the operating system. You might want to: defragment your hard disk (Windows) check it for errors (Windows and Mac) repair disk permissions (Mac) If these fail, you might want
Read more →Most parents tell their kids not to open the door to strangers. Most computer users could use the technological equivalent of that talk.
Read more →Last week, a discussion on passwords took place on a listserv I belong to. Being a shameless thief, I’ll mention some of what was said and add my own input.
Read more →Any make of computer lets you create one account for each person who uses said computer. If you have a computer that you let other people (like children or friends) use regularly, consider the benefits of creating accounts for them.
Read more →Lots of people refuse to connect to the Internet using open wireless networks like those you find at coffee shops. Why? Their information travels unencrypted over those networks, making it possible for people nearby with the technical tools and know-how to read what they send. But today,
Read more →