Tags » User (computing)

Blessed Silence!

Yes, I heartily approve of this “silent” user method of deferring ones attention to ones blog.  I can, in this way, focus more on the work, and my love of it, and not be diverted unless I make specific time to sort through or answer comments. 17 more words

Sonnet Blog

Password reset disk

#10189535 / gettyimages.com

What you do when you have forgotten your password and you end up locked out of your computer? This is a dilemma  nobody wants.  436 more words

Microsoft Windows

How To Cite a Tweet

I found this on another site (for the life  of  me i cant find the link, ironic i know) and thought in this day and age it would  be useful After all how many of us, including  psychologists, are using social media. 231 more words

After a limited test period, Twitter has officially begun rolling out mute functionality to its iOS, Android, and Web applications. The mute feature allows users to block out Tweets and Retweets from individual people in their timelines without actually unfollowing those users. 212 more words



So many changing passwords and
So many different codes
So many usernames and prompts
So many – there are loads!

To access unique data and… 81 more words



Cerberus originally shared:

The following communication was sent via email to all the users whose data is involved in the leak. Keep reading after the email for more information.“Our Security Team recently discovered and blocked suspicious activity on… 495 more words


Yahoo Mail Users Latest To Feel The Heat Of Hackers

Yahoo announced on it’s blog Thursday that Yahoo mail users were targeted and some users data was compromised. Yahoo’s full press release follows.

Security attacks are unfortunately becoming a more regular occurrence.

333 more words