Tuesday, June 29, 2010

Google Product Search

Although you can often find products directly from the main Google search engine, you can't easily sort those products by price or separate the stores from Web sites that just talk about an item.
Google Product Search is Google's shopping search engine. The information in the search comes from items that are submitted by vendors to Google Base. Items can be submitted individually or in bulk feeds. Individuals can even have Google Base host their item descriptions. Read more of the review at:

For a link to Google Product search directly, click below.

Monday, June 28, 2010

The Best Browser: Summer 2010 Edition

Google Chrome, Google's entrance into the browser fray just over a year ago has sent shockwaves through the Web, delivering a potent challenge to long-time favorite Firefox. Perhaps even more eye-opening is the radical ground shift Google envisions by making the Chrome browser the centerpiece of a new Google Chrome Operating System in which every application lives in the Web, rather than on your local machine. All browser makers want to enable sites that act like rich, responsive local applications, but are the pieces in place for this vision now? Is the most forward-looking browser the best browser to use today?

Sunday, June 27, 2010

Computer jargon made simple

A quick, easy-to-understand course on computer terminology. You'll be able to translate what the salesperson is saying! Click on Kim.

Saturday, June 26, 2010

Use FamilyShield to quickly and easily secure your Internet

What does FamilyShield block?
  • Adult websites that are unsuitable for kids
  • Proxy and anonymizer sites commonly used by savvy kids to bypass traditional Web filters
  • Phishing sites that aim to trick you into handing over personal or financial information
  • Some virus-spreading malware websites
  •  FREE

Desktop Fun: Cities at Night Wallpapers

At night certain cities seem to take on a magic all their own. If you enjoy the scenic and colorful views of city lights then you will want to browse through our Cites at Night Wallpaper collection. 

Wallpaper (also known as desktop picture and desktop background) is an image used as a background on a computer screen.

Friday, June 25, 2010

Calif Man Accused Of Extortion Through Hacking

A hacker took over more than 100 computers and used them to extort sexually explicit videos from women and teenage girls by threatening to release their personal data, federal prosecutors charged Tuesday.

Thursday, June 24, 2010

TV Worth Watching

The purpose of TV WORTH WATCHING is to ferret out and celebrate what's good about TV. The bad stuff, certainly, is easy enough to find. But in an ever-expanding TV universe, and with newspapers devoting less space and resources to quality analysis of television, where can a person turn to find trustworthy, informed recommendations about the best of what's out there?

Automatic Face Recognition Helps Tag Your Photo Collection

Managing a collection of digital photos on a PC isn't always easy.  How should you arrange the folders and directories? 

There are some great freeware applications available to help manage, sort, display and print all the images stored on your PC.  Google's Picasa is one well-known example, and others include Irfanview and FastStone.  

The latest new feature is automatic face recognition.  It's now possible to get free software which not only lets you view and print your pictures, but also attempts to automatically recognise people's faces.

Wednesday, June 23, 2010

The silent weapon in dating violence: texting

Problem mushrooms in just two years

Police have charged George Huguely V with first-degree murder.

Tuesday, June 22, 2010

Make-a-Wish phone scam returns

A massive telephone scam aimed at elderly Americans and using the Make-A-Wish Foundation name has returned after a four-year absence, authorities say.

Can my neighbors see my WiFi if I can see theirs?

If you're close enough to see someone else's wireless network chances are they can see yours. There's one step you must take to stay secure.

Monday, June 21, 2010

Banking's big dilemma: How to stop cyberheists via customer PCs

In online banking and payments, customers' PCs have become the Achilles' heel of the financial industry as cyber-crooks remotely take control of the computers to make unauthorized funds transfers, often to faraway places.

That's what happened to the town of Poughkeepsie in New York earlier this year to the tune of $378,000 carried out in four unauthorized funds transfers from the town's account at TD Bank. First discovered in January, the town was able to finally get the full lost amount restored by March, according to public records, through sometimes tense interaction with the bank. 

This story appeared on Network World at

Thursday, June 03, 2010

Reclaim Privacy - It's free!

Reclaim Privacy  It's free and open source, so anyone who has concerns over its motives can easily check to see that it isn't doing anything that it shouldn't.
To use it, go to and add the utility to your browser favorites.  Then log into Facebook and go to your security settings page (there's a link on the reclaimprivacy site to help you).  Then run the Reclaim Privacy script by selecting it from your bookmarked favorites, and the analysis of your security exposure will be ready in just a second or 2.

My Web Site

Hello all,

I would like to apologize to those who have recently visited my web site. It is a disaster! Many of the graphics are missing. I will try to fix everything soon.

Meanwhile this blog is kept up to date. Please search for any topics of interest. Also, please send me suggestions for things you would like to see. I would be happy to try and help anyone who has questions or problems. I have many help articles I can attach to an email message.