Already on ArticleSlash?

Forgot your password? Sign Up
 Article Directory   Author   Cee Simpson
 

Cee Simpson  RSS Feed

Published Articles:9
Total Article Views:1,729 (unique visitors)
Cee Simpson

(United States)Author

Cee Simpson's Articles

Articles by: Cee Simpson

Recent Articles

A Blessing For Your Family

There is a golden rule Jesus gave to his disciples while he was giving his sermon on the Temple Mount and it is one of my favorite spiritual principles. Matthew 7:12 says, ‘All things ..
(May 18, 2012)
 | 
  • Currently nan/5
 | Home-and-Family/Death-Dying | Visitors: 195

Protecting Your Data by Encrypting Your Files

Medical records, tax documents and other files with personal information are often stored on personal computers. If you don't encrypt files that include personal information, you risk making yourself .
(April 12, 2012)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 147

Network Troubleshooting: Get Your Mac Network Up

There is a need to share files across your network, to print and connect to the internet… The networked computer is a necessity. The network has become more important than ever for any ..
(April 12, 2012)
 | 
  • Currently nan/5
 | Computers-and-Technology/Personal-Tech | Visitors: 113

Time For Security Software Mac

Time to Take Security Seriously The malware-free times of Mac users are behind us permanently. " Mac OS X Trojan, MacDefender, Mac Security, Mac Protector (and the biggest of all) Flashback (is ..
(April 11, 2012)
 | 
  • Currently nan/5
 | Computers-and-Technology/Spyware-and-Viruses | Visitors: 236

Backup and Recovery Quick Fixes

Backup systems are more convenient than they were even a few years ago, when you had to deal with stacks of floppy diskettes or complex hard drive connections. Online backup services (such as SOS) ..
(April 06, 2012)
 | 
  • Currently nan/5
 | Computers-and-Technology/Data-Recovery | Visitors: 189

Spyware & Virus Removal (Win7 & Vista)

Our first order of business is to download the programs we will need. Many forms of Malware (some designed to be invisible to the user) will hide in Temp folders, so we will not download programs to ..
(April 06, 2012)
 | 
  • Currently nan/5
 | Computers-and-Technology/Spyware-and-Viruses | Visitors: 292

Learn To Navigate The Windows Registry

The Windows Registry is a central location for maintaining operating system, application, user, And hardware information. If you make a change to the operating system, for instance, that Change is ..
(April 06, 2012)
 | 
  • Currently nan/5
 | Computers-and-Technology/Software | Visitors: 133

Protect Your Critical Data (Disaster Recovery in the Cloud)

Tape Backup is Dead Experience has shown me that tape backup is expensive, difficult, slow to recover files From, and must be administered centrally (onsite). The tape media must be carried Offsite ..
(January 29, 2012)
 | 
  • Currently nan/5
 | Computers-and-Technology/Data-Recovery | Visitors: 214

Google Android User Security Progress

Android User Security Ten years ago, the Operating System workhorses for US Government IT networkswere Windows for unclassified And Solaris for classified traffic. There weresprinklings of Novell ..
(January 19, 2012)
 | 
  • Currently nan/5
 | Communications/Mobile-Cell-Phone | Visitors: 210