Home Wire and Cable Computers Weather Miscellaneous Contact Us
- Microsoft® Internet Explorer® Latest Version and Outlook® Mail. - Customizing Internet Explorer®. - Netscape Communications Corporation® Netscape® Latest Version and Netscape® Mail. - Mozilla® Latest Version and Mozilla® Mail. - Opera® Latest Version and Opera® Mail. - The Problems with Opera®. - News Groups. - Updating Your Operating System and/ or Browser. - Plug-Ins.
Please note that ISP stands for your Internet Service Provider.
     - AOL® and CompuServe® (Owned by AOL®).       - Dial-Up Connections.       - Reasonably Priced Broadband Connections.       - ADSL (Asymmetric Digital Subscriber Line, or Asymmetric Digital Subscriber Loop).       - DSL (Digital Subscriber Line or Digital Subscriber Loop).       - Cable TV Connections (Shaw®, Tellus® and Rogers®) in Canada.       - Satellite Connections (Direct PC® using typically Bell® ExpressVu®, Direct PC®, The Dish Network®       - Uplinks and Downlinks in the USA.       - Line of Sight Systems (Microwave Connections)       - Wireless Connections (Home, Office and Hot Spots).
- Viruses and Worms. - How Super Worms Can Defeat Anti-Virus Software Programs Via the HTTP Default Port #80. - Where Hackers' Programs Often Hide. - Rootkits - The Ultimate Stealth Attack. - Trojan Horse Viruses. - Zombie Windows Computers, Zombie-Masters and Zombie Attack Programs. Distributed Denial of Service. (DDS) - Anti-Virus Programs. - Software and Hardware Firewalls. - Broadband Routers using NAT (Network Address Translation), an IP Translation and Mapping Technology. - The Dangers of Wireless Routers. Update to the Wi-Fi Protected Access (WPA) Security Standard. - Proactive Content Behaviour Inspection Software (Stateful Packet Inspection). - Updating Firmware. - The Ultimate in Firewall Security. - The Problems with Black Ice® and Windows Firewalls. -  Spyware, Scumware and Home Page Hijacking. - On-Line Banking. - Buying Goods and Services on the Web. - Security Analyses and Verification. - Internet Filtering Software and Hardware. (iBoss®, CYBERsitter®, NetNanny®, Cyber Patrol®, Smart Filter® and, N2H2®). - Children and the Internet. CIPA - The US Children's Internet Protection Act.
- HTTP, TCP and IP. - Cookies, Spyware Cookies, Cookie Viewers and Cookie Cutters. - Temporary Internet Files. - Temporary Files. - Recent Files. - History. - Client Side Software, Animated Graphics, JavaScript®, Applets® and, Flash®. - Server Side Software such as PHP®. - Frames.
- Understanding a URL.  (Uniform Resource Locator) - Navigation. Forward and Back. - Effective Blocking of "Pop Up" or "Pop Under" Advertisements. - Copying Pictures and Files. - Short cuts to the Desktop. - Setting Your Home Page. - Favourites or Bookmarks.    
- Categorize for Quick Access. - Internet Explorer® Toolbars and Links. - Import, Export.
- Passwords. - Memorizing and Saving Passwords. - The Most Dangerous Software is Social Software - Chat or IRC Software, Facebook® and Twitter® - Use Only With Extreme Caution. - Dos and Don't s. Protect Yourself from Identity Theft.
- Search Engines
- The Preferred Search Engine. - Search Strategies. Not Too Broad. Not Too Narrow. Not Too Exact.
 - MP3, M4A and WAV Music - Music Player Software. - Copyrights and the Law for Music, Motion Pictures and Pictures. - Shareware, Adware and Freeware. - Skype®.
- Address Books and Copies. - Options and Accounts. - Saving E-Mail Messages in Outlook® and in other drives. - Mail Properties. - Tracing a Sender. - Signature Files in Outlook®. - Creating Mail.               - Rich Text Format, HTML Mail, Fonts and Colours.               - Setting Mail Priority.              - Requesting a Read Receipt.              - Sending Pages and Links by E-Mail.              - Inserting Backgrounds Including Colours, Pictures and Sound.              - Inserting Pictures in the Text.              - Attaching Files. - Spam and Spam Filters.