Posted in Software

108 Excel tips every user should master

Whether you are a Microsoft Excel beginner or an advanced user, you’ll benefit from these step-by-step tutorials.

Continue Reading...
Posted in Security Software

Windows 11 “SDelete” files securely and completely

Meeting DoD standards for securely deleting files in Windows 11 requires the use of a special application. Fortunately, Microsoft provides one for free in Sysinternals.

Continue Reading...
Posted in Security Software

Reset a forgotten Windows 10 password

Learn how to reset your Windows 10 password whether you use a Microsoft Account or a local account.

Continue Reading...
Posted in Technology

What is 5G?

Every commercial we see and hear declares that “X-mobile service is 5G”….but what does that mean?

Continue Reading...
Posted in Collaboration

Successful Collaboration

Discussion about how geographically dispersed colleagues cover for each other to accommodate holidays, emergencies, etc.

Continue Reading...
Posted in Security Software

Remove and overwrite all hard-drive data

A special parameter in the Windows 11 Format command will overwrite all data on a hard drive with random numbers, eliminating access to sensitive information. …

Continue Reading...
Posted in Software

Custom document properties in MS-Word

Many Microsoft Word documents repeat the same information throughout the document. For instance, a contract might refer to the contract parties several times. An evaluation…

Continue Reading...
Posted in Software

Inspecting Word documents for issues

You’ve just created a Microsoft Word document that you plan to share with other people. But before you do, you want to make sure it’s…

Continue Reading...
Posted in Software

Reclaim hard-drive space in Windows

During the normal course of operation, a Windows 11 personal computer will accumulate files on the system hard drive that are no longer necessary, relevant…

Continue Reading...
Posted in Security

Beware of HTML attachments!

Users of email have long thought of executable and .dll attachments as the main focus when cyberattacks arise, but there may be another type of…

Continue Reading...