Category: Computer Related Education Programs

How to make Windows 10’s File Explorer start in any folder you want

Windows 10 offers an easy way of changing the start location for File Explorer. However, it only gives you two starting locations to choose from: Quick access and This PC. But what if you want File Explorer to start in another location? What if you’d like your File Explorer to start in your OneDrive folder, your Dropbox folder, one of your Libraries or any other folder from your Windows 10 computer or device? Unfortunately, there is no easy way to do that in Windows 10. Because of that, we started to scour for possible solutions. In the end, we managed to find one hack that works well. Read on to learn how you can set Windows 10’s File Explorer to start in any location you want:

NOTE: If you want to change the start location for File Explorer to one of the default choices you have in Windows 10 – Quick access or This PC – we recommend you to read this guide: How To Set The Start Location For File Explorer In Windows 10

The Complete Article

Microsoft Office 365: The smart person’s guide

Office 365 provides the productivity tools required by a modern enterprise workforce. This guide covers key details, including available applications, system requirements, and subscription options.

For just about any enterprise of any size, the productivity of its modern workforce revolves around the basic office suite of email, calendar, word processor, and spreadsheet. But as the enterprise workforce has become more mobile, the basic productivity toolset has had to adapt and change to match new requirements. This is why Microsoft updated Office 365 to be a mobile collaborative platform ready to get work done wherever and whenever it happens.

Microsoft Office 365 is the de facto productivity suite for many enterprises and it is the suite all the other competitors are measured against. So as a leader in information technology for your enterprise, it’s in your best interest to know everything there is to know about Office 365. To help you achieve that goal, TechRepublic compiled the most important details and related resources on Microsoft Office 365 into this “living” guide, which we’ll periodically update as new information becomes available.

The Complete Article

Upcoming TAPCUG and OMUG Linux SIGs

The next TAPCUG Linux SIG meeting is Sep 15, 2015 (3rd Tuesday) 5:30 PM – 8:30 PM at the SE Tacoma Community Center 1614 99th St E, Tacoma, WA 98445. Traditionally we are on vacation during the summer- June, July, August.

The next OMUG Linux SIG meeting at the Olympia Center is Aug 11, 2015 (2nd Tuesday) 7 PM, see http://olymug.org . To get the most out of these meetings bring your ideas, questions and be an active part of the discussion. New members are always welcome.

We have three major computer systems today: Windows which is based on DOS, Apple’s OS X which was derived from open source FreeBSD . (Windows and Mac are closed proprietary systems). Linux, which is based on the Linux kernel and unlike the first two, is basically free and open source. Companies make money from the packaging and support of Linux.Linux is much more secure because its roots are from Unix,a serious business multiuser system. Linux has extra built in security such as Netfilter and IPTables which makes your system rock solid and secure.

Linux was created by Linus Torvalds in 1991 because he wanted a better desktop operating system. Ironically, it has totally dominated everywhere else from supercomputers, to servers, chromebooks and your smart phone but monopolies have so far mostly kept it off computers you can buy until now. It is now time to switch to Linux including Linux Mint XFCE or a Chromebook.  Linux Mint is the number four operating system in the world! Download and try it for free. Install if you like it. You convert easily and save lots of money! A+ Computers sells Linux computers along with other proprietary computers.

At the TAPCUG General meeting Aug 8, 2015 we will demonstrate Google+ Hangouts on a Samsung ARM Chromebook. At the Sep 15, 2015 TAPCUG Linux SIG we will review all the software that runs on the Raspberry Pi 2 including Berryboot and Noobs. We will review gpt vs mbr partitioning, xda Android replacement, plex, Chromixium, Nvidia Tegra K1 computers, K1 Linux install, Transmission, Openshot, Google Drive, Linux flash drive install, Gnome system monitor, quantum computers, youtube-dl, gsmartcontrol for hard drivesLightbeamGoogle hangout, Google Keep, Kdenlive, recorditnow, Chromecast, Pixel Qi screens, Remastersys and mesh networks, dual booting Linux on a Windows 8 computer, audacity, Mint xfce 4.12 upgrade, smart phone customizing: Convert Android to OnePlus One, TV music streaming, owncloud, youtube-dl, Google+ Hangout On Air,Samsung ARM chromebook hdmi to vga cable, BIOS replacements including UEFI, Coreboot, Seabios, OpenBios, Plop, flashrom.

We also plan to connect other persons computers to the projector so they can demonstrate what they are using.
For details, see http://Linux-Now.us

Joel Carlson fox7799@gmail.com

Which Are The Best Free File Recovery Tools? Comparing 5 Of The Most Popular Programs

These days you can find quite a few programs that promise to help you recover accidentally deleted files. It is great to have lots of options but, which programs are really good at recovering deleted files? Which of them deliver on their promise? To find out, we tested some of the most popular applications in this niche, all of which are free for personal use. Let’s see what we discovered.

The Testing Procedure

We took a USB memory stick and formatted it, to make sure there’s nothing left on it. Then we copied a wide range of file formats to it, 67 files in all, including: pdf, doc, docx, rtf, epub, azw3 (Kindle eBooks), iso, mp3, jpg, nef, pptx, exe, avi, mp4, 7z, tar and zip. The total size of all the files was 3.44 GB.

Next we deleted those files with Shift+Delete and added 10 new files on the memory stick, to see how good each program would be at recovering files when there are chances of having some deleted files partially overwritten by others. Since the deleted files were on a USB stick, we recovered the files to our test computer’s hard drive.

Then it was time to test the data recovery programs we planned to review. We chose the programs you see below, because, at this moment, they are the most popular programs in the niche. We also wanted to restrict this review only to free programs, without any kind of limitations, because most people are not keen on purchasing a lot of software.

The Complete Article

What are Windows Essentials & How to Install Them

Windows Essentials is a suite of free programs that has evolved a lot over the years. At first, it was named Windows Live Essentials. Now it has been rebranded to a shorter, simpler name. To make things even more confusing, the number of programs included in this suite has evolved a lot over time. That’s why, in this article, I will explain what Windows Essentials are and how to download and install the programs included in this suite.

What are Windows Essentials

Windows Essentials is a suite of free tools offered by Microsoft to Windows users. The latest version includes the following applications: Microsoft SkyDrive, Mail, Writer, Messenger, Photo Gallery, Movie Maker and Family Safety.

The Complete Article

FREAK flaw: ​How to protect yourself now

Summary:The FREAK security hole is more widespread than previously thought. Here’s everything users and system administrators need to know in order to stay safe now.

Great, just great. FREAK, the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) security hole, isn’t only in programs that use Apple’s SSL implementation or old OpenSSL. We now know that FREAK is present in Microsoft’s Secure Channel (SChannel) stack too.

FREAK enables SSL Man-in-the-Middle attacks because of bad security decisions made almost two decades ago. As Andrew Avanessian, Avecto‘s EVP of consultancy and technology services, told me in an e-mail, “The FREAK attack is clear evidence of how far back the long tail of security stretches. As new technologies emerge, and cryptography hardens, many simply add on new solutions without removing out-dated and vulnerable technologies. This effectively undermines the security model you are trying to build.”

The Complete Article

OMUG 2013 Frontier Theme