teXium Blog

This is some blog description about this site

New Study Shows Passwords Can, In Fact, be Remembered

b2ap3_thumbnail_people_remember_passwords_400.jpgWe see a lot of password-bashing these days, and some people have lost faith in them as a security measure. But, unfortunately, a lot of the blame for this lies in human memory. We just don’t pick passwords that are strong enough. In fact, a mind-numbing one in 20 people still use “password” to keep their information safe.

Continue reading
  939 Hits
  0 Comment
939 Hits
0 Comment

YouTube Makes an Effort to Be a Nicer Place

b2ap3_thumbnail_comments400.jpgPerouse the YouTube comments on any popular video and it will appear like a teenybopper is texting a neo nazi. The level of stupidity seen in the comments of YouTube is the ultimate proof of human idiocy. Finally, after years of putting up with people's hate and ignorance, YouTube is cracking down on comments!

Continue reading
  898 Hits
  0 Comment
898 Hits
0 Comment

Whatever Happened to Disk Defragmentation?

b2ap3_thumbnail_DiskDefrag400.jpgIf you have been working with Windows operating systems for more than a few years, then you have heard about defrag. To help keep your PC running smoothly, it has always been considered a solid practice to routinely perform a disk defragmentation on your hard drive. Recently, however, you may not have heard much about defragging. Is defragging still necessary?

Continue reading
  1002 Hits
  0 Comment
1002 Hits
0 Comment

Tip: Use Microsoft Office without the Mouse

b2ap3_thumbnail_Keyboard400.jpgThe mouse may look like a helpful piece of technology, but be warned; it's actually a tool of destruction. If your mouse has been your sidekick for years of heavy computer usage, then your wrist might be in danger of carpal tunnel syndrome. Sometimes, it's nice to take a break from the mouse and use your keyboard to navigate Microsoft Office.

Continue reading
  1047 Hits
  0 Comment
1047 Hits
0 Comment

4 Oversights that will Harm Your Network

b2ap3_thumbnail_SecurtyRisk400.jpgWith all the attention that hackers receive, you would think that they are solely responsible for every network security breach, but the truth of the matter is that most damages to company networks are due to negligence. Here are the four most common IT security oversights that can lead to major damages to your network.

Continue reading
  1155 Hits
  0 Comment
1155 Hits
0 Comment