Essential Cybersecurity Tips to Protect Your Personal Information

Computer PC Tips - bits and bytes, News Items
It is one thing to lose your credit card but having information stolen from your electronic devise is worse. Stolen personal information can be used for financial fraud, identity theft, and cause privacy issues. If you suspect that your payment card details have been stolen, these are the recommended actions: Measures to protect your devices Regularly check account and card statements on a daily basis. Check the ATM you are withdrawing cash from. Sometimes a skimmer can be placed which can fool anyone thinking it is normal. Set up fraud alerts with your bank or payment card provider. Change the password and enable multi-factor authentication if possible. Freeze your credit so nobody can open any new accounts in your name. Lock your devices with a strong passcode if possible. If you don’t…
Read More
3 Simple Methods to Locate Your Windows 10 Product Key

3 Simple Methods to Locate Your Windows 10 Product Key

Computer PC Tips - bits and bytes
Finding your Windows 10 product key sometimes is located on the windows sticker on your computer hardware or with the package that contained the product key. Here are some simple methods to locate your Windows 10 product key. 3 Steps to locate your Windows 10 product key 1. Command prompt The most direct method for finding your Windows 10 product key is from the command line. Type cmd into the Windows 10 desktop search box and hit enter to start the command prompt. You can also locate command prompt and select run as administrator from the context menu. Type this command at the prompt: wmic path softwareLicensingService get OA3xOriginalProductKey 2. PowerShell To use Powershell do the following: Enter PowerShell in the search box. You can select to run it with admin rights…
Read More

Notes from the field

Computer PC Tips - bits and bytes, News Items, Software development, Software development Concepts
In writing "Notes from the field" allows Baron Software to list quick fixes or observations from the programming world. Anchors away! Using PHP and HTML it can remember the window position as to where the user left off. Without the need of elaborate coding using an "Anchor" can solve the issue. Anchor Syntax <a id="anchor-name">The name where you want to jump</a> Anchors can be used when pages have considerable amounts of text. You would typically make an index at the top of the page linking to the anchors that have been added to key places in the text that follows. When displaying a list of records within a PHP while loop you can place the record ID within the data. The code listed below has the anchor next to the…
Read More

Steps for a successful code review

Computer PC Tips - bits and bytes, Rad Studio Delphi Development, Software development, Software development Concepts
Successful programming teams always have followed department or company guidelines on how code reviews should be done. Technical specifications provide the programmer the initial steps for application development. Excellent specifications provide insight on libraries and APIs. The coding standards should be part of this document. Preparing for a code review Self checking items: What are the company policies ?Did you follow company coding standards ?Have you read the company guidelines ?Did the code successfully compile ?Was testing successful ?Check for duplicate code or very large functions and procedures. These steps should be adhere to by any programmer. Code should be formatted and indented. Comments listed at the top of the module providing a brief description along with update history. You must be able to accept any type of criticism. This…
Read More
Purchase a Western Digitial My Cloud NAS Server

Purchase a Western Digitial My Cloud NAS Server

Computer PC Tips - bits and bytes, Hardware Reviews
The WD 8 TB My Cloud EX2 Ultra NAS Server is a fantastic device to place in your work or home environment. Once connected a user can access the device from all of the internal machines within the office. They can also access the NAS server from the outside world using a dedicated IP address. WD EX2 Ultra options Centralized network storage and access from Anywhere with computers or Mobile devicesHigh Performance 1.3 GHz dual core processor and 1GB memory for seamless media streaming and Ultra fast file transfersMilestone Arcus Surveillance Software with unLimited Camera licensesMultiple RAID configurations and automatic backup Options to help guard important dataAutomatic file synching across all Your computers for up to date access from AnywhereVolume encryption and password Protection for Enhanced data securitySupported Browsers:Internet Explorer…
Read More