Tips Tweaks & Hints

Smartphones  Tablets & ebooks

Windows 8

Windows 7

Windows Vista

Windows XP

Internet, Email & Network

Word Processing & Office

Folders, Files & Backup

Desktop Mouse & Keyboard

Crash Bang Wallop!

Privacy Security & Environment

Imaging, Scanning & Printing

Power, Safety & Comfort

Tools & Utilities

Multimedia

Display & screen

Fun & Games

 

DT Archives

Ask Rick &

Houston We have a Problem

2015

2014

2013

2012

2011

2010

2009

2008

2007

2006

 

Boot Camp

2009

2008

2007

2006

2005

2004

2003

2002

2001

2000

1999

1998

Psst...looking for cheap 

nuclear stuff?

Freeware & Shareware

Anti Virus

Audio & Multimedia

Backup & Recovery

Calculate & Convert

Desktop Utilities

Diagnose & repair

Disk Utilities

Firewall & Security

Image Editing & Viewing

Internet, Email & Networkl

Malware Cleaners

Web Editing

Word Processing & Office

Windows 95/98/SE/ME

 

Odds & Sodds

News Archives 2006

News Archives 2007

News Archives  2008

News Archives 2009

News Archives 2010

News Archives 2011

News Archives 2012

News Archives 2013

Glossary

About

BootLog

 

New and updated hints and tips for Windows PCs, technology news plus the best shareware and freeware around

 


Black To Back

There’s no shortage of decent backup programs. Some of them are free, like the utility we are looking at here, called Hitek JaBlack, but this one has a few interesting extras. In addition to standard stuff, like saving and synchronising nominated files and folders to selected locations and external drives, it also has the facility upload, via FTP or even email, to remote locations. There’s also automated compression using standard Zip format of backed up files, it has powerful scheduling features, email notification of alerts, like task failure. A local file monitor automates backups when folder contents have changed and there’s also a version for Mac OS. It is reasonably straightforward to use and there’s some useful support, demo and tutorial material on the Hitek website. If you are not already backing up your irreplaceable files, you are playing with fire, and with this little freeware program there’s no longer any excuse to put it off any longer.

12/01/15

 

Do you have a tip or tweak for Windows that you would like to share with other PC users? If so we would really like to see it, jot it down and email it to us at: PCTopTips


 

Web

PCTopTips


 

 

 

 

 

News Briefs

3D Printer Material Benefit

Once again it haw been a pretty lean year for whizzy new gizmos as the annual Consumer Electronic Show, held in Las Vegas. In fact it was mostly just more of the same with lots of ultra, mega or whatever the latest high definition TVs are called, plenty of wearables, most of which will disappear without trace, and the usual glut of intelligent and connected kettles, fridges and vacuum cleaners, but dig deep enough and there were one or novel ideas. One such was from MakerBot, one of the leading manufacturers of 3D printers, but it’s not a printer, but the plastic filaments that make the objects that’s rather interesting. Until now that’s all it has been mostly just plain old plastic, but MakerBot has come up with composite filaments, bonded with a range of materials that includes limestone, iron, maple wood and bronze. MakerBot isn’t the first with composite filaments, and these won’t be available until later this year, but it’s a pacesetter in this small but rapidly growing market and it means that 3D printed objects can be made to look and feel much more like whatever it is they are supposed to be, which is especially useful for prototyping. One example on show is a hammer, with a wooden shaft and iron head, though it’s still mainly plastic, so you wouldn’t actually want to use it bash in nails, though apparently the handle does smell like wood. 3D printing is still some way away from being a useful consumer technology but developments like this are bringing it another small step closer, and making us want one...

1201



Permissions To Play

How many Android smartphone and tablet users ever take the time to read the list of Permissions that they have to agree to when installing an app? Probably not that many, and few of those who do may wonder why apparently self contained kids games and utilities need to access a phone’s call logs, message store, photo album, microphone or camera, but tap the Accept button anyway. In some cases these permissions are legitimate, and there’s nothing wrong with vibrating the phone for an incoming call or haptic feedback, but in a growing, and worryingly large number of apps the only explanation for many of the permissions, is that they are there to gather data about the user. What may be surprising is how common it is and many of the most popular apps are now probing deeply into our devices, and lives. Well, someone has taken the time to look into the issue. The results are reported on the Vocativ website who, in collaboration with Carnegie Mellon computer science Professor and founder of PrivacyGrage.org, Jason Hong, have analysed and listed some of the worst offenders and come to the conclusion that this is a strong indicator of what app developers think they can get away with. At the top of the list is AntiVirus Security, Viber and Facebook with 44, 42 and 39 permissions respectively, which is pretty good going when you consider that there are around 60 permissions in all, so you have to wonder what they are up to. Next time read what you are signing up for, and if you don’t like the look of it, let the developers know by leaving a comment and if you are concerned, walk away and hopefully they will get the message.

0301

 

Junior Spooks

Catching them young is the theme of a new app from spy central, otherwise known as GCHQ. It’s called, Cryptoy and currently only available for Android devices from Google Play. Basically it is an interactive cryptography teaching and learning tool, aimed at Key Stage 4 students, but don’t let that put you off, it’s fun for all ages. Don’t get too excited, though, the sample cryptographic demos and games are not giving away any state secrets, they’re based on old-school systems. There’s even a section on the famous Enigma code, developed by the Germans in World War II, with some good historical background, but the essential principles behind many early forms of cryptography hold good for today’s code making and breaking technologies and GCHQ hopes it will inspire the next generation to take an interest in cyber security. Students, on a placement at GCHQ, originally developed the app for the Cheltenham Science Festival. It was meant to demonstrate encryption techniques, but it proved popular with the teachers who saw it, who asked for it to be made available as a teaching aid. In addition to giving users a basic understanding of cryptography they can use Cryptoy to compose and send encrypted messages via social media, challenging friends and family to decode their messages. It’s probably unnecessary, though, as anyone over 40 will know that teenage text-speak is already an almost unbreakable code…

1512 

News Brief Archives 2006, 2007 2008 2009  2010 2011  2012 2013 2014 2015  

All information on this web site is provided as is without warranty of any kind. Neither PCTOPTIPS nor its employees nor contributors are responsible for any loss, injury, or damage, direct or consequential, resulting from your choosing to use any of the information contained herein.

Copyright ©  2006 - 2015 PCTopTips.

 

 

free web stats