Excel Time saving Shortcuts

March 22nd, 2010 | Posted in Technology Information

Move to next cell in row – Tab
Move to previous cell in row – Shift + Tab
Up one screen – Page Up
Down one screen – Page Down
Move to next worksheet – Ctrl + Page Down
Move to previous worksheet – Ctrl + Page Up
Go to first cell in data region – Ctrl + Home
Go to last cell in data region – Ctrl + End
Bold toggle for selection – Ctrl + B
Italic toggle for selection – Ctrl + I
Underline toggle for selection – Ctrl + U
Strikethrough for selection – Ctrl + 5
Change the font – Ctrl + Shift + F
Change the font size – Ctrl + Shift + P
Apply outline borders – Ctrl + Shift + 7
Remove all borders – Ctrl + Shift + Underline
Wrap text in same cell – Alt + Enter
Format cells – Ctrl + 1
Select font – Ctrl + Shift + F
Select point size – Ctrl + Shift + P
Format as currency – Ctrl + Shift + 4
Format as general – Ctrl + Shift + # (hash sign)
Format as percentage – Ctrl + Shift + 5
Format as number – Ctrl + Shift + 1
Autosum a range of cells – Alt + Equals Sign
Insert the date – Ctrl + ; (semi-colon)
Insert the time – Ctrl + Shift + ; (semi-colon)
Insert columns/rows – Ctrl + Shift + + (plus sign)
Insert a new worksheet – Shift + F11
Read Monitor Cell One – Alt + Shift + 1
Read Monitor Cell Two – Alt + Shift + 2
Read Monitor Cell Three – Alt + Shift + 3
Read Monitor Cell Four – Alt + Shift + 4
List Visible Cells With Data – Ctrl + Shift + D
Lists Data In Current Column – Ctrl + Shift + C
List Data In Current Row – Ctrl + Shift + R
Select Hyperlink – Ctrl + Shift + H
Move To Worksheet Listbox – Ctrl + Shift + S
Move To Monitor Cell – Ctrl + Shift + M
Select Worksheet Objects – Ctrl + Shift + O
List Cells At Page Breaks – Ctrl + Shift + B
Options Listbox – Insert + V


Easy move through Powerpoint

March 22nd, 2010 | Posted in Technology Information

Apply subscript formatting – CTRL+EQUAL SIGN (=)
Apply superscript formatting – CTRL+PLUS SIGN (+)
Bold – CTRL+B
Capitalize – SHIFT+F3
Copy – CTRL+C
Delete a word – CTRL+BACKSPACE
Demote a paragraph – ALT+SHIFT+RIGHT ARROW
Find – CTRL+F
Insert a hyperlink – CTRL+K
Insert a new slide – CTRL+M
Italicize – CTRL+I
Make a duplicate of the current slide – CTRL+D
Open – CTRL+O
Open the Font dialog box – CTRL+T
Paste – CTRL+V
Print – CTRL+P
Promote a paragraph – ALT+SHIFT+LEFT ARROW
Repeat your last action – F4 or CTRL+Y
Save – CTRL+S
Select all – CTRL+A
Start a slide show – F5
Switch to the next pane (clockwise) – F6
Switch to the previous pane – SHIFT+F6
Undo – CTRL+Z
View guides – CTRL+G


Accessibility Shortcuts

March 22nd, 2010 | Posted in Technology Information

Tap SHIFT 5 times – Toggles StickyKeys on and off.
Press down and hold the right SHIFT key for 8 seconds – Toggles FilterKeys on and off.
Press down and hold the NUM LOCK key for 5 seconds – Toggles ToggleKeys on and off.
Left ALT+left SHIFT+NUM LOCK – Toggles MouseKeys on and off.
Left ALT+left SHIFT+PRINT SCREEN – Toggles High Contrast on and off.


Internet Explorer Shortcuts:

March 22nd, 2010 | Posted in Technology Information

CTRL+A – Select all items on the current page
CTRL+D – Add the current page to your Favorites
CTRL+E – Open the Search bar
CTRL+F – Find on this page
CTRL+H – Open the History bar
CTRL+I – Open the Favorites bar
CTRL+N – Open a new window
CTRL+O – Go to a new location
CTRL+P – Print the current page or active frame
CTRL+S – Save the current page
CTRL+W – Close current browser window
CTRL+ENTER – Adds the http://www. (url) .com
SHIFT+CLICK – Open link in new window
BACKSPACE – Go to the previous page
ALT+HOME – Go to your Home page
HOME – Move to the beginning of a document
TAB – Move forward through items on a page
END – Move to the end of a document
ESC – Stop downloading a page
F11 – Toggle full-screen view
F5 – Refresh the current page
F4 – Display list of typed addresses
F6 – Change Address bar and page focus
ALT+RIGHT ARROW – Go to the next page
SHIFT+CTRL+TAB – Move back between frames
SHIFT+F10 – Display a shortcut menu for a link
SHIFT+TAB – Move back through the items on a page
CTRL+TAB – Move forward between frames
CTRL+C – Copy selected items to the clipboard
CTRL+V – Insert contents of the clipboard
ENTER – Activate a selected link
HOME – Move to the beginning of a document
END – Move to the end of a document
F1 – Display Internet Explorer Help


Windows Explorer Shortcuts:

March 22nd, 2010 | Posted in Technology Information

ALT+SPACEBAR – Display the current window’s system menu
SHIFT+F10 – Display the item’s context menu
CTRL+ESC – Display the Start menu
ALT+TAB – Switch to the window you last used
ALT+F4 – Close the current window or quit
CTRL+A – Select all items
CTRL+X – Cut selected item(s)
CTRL+C – Copy selected item(s)
CTRL+V – Paste item(s)
CTRL+Z – Undo last action
CTRL+(+) – Automatically resize the columns in the right hand pane
TAB – Move forward through options
ALT+RIGHT ARROW – Move forward to a previous view
ALT+LEFT ARROW – Move backward to a previous view
SHIFT+DELETE – Delete an item immediately
BACKSPACE – View the folder one level up
ALT+ENTER – View an item’s properties
F10 – Activate the menu bar in programs
F6 – Switch between left and right panes
F5 – Refresh window contents
F3 – Display Find application
F2 – Rename selected item


All windows shortcuts – exclusive

March 22nd, 2010 | Posted in Technology Information

Command Prompt:
ANSI.SYS Defines functions that change display graphics, control cursor movement, and reassign keys.
APPEND Causes MS-DOS to look in other directories when editing a file or running a command.
ARP Displays, adds, and removes arp information from network devices.
ASSIGN Assign a drive letter to an alternate letter.
ASSOC View the file associations.
AT Schedule a time to execute commands or programs.
ATMADM Lists connections and addresses seen by Windows ATM call manager.
ATTRIB Display and change file attributes.
BATCH Recovery console command that executes a series of commands in a file.
BOOTCFG Recovery console command that allows a user to view, modify, and rebuild the boot.ini
BREAK Enable / disable CTRL + C feature.
CACLS View and modify file ACL’s.
CALL Calls a batch file from another batch file.
CD Changes directories.
CHCP Supplement the International keyboard and character set information.
CHDIR Changes directories.
CHKDSK Check the hard disk drive running FAT for errors.
CHKNTFS Check the hard disk drive running NTFS for errors.
CHOICE Specify a listing of multiple options within a batch file.
CLS Clears the screen.
CMD Opens the command interpreter.
COLOR Easily change the foreground and background color of the MS-DOS window.
COMP Compares files.
COMPACT Compresses and uncompress files.
CONTROL Open control panel icons from the MS-DOS prompt.
CONVERT Convert FAT to NTFS.
COPY Copy one or more files to an alternate location.
CTTY Change the computers input/output devices.
DATE View or change the systems date.
DEBUG Debug utility to create assembly programs to modify hardware settings.
DEFRAG Re-arrange the hard disk drive to help with loading programs.
DEL Deletes one or more files.
DELETE Recovery console command that deletes a file.
DELTREE Deletes one or more files and/or directories.
DIR List the contents of one or more directory.
DISABLE Recovery console command that disables Windows system services or drivers.
DISKCOMP Compare a disk with another disk.
DISKCOPY Copy the contents of one disk and place them on another disk.
DOSKEY Command to view and execute commands that have been run in the past.
DOSSHELL A GUI to help with early MS-DOS users.
DRIVPARM Enables overwrite of original device drivers.
ECHO Displays messages and enables and disables echo.
EDIT View and edit files.
EDLIN View and edit files.
EMM386 Load extended Memory Manager.
ENABLE Recovery console command to enable a disable service or driver.
ENDLOCAL Stops the localization of the environment changes enabled by the setlocal command.
ERASE Erase files from computer.
EXIT Exit from the command interpreter.
EXPAND Expand a M*cros*ft Windows file back to it’s original format.
EXTRACT Extract files from the M*cros*ft Windows cabinets.
FASTHELP Displays a listing of MS-DOS commands and information about them.
FC Compare files.
FDISK Utility used to create partitions on the hard disk drive.
FIND Search for text within a file.
FINDSTR Searches for a string of text within a file.
FIXBOOT Writes a new boot sector.
FIXMBR Writes a new boot record to a disk drive.
FOR Boolean used in batch files.
FORMAT Command to erase and prepare a disk drive.
FTP Command to connect and operate on a FTP server.
FTYPE Displays or modifies file types used in file extension associations.
GOTO Moves a batch file to a specific label or location.
GRAFTABL Show extended characters in graphics mode.
HELP Display a listing of commands and brief explanation.
IF Allows for batch files to perform conditional processing.
IFSHLP.SYS 32-bit file manager.
IPCONFIG Network command to view network adapter settings and assigned values.
KEYB Change layout of keyboard.
LABEL Change the label of a disk drive.
LH Load a device driver in to high memory.
LISTSVC Recovery console command that displays the services and drivers.
LOADFIX Load a program above the first 64k.
LOADHIGH Load a device driver in to high memory.
LOCK Lock the hard disk drive.
LOGON Recovery console command to list installations and enable administrator login.
MAP Displays the device name of a drive.
MD Command to create a new directory.
MEM Display memory on system.
MKDIR Command to create a new directory.
MODE Modify the port or display settings.
MORE Display one page at a time.
MOVE Move one or more files from one directory to another directory.
MSAV Early M*cros*ft Virus scanner.
MSD Diagnostics utility.
MSCDEX Utility used to load and provide access to the CD-ROM.
NBTSTAT Displays protocol statistics and current TCP/IP connections using NBT
NET Update, fix, or view the network or network settings
NETSH Configure dynamic and static network information from MS-DOS.
NETSTAT Display the TCP/IP network protocol statistics and information.
NLSFUNC Load country specific information.
NSLOOKUP Look up an IP address of a domain or host on a network.
PATH View and modify the computers path location.
PATHPING View and locate locations of network latency.
PAUSE Command used in batch files to stop the processing of a command.
PING Test / send information to another network computer or network device.
POPD Changes to the directory or network path stored by the pushd command.
POWER Conserve power with computer portables.
PRINT Prints data to a printer port.
PROMPT View and change the MS-DOS prompt.
PUSHD Stores a directory or network path in memory so it can be returned to at any time.
QBASIC Open the QBasic.
RD Removes an empty directory.
REN Renames a file or directory.
RENAME Renames a file or directory.
RMDIR Removes an empty directory.
ROUTE View and configure windows network route tables.
RUNAS Enables a user to execute a program on another computer.
SCANDISK Run the scandisk utility.
SCANREG Scan registry and recover registry from errors.
SET Change one variable or string to another.
SETLOCAL Enables local environments to be changed without affecting anything else.
SETVER Change MS-DOS version to trick older MS-DOS programs.
SHARE Installs support for file sharing and locking capabilities.
SHIFT Changes the position of replaceable parameters in a batch program.
SHUTDOWN Shutdown the computer from the MS-DOS prompt.
SMARTDRV Create a disk cache in conventional memory or extended memory.
SORT Sorts the input and displays the output to the screen.
START Start a separate window in Windows from the MS-DOS prompt.
SUBST Substitute a folder on your computer for another drive letter.
SWITCHES Remove add functions from MS-DOS.
SYS Transfer system files to disk drive.
TELNET Telnet to another computer / device from the prompt.
TIME View or modify the system time.
TITLE Change the title of their MS-DOS window.
TRACERT Visually view a network packets route across a network.
TREE View a visual tree of the hard disk drive.
TYPE Display the contents of a file.
UNDELETE Undelete a file that has been deleted.
UNFORMAT Unformat a hard disk drive.
UNLOCK Unlock a disk drive.
VER Display the version information.
VERIFY Enables or disables the feature to determine if files have been written properly.
VOL Displays the volume information about the designated drive.
XCOPY Copy multiple files, directories, and/or drives from one location to another.
TRUENAME When placed before a file, will display the whole directory in which it exists
TASKKILL It allows you to kill those unneeded or locked up applications

Run Commands To Access The Control Panel

Add/Remove Programs control appwiz.cpl
Date/Time Properties control timedate.cpl
Display Properties control desk.cpl
FindFast control findfast.cpl
Fonts Folder control fonts
Internet Properties control inetcpl.cpl
Keyboard Properties control main.cpl keyboard
Mouse Properties control main.cpl
Multimedia Properties control mmsys.cpl
Network Properties control netcpl.cpl
Password Properties control password.cpl
Printers Folder control printers
Sound Properties control mmsys.cpl sounds
System Properties control sysdm.cp

Run Commands:

compmgmt.msc – Computer management
devmgmt.msc – Device manager
diskmgmt.msc – Disk management
dfrg.msc – Disk defrag
eventvwr.msc – Event viewer
fsmgmt.msc – Shared folders
gpedit.msc – Group policies
lusrmgr.msc – Local users and groups
perfmon.msc – Performance monitor
rsop.msc – Resultant set of policies
secpol.msc – Local security settings
services.msc – Various Services
msconfig – System Configuration Utility
regedit – Registry Editor
msinfo32 _ System Information
sysedit _ System Edit
win.ini _ windows loading information(also system.ini)
winver _ Shows current version of windows
mailto: _ Opens default email client
command _ Opens command prompt

Windows XP Shortcuts:

ALT+- (ALT+hyphen) Displays the Multiple Document Interface (MDI) child window’s System menu
ALT+ENTER View properties for the selected item
ALT+ESC Cycle through items in the order they were opened
ALT+F4 Close the active item, or quit the active program
ALT+SPACEBAR Display the System menu for the active window
ALT+TAB Switch between open items
ALT+Underlined letter Display the corresponding menu
BACKSPACE View the folder one level up in My Computer or Windows Explorer
CTRL+A Select all
CTRL+B Bold
CTRL+C Copy
CTRL+I Italics
CTRL+O Open an item
CTRL+U Underline
CTRL+V Paste
CTRL+X Cut
CTRL+Z Undo
CTRL+F4 Close the active document
CTRL while dragging Copy selected item
CTRL+SHIFT while dragging Create shortcut to selected iteM
CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word
CTRL+LEFT ARROW Move the insertion point to the beginning of the previous word
CTRL+DOWN ARROW Move the insertion point to the beginning of the next paragraph
CTRL+UP ARROW Move the insertion point to the beginning of the previous paragraph
SHIFT+DELETE Delete selected item permanently without placing the item in the Recycle Bin
ESC Cancel the current task
F1 Displays Help
F2 Rename selected item
F3 Search for a file or folder
F4 Display the Address bar list in My Computer or Windows Explorer
F5 Refresh the active window
F6 Cycle through screen elements in a window or on the desktop
F10 Activate the menu bar in the active program
SHIFT+F10 Display the shortcut menu for the selected item
CTRL+ESC Display the Start menu
SHIFT+CTRL+ESC Launches Task Manager
SHIFT when you insert a CD Prevent the CD from automatically playing
WIN Display or hide the Start menu
WIN+BREAK Display the System Properties dialog box
WIN+D Minimizes all Windows and shows the Desktop
WIN+E Open Windows Explorer
WIN+F Search for a file or folder
WIN+F+CTRL Search for computers
WIN+L Locks the desktop
WIN+M Minimize or restore all windows
WIN+R Open the Run dialog box
WIN+TAB Switch between open items


Apple to Prepare 12-Core Mac Pros and 27-inch LED Cinema Displays

March 19th, 2010 | Posted in Technology Information

Apple Dodeca-core Mac ProApple is hard at work putting the “icing on the cake” for a pair of new products that Apple says are targeted at their professional customers. The two devices in question are a larger version of Apple’s LED Cinema Display as well as a major upgrade to the Mac Pro workstations according to AppleInsider.

The first product on the list is Apple’s Cupertino-based second LED-backlit Cinema Display. The new version will upgrade the previous 24-inch model to a 27-inch model. The 27-inch model has been rumored to have been sitting in the labs at Apple waiting for the displays to arrive. The new model will have a 27-inch diagonal frame which will support a 2560×1440 native resolution.

Since the 27-inch iMacs were so successful, Apple now believes that they can market the displays at a much more affordable price. Apple has also said that they fixed the problems that plagued the same size panels ultimately slowing the momentum of the larger iMac offerings back when they released in October 2009.

But the increased monitors are not the only thing Apple is coming up with. The company is also producing their boldest update to the Mac Pro they have ever done. Details about the update are still kind of scarce but anybody familiar with the matter were very clear in stating that Mac maker’s plans call for a dodeca-core model which supports a pair of Intel’s latest Westmere-bashed hexacore chips totaling out at 12 cores.

Another rumor floating around is that Apple will more than likely stay with its existing Xeon strategy by putting in a pair of not-so-cheap Xeon 5600 Series “Gulftown” chips into a dodeca-core Mac Pro. Apple will also be offering a single processor model with only 6 cores with a price similar to the $2,500 quad-core model.

Both the 27-inch monitor and the 5600 Series should be available by June with the 5600 Series coming in 2.66, 2.8, 2.93 and 3.33GHz configurations with a price ranging anywhere from $996 to $1663 in lots of 1000. The new 32 nanometer chips have 12MB of L3 cache as well as 6 cores with 12 threads for each CPU.

Whichever rout you go, either the single or the double Xeon model, be prepared to shell out a nice chunk of change. However, by doing so you will definitely be rewarded in the end. No official release date has been set but we should see these products sometime this June.


Looking for Computer / PC Rental information? Visit the www.rentacomputer.com PC Rental page for your short term business PC needs. Or see this link for a complete line of Personal Computer Rentals.


Never Use These Passwords

March 17th, 2010 | Posted in Technology Information

Never Use These Passwords

Computer security is more important than ever these days and one of the most simple things you can do to protect yourself is come up with a password that is not easy to guess. Sure, it’s tempting to come up with something easy for your own benefit; with all of passwords we have to remember these days, you probably find yourself forgetting your passwords if you don’t keep careful documentation of them, but an easy password is like an invitation to anyone looking to steal your information.

According to researchers at the University of Maryland’s James Clark School of Engineering in College Park, unsecured computers are hacked into over 2,000 times a day or every 39 seconds. Study leader Michel Cukier says it’s a lot more common than you think, “Most of these attacks employ automated scripts that indiscriminately seek out thousands of computers at a time, looking for vulnerabilities. Our data provide quantifiable evidence that attacks are happening all the time to computers with Internet connections. The computers in our study were attacked, on average, 2,244 times a day.”

Hackers are experts at coming up with passwords. For example, many people use their user name as their password. If you think you’re being clever, guess again. 43% of the time, hackers are able to guess passwords by simply guessing that it’s the user name. So what other kind of passwords are common and easily guessed? Below is a list of the ten most common passwords:

  1. User Name
  2. User Name with 123 at the end
  3. 123456
  4. the word “password”
  5. 1234
  6. 12345
  7. passwd
  8. 123
  9. test
  10. 1

If any of these sound familiar, you probably need to change your information immediately. In addition, you might want to reconsider your user name if it’s one of these top ten common user names:

  1. root
  2. admin
  3. test
  4. guest
  5. info
  6. adm
  7. mysql
  8. user
  9. administrator
  10. oracle

Once a hacker gains access to your computer, any number of things can happen. According to the study, the first things they do are check your software configuration, change your password, check your hardware and software configuration again, download a file, install the downloaded program and run the downloaded program.

But why are they doing this? Often, they are creating a “botnet.” A botnet monitors your computer and reports back to the hacker. They can lead to fraud or identity theft, disrupt other networks or damage computer files, and lots of other criminal activity.


Looking for Computer / PC Rental information? Visit the www.rentacomputer.comPC Rental page for your short term business PC needs. Or see this link for a complete line of Personal Computer Rentals.


Safe Eyes 6.0 Parental Internet Control Program

March 14th, 2010 | Posted in Technology Information

safe eyes 6.0There are a variety of different types of parental control programs out there right now. Some force your kids to behave themselves while utilizing the Internet by reporting all of their actions to you. Other programs tend to stress parent-child communication instead of using strict control. Now the majority of these programs fall somewhere in between these two extremes. There goal is to keep kids from mistakenly or purposely finding sights that you want them to stay away from. Safe Eyes 6.0 is taking the middle ground. It has been deemed a “family Internet manager,” meaning that it is trying promote parent-child communication while still keeping its protective features.

The new 6.0 version is set up in a much different manner than the previous Safe Eyes program. When you log into the administrator page, there is a list of topics such as Web sites, music, games, internet messaging, videos, etc. that you can view the history of. This new page is a lot easier to navigate as it is a lot less busy. Safe Eyes is for both Mac and Windows platforms, so instead of utilizing either platform’s standard help system, Safe Eyes has designed built-in help pages. It is also important to notes that unlike many other parental control programs, Safe Eyes works exactly the same on either a Mac or Windows platform.

User Profiles
With Safe Eyes, you are the given the ability to install your program on up to three computers in your household, and once you create user profiles, they will be shared on all the different computers. You can create up to 10 profiles with Safe Eyes.

The settings page will allow you to see an overview of the settings of each account, including the administrators account. Also on this page, you will be able to make any high-level changes that are necessary.

Internet Filtering and Searching
Safe Eyes conveniently gives you the ability to block dozens of websites without having to specifically go through and name all of those sites. Safe Eyes has a list of dozens of categories that you can block automatically. They also allow you to select an age range that will then automatically block certain categories that they believe to be generally inappropriate. You are also given the opportunity to chose low, medium, or high filtering under each category.

You can also turn on safe search which will not allow your child to see search results for certain terms that they might try to look up. Things that you may specifically block with safe search include any search that might have profanity, sexually-suggestive material, or any other thing you defined as “bad” for that user.

Videos and Music
On sights like YouTube, kids can find anything from news items to porn. Many parents may feel the need to just block this sight entirely, but Safe Eyes has worked hard to filter through sites such as YouTube. Safe Eyes will filter out any inappropriate content on YouTube by checking metadata, tags, titles, and YouTube’s “inappropriate” flagged content. Safe Eyes will also filter through movie and TV clips by examining their MPAA movie rating or FCC TV rating. You can easily customize which user can view what kind of rated content by determining whether they can see G and TV-G, PG and TV-PG, or PG-13 and TV-14. Safe Eyes monitors videos from sites like Hulu, ABC, NBC, FOX, and iTunes. With sites like iTunes, Safe Eyes will restrict your child from downloading songs that have explicit lyrics.

The activity report that can be found on the administrator’s page will show you all videos that have been watched by users and all of the videos that have been blocked from your child. On this page, you can easily view what your child has been watching by clicking on a thumbnail next to contents summary. This makes monitoring what your children are watching quite easy.

Instant Messaging and E-mail
Safe Eyes has come up with a unique way for you to be able to monitor your kids emailing. You are given the ability to block any e-mails that your child receives except from senders that you yourself have whitelisted. It will also allow you to see all of the messages that your child receives including those that have been blocked.

Safe Eyes has not yet developed anything that will monitor Facebook or Myspace chatting, but it does check up on AIM, MSN Messenger, and Yahoo! Messenger. If you choose to monitor your child’s web conversations, Safe Eyes will record every conversation that your child has online so that you can check up on them.

Game and Program Control
The control over the games that your child plays is quite easy to use. You can simply block any game websites that you don’t want your child to access. Choosing what programs you want your child to be able use is just as easy. Simply block all of the programs that you don’t want them to use and you’re set. Blocking games and programs is very straightforward with Safe Eyes, but the issue with Safe Eyes is that all kids have to do to get around the block is launch a renamed copy of the blocked program.

Protecting Your Personal Information
Kids have a tendency to sometimes reveal a little more personal information then you would like. You probably don’t want your child broadcasting things like your address and phone number, so what Safe Eyes does is let you decide what personal items you don’t want each child to be able to reveal. If your child violates the personal guidelines that you set down for them, Safe Eyes will alert you immediately. Although it would be nice if the program simply didn’t allow your child to post such information, at least it keeps you informed.

Instant Alerts
Safe Eyes gives you a variety of different ways to be notified when your child is violating the settings that you have set down for them. You can be notified via e-mail, phone, or text message. When you first set up all of the accounts on your computer, you choose a sensitivity level for each child. If that child reaches that sensitivity level then you will be immediately notified about what it is that triggered the alert.

Report Configuration
The administrator pages are very easy to navigate. Reports are stored by default. At first you will see the “today’s activity” page, but you can select any date range that you wish to examine. The main page gives you a basic summary of Web sites that have been blocked or allowed as well as the top searches and sites that have been visited. When you dig more deeply into the report, you can easily find all of the URL’s of the sites that have been visited or blocked.

On another page, you can see videos blocked and watched, music choices, and IM conversations, while in yet another section you can see all games and programs that have been used. On the social networking tab, you can view if your child has posted any personal information or profanity. Also, all of the e-mails that your child has received or sent can be viewed in a section as well.

Overall, Safe Eyes 6.0 is a very helpful and useful parental control program. It has a variety of different features that really do allow you to protect your child to the best of your ability. If you’re looking for a good parental control program, Safe Eyes definitely is a program that you should consider.


Looking for Computer / PC Rental information? Visit the www.rentacomputer.com PC Rental page for your short term business PC needs. Or see this link for a complete line of Personal Computer Rentals.


Desktops Gone in Three Years?

March 8th, 2010 | Posted in Technology Information

Desktops Gone in Three Years?

Everyone (except maybe my parents) know that desktops are becoming less popular. People are trading in their old computers for newer, more portable models or other devices that allow them to perform many of the same functions (browse the web, check email) on the go. But while speaking at the Digital Landscapes Conference, Google Vice President of Global Ad Operations, John Herlihy, made the shocking prediction that desktops would become obsolete in as little as three years. And he says laptops aren’t far behind:

“In three years time, desktops will be irrelevant. In Japan, most research is done today on smart phones, not PCs. Mobile makes the world’s information universally accessible. Because there’s more information and because it will be hard to sift through it all, that’s why search will become more and more important. This will create new opportunities for new entrepreneurs to create new business models – ubiquity first, revenue later.”

But not everyone sees it that way. People from other major tech companies say that while it’s true that smartphones and other similar gadgets are becoming increasingly popular, that doesn’t necessarily mean desktops, and especially laptops, are going anywhere. Experts believe people will continue to brace new mobile technology, as well as keeping their home computers for other tasks, allowing the two to compliment each other.

Have you ever tried to type on a mobile phone? No matter how fancy your keyboard is, after a while, your hand’s going to cramp up and increasing the size of the mobile phone is impractical. In that case, you may as well be carrying around your laptop. Tasks such as creating large word processing documents on your cell phone is probably not going to become trendy anytime in the near future which would make things so much harder on students and working professionals. The same could be said for screen size and weight. Increasing those things would defeat the purpose of having a mobile phone.

Comfort’s not the only reason. First of all, battery life is a major factor. Right now, increasing battery life would mean the same thing as increasing the comfort – more power would mean larger phones. And never mind other factors such as software design. Could you imagine gaming only on your phone?

Personally, I’m not an expert, but I think laptops sales will continue to soar. I also think desktops will be around for longer than three years. They may continue to decrease and in the long run, become obsolete, but I just can’t picture anyone giving up their computers in favor of mobile phones.


Looking for Computer / PC Rental information? Visit the www.rentacomputer.com PC Rental page for your short term business PC needs. Or see this link for a complete line of Personal Computer Rentals.