Computer Geeks and Garden Gnomes

Written by Birmingham UK Com


Continued from page 1

Atrepparttar height of one frustrating and particularly badly written install attempt I imagined myself as John Cleese with a garden gnome under my arm hunting forrepparttar 118479 writer. Anonymity onrepparttar 118480 internet does has its advantages in this case.

Now, I know you will be cynical and say that most of this is down torepparttar 118481 fact that many script writers are hoping you will pay them to install their scripts for you, indeed many do offer installation services. This really is a bad way of advertising your services. There are plenty of people who will have trouble withrepparttar 118482 easiest installs and if you wrote clear and concise documentation which any user can see is genuinely comprehensive, you are more likely to secure customers as a result of failed installs.

During this laborious exercise we went through scripts of all kinds some of which include; online photo albums, content management systems, member login and authentication scripts, virtual postcards, email programs, hosting scripts, live helper, communication, e commerce, shopping carts, quiz and chat programs to name but a few. We also purchased 3 scripts. Only one of those free scripts was simple to install and marginally better thanrepparttar 118483 free versions available. Paying money does not necessarily mean better service. In fact one photo album provider charging around $30 dollars per script provided bad install information and less than helpful advice, immediately deleting anything that mentioned install problems from his forum.

It has been an experience. If none of this has meant anything to you and you have no idea about scripting or installing scripts then consider yourself fortunate and leave it torepparttar 118484 geeks if you are able.

For those of you that regularly dive into scripting for your websites – here is a useful tip that saved us no end of time and frustration. The minute you come up against bad scripting, bad documentation or difficult to install scripts – trash them, ditch them and move on. There are plenty of others. Leaverepparttar 118485 tricky badly written stuff torepparttar 118486 real hardcore freaks.

From the website of www.birminghamuk.com


"8 Key Actions for Protecting Your Privacy Online"

Written by Doug Partridge


Continued from page 1

4. Never provide personal or financial information to a non-secure website. A "secure" website is indicated by "HTTPS" inrepparttar address bar, and a small padlock icon inrepparttar 118478 lower right-hand corner of your browser window. http://www.verisign.com/advisor/check.html is a free place to check your browser's security capabilities.

5. Never provide confidential or financial information in response to an email request. Legitimate companies will never ask for personal or financial information over an insecure medium like email. Attempts to trick people into revealing personal and financial information through impersonated email messages is known as "Phishing." Some of these messages look very official and may come what appears to be a bona fide bank or company. Beware! When unsure if an email message is genuine it's best to telephonerepparttar 118479 company in question. Phishing email messages may be reported to http://www.antiphishing.org/.

6. Readrepparttar 118480 fine print before typing in private personal information. Always readrepparttar 118481 privacy policy of a website to understand how they will use your information. Will they share or sell it? Be suspicious if no privacy policy is visible.

7. Never download or accept any file or program from an un-trusted source. Adware and Spyware are frequently bundled with "free" programs. You may download one program and find that your computer becomes infected with a Spyware programs.

8. Be wary and virus check all email attachments. Never open an unexpected email attachment, even from known friends or business senders. Their computers may be infected. Self-spreading worms can infect a computer and then send an infected email-attachment to everyone inrepparttar 118482 owner's address book.

Malicious Internet threats are clearly a formidable enemy; however,repparttar 118483 good news is that tools and information are readily available so that you can enjoyrepparttar 118484 Internet without putting your computer and confidential information at risk.

Doug Partridge is co-author of a new eBook, "How to Secure Your Computer Using Free Tools and Smart Strategies." Get all the tools and information you need to thoroughly secure your Windows computer and private information from malicious threats on the Internet. Get Secure Now => http://www.SecureYourComputer.Net


    <Back to Page 1
 
ImproveHomeLife.com © 2005
Terms of Use