web analytics

Creating Apple Login and Logout Scripts to Track Computer Usage in Console System Log Files

Technology > Apple Summary. This document describes how to create a system file that will track when users login and logout. The resulting log file can be imported into a spreadsheet for calculating the amount of time spent working on the computer. These instructions are for experienced users only. Proceed at your own risk. Alternative.… Continue reading Creating Apple Login and Logout Scripts to Track Computer Usage in Console System Log Files

Craftsman 1.5 Gallon Portable Air Compressor

Summary With the proper attachments, the Craftsman 1.5 Gallon Portable Air Compressor is ideal for cleaning computers. Benefits When compared to other air compressors, the benefits of this particular model air compressor are: Safety and Cleaning Computers Here are some safety considerations for using an air compressor for cleaning. Instructional Video Below is a video that… Continue reading Craftsman 1.5 Gallon Portable Air Compressor

Using Symantec Norton Ghost 2003 for Image Backup, Restore, and System Recovery

Technology > Resources Summary. Symantec (Norton) Ghost 2003 is a utility program that makes it possible to create a complete system image that can be restored later (to the same computer) in the event of a hard drive crash. The backup includes data files, as well as the operating system, programs, and settings. The Ghost… Continue reading Using Symantec Norton Ghost 2003 for Image Backup, Restore, and System Recovery

Hackers Launch Biggest Data Heist in History With a Global Kneber Botnet Virus Hacking Campaign to Hack the Planet

Technology Summary. The world’s largest data heist and hacking campaign was recently discovered and it is still underway. There are a surprisingly small number of news reports about this story so far. According to a report by PC World, the Kneber botnet virus “puts the potential threat of last year’s Conficker worm to shame.” According… Continue reading Hackers Launch Biggest Data Heist in History With a Global Kneber Botnet Virus Hacking Campaign to Hack the Planet

Apple Mail Optimal Toolbar Icon Configuration

Effective Living > Technology > Apple Summary. The Apple Mail client has a default set of icons along the top of the application window. However, additional icons can be inserted by customizing the toolbar. Instructions. Follow these instructions to customize and configure the Apple Mail toolbar for maximum efficiency. Right click in the toolbar area… Continue reading Apple Mail Optimal Toolbar Icon Configuration

Apple Computer Resource Group

Effective Living > Technology > Apple Summary The Apple Computer Resource Group provides sales, service, support, and training for Apple computer users. Click here to learn more. Shopping for Apple Products Here are links to Apple products available on Amazon. Apple iMac, Mac Pro, and Mac Mini Computers Apple iPad Apple Headphones, Earbuds, AirPods Apple MacBook Laptops… Continue reading Apple Computer Resource Group