AskBob's Best of 2015 - Part Two
Yesterday I published Part One of my Best of 2015. Today, I've got another batch of ten very popular articles, which have been selected using input from drones, robots, trained monkeys, eye-tracking and the latest fake artificial intelligence technology. I hope you'll read each one, leave your own comments, and share them with your Email, Facebook and Twitter friends.
More of the Top AskBob Stories of 2015
In AskBob's Best of 2015 - Part One I focused on improving your online safety, and ways to save money. Looking at today, I see some of the same themes, but other key words that jump out at me are Speed, Reliability and Education. If you want to keep your computer running optimally, avoid hard drive crashes, and learn where to find free online college classes, you'll enjoy today's final Top Ten of 2015...
Massively Open Online Classes (MOOCs) is the latest buzzword for online college classes. Demand for them (both free and paid) is taking off exponentially. Students, educators, and investors are flocking to MOOCs these days. Market research firm VisionGain estimates MOOC revenues of $1.5 billion worldwide in 2015. Check out one of the latest innovations in online learning, then see my related articles: Free Online College Courses, Free Online College Courses - Part Deux, and Free Online College Courses - Part Three.
When you start your computer, there are a bunch of programs that automatically run, before the familiar desktop appears. Most of them are essential; some are dispensable; and others may be malicious. Learn how to tweak your autoruns to improve performance and security...
Adobe Flash has a long history of security vulnerabilities; over a dozen have required patching in 2015 so far. Three more zero-days in Flash that were discovered and fixed recently have some in the tech industry crying, “Enough! Time to kill Flash forever!” But is it? Read on for the scoop. On a related note, see Time to Boycott Java?
While we’ve been focusing on the security of our desktop PCs, laptops, and mobile devices, malware-manufacturing miscreants have been exploiting the most overlooked computer in most homes and businesses: the router. For those who have high-speed Internet, the router is the little box that connects your home or office to the Internet. And they are the latest target of the online criminal classes. Here's what you need to know...
5. How To Undo a Windows 10 Upgrade Windows 10 has a lot going for it. Improved speed and security, the return of the Start button, and the Edge browser are just a few things I like about the new Windows operating system. But it also has a few rough edges right now. The good news is that Microsoft has provided an “Undo button” for those who've tried Windows 10 and want to go back to what they had before. Here's how it works, and my experience using it. SEE ALSO: Windows 10: Ready for Primetime? for help deciding if you should upgrade.
No anti-malware program eradicates every bit of every infection. If problems persist after a full scan with your standard malware killer, you can try a specialized program that digs deeply into the dark corners of your system where advanced malware hides. Read on to learn about this tool that you should have in your internet security toolbox.
“Hello? Hello? Anybody there?” That first, silent call is just a probe to see if a phone number is in active use. Automatic dialing machines place tens of thousands of silent calls per day using free or dirt-cheap Voice-over-IP technology. It's the Dark Side of robocalling. We’ve all had the experience of answering a phone call only to hear nothing. Typically, we just hang up and shrug. But those “silent calls” are sometimes the first step in well-organized campaigns to steal identities and bank account balances. Here is how these scams work, and what you should do to protect yourself.
Which hard drive brands are the most reliable? And what is the likelihood that your hard drive is going to crash and burn in the near future? A hard drive failure is the worst thing that can happen to your computer. If any other component fails you can replace it and get back to work pretty quickly. But when a hard drive stops working you lose access to all of your personal data stored on it. Getting that data back can be time-consuming, expensive, or even impossible, especially if you haven’t kept adequate backup copies. Read on to learn more about hard drive reliability and diagnostic tools...
Like millions of other consumers, I buy stuff on Amazon.com. The e-commerce juggernaut has relentlessly built a reputation as the first and only place consumers need to go when shopping online. The free two-day Prime shipping is convenient, and the prices seem to be competitive. But some eye-opening reports, a class-action lawsuit, and a new competitor are causing me to question my assumptions about Amazon. If you shop online, you'll want to read on for the details...
Have you ever received an email several days after it was sent? Have you ever gotten an unwanted email with a fake “From” name, and wished you could find out where it came from? Read on to learn about some free tools that can help you trace the source (or path) of an email.
I hope you've enjoyed reviewing the most popular topics from the last twelve months. Please leave a comment, and don't forget to tell a friend about AskBobRankin.com, or share a link via Email or Facebook. Happy New Year!
This article was posted by Bob Rankin on 31 Dec 2015
|For Fun: Buy Bob a Snickers.|
AskBob's Best of 2015 - Part One
The Top Twenty
This Antivirus Plugin Makes You LESS Secure
Post your Comments, Questions or Suggestions
Free Tech Support -- Ask Bob Rankin
Subscribe to AskBobRankin Updates: Free Newsletter
Copyright © 2005 - Bob Rankin - All Rights Reserved
Article information: AskBobRankin -- AskBob's Best of 2015 - Part Two (Posted: 31 Dec 2015)
Copyright © 2005 - Bob Rankin - All Rights Reserved