Hibernation is a power- and battery-saving mode that preserves your current Windows environment. Unlike powering down, when you resume from hibernation, whatever you were working on is again open and running. That includes opened documents, videos, music files and running programs. In that way, Hibernation and Sleep are very similar, but there’s a big difference. […]
Anything tech-related, such as computers, mobile devices, networking and online security.
By default, Windows collects and saves data from memory anytime it encounters the dreaded “Blue Screen of Death” (BSOD), which is just a dramatic way of saying a system crash. It takes this data from RAM and stores it in a special memory dump file, aptly named MEMORY.DMP. This dump file is useful in identifying […]
In the past couple of articles, we discussed using Excel’s Conditional Formatting to quickly format dates relative to the current date and using formulas for more control over highlighting dates. Those are immensely useful, but the formatting effect is limited to the date cell itself. In this article, I’d like to go a step further […]
Last week, we discussed using Excel’s Conditional Formatting feature with its A Date Occurring preformats to highlight individual dates relative to the current date. That works great to dynamically apply formatting to, for example, dates occurring next week or month, but it doesn’t give you ultimate control. In this article, we’ll explore formatting more specific […]
Excel’s Conditional Formatting offers a wealth of features to highlight or format cells that conform to your specifications, often without needing to write formulas. You can use this powerful tool to locate a specific date or a range of dates. Even more impressively, you can do so dynamically, such that different dates are highlighted based […]
Data Validation List ensures entries adhere to a list of pre-configured values to protect against errors. Thus, your work maintains a higher level of accuracy and avoids excluding referneced data due to typos.
President Trump officially repealed FCC privacy rules designed for your protection. We discussed this in the last article, but in this article, we’ll dig a little deeper in what’s happening behind the scenes.
Thanks to recent changes in the law, ISPs can legally intercept, store and sell your personal data without your permission. But should you care? The answer is a resounding YES.
Using 7-Zip’s built-in checksum feature, you can create a hash for your archive and instruct the recipient to do the same. As long as the checksums remain the same, the archive is authentic. However, if the hashes differ, then the archives have been corrupted or tampered with.
Windows PowerShell includes the ability to generate checksum hashes to compare with original versions. If the newly created checksum is the same as the original, then the file’s integrity is authenticated. If, however, they differ, then some kind of corruption or tampering of the file has taken place.