TagTechnology

Logitech K750 Review – Best Wireless Keyboard Review

L

I was using the Logitech K340 keyboard for around a year. Back then, the Logitech Wireless Solar Keyboard K750 was not released yet. While the K340 keyboard was great at the start, after some time the keys would get stuck. E.g. I would be pressing down on the backspace key, and it would remain stuck, deleting not just a couple of characters, but the entire line of text. Needless to say, this was...

How To Share An Wireless/Wi-Fi Internet Connection With a Windows 7 Computer

H

It’s not often, but sometimes you end up in an area where there’s only a wired ethernet connection to the Internet, and you have 2-3 mobile devices that only use Wi-Fi. E.g. a hotel room in China where your 3G devices don’t work. What happens? This is when you’d be happy that you had a Windows 7 computer that had the following software: Virtual Router. From the...

Best Wireless Keyboard: The Logitech K340 Wireless Keyboard Review

B

I was using the Apple Bluetooth Keyboard for a while with my Thinkpad (running Windows 7), but I soon found it inadequate. The keys were mismatched, and I had to use software to match up the keys to what I want to achieve in Windows, i.e. home, end, delete, alt-tab. Also, since I got a Logitech Anywhere MX mouse with unifying technology, I decided that I should get a keyboard that uses the same...

Microsoft Office Outlook (Outlook XP/2002, Outlook 2003 or Outlook 2007) Personal Folders (PST) Backup Tool

M

Many users use Microsoft Office Outlook (i.e. Outlook XP/2002, Outlook 2003 or Outlook 2007) as their default e-mail client, contact list manager and daily management tasks organizer. Over time, it’s common to have Outlook contain all your important email messages, contacts information, calendar entries, appointment details, essential notes, critical to-do tasks and other personal data. To...

Protect Your Wireless Network with MAC Address Filtering…A Bad Idea

P

To secure your wireless network, you can use a variety of means, and one of which is by selecting only what MAC addresses are allowed. This is known as MAC filtering, and it can serve as a basic deterrent against most opportunistic attackers. However, just using MAC filtering alone will probably be a bad idea. It doesn’t take much determination or knowledge at all to spoof a MAC address. In...

How To Solve “No available system font while editing PDF in Adobe Acrobat” Problem

H

If you’ve tried editing PDF documents using Adobe Acrobat (using the Acrobat Touch Up Text Tool), then you’ve most probably come across this problem that says “No available system font”. Bummer. Now some of you might legitimately have the font when you created the PDF, but might have switched computers, went through an upgrade, or anything of that sort that caused you to...

Recursively Delete Files and Retain Folders in Windows

R

I was trying to delete all files in the current directory and all subdirectories, while keeping the directory structure intact. I found that I could use the following DOS command to recursively delete files, and NOT touch the directories: ending in .doc del /s *.doc Do note though, that ALL files with the extension doc will be deleted. You can change .doc to something else, .mp3 .pdf .wav .am .rm...

About Author

I've over 17 years of entrepreneurship experience, having built a tech company to be the top in the country, which was subsequently acquired for an 8-figure sum. As CEO, I led the company through robust growth to 150 employees across 4 countries. After the acquisition, I embraced minimalism, sold off my personal possessions, and started living around the world.

Read more about my story here.