We have used a variety of FTP clients and servers to transfer data between locations. Typically, our clients (even the big ones) use the FTP tools included with the operating system. It’s great that they are there – and when used only occasionally or to do something quick and dirty – they do the job – but … we’ve encountered the occasional error with these applications because they are typically single-threaded applications and choke when you feed them large files.

An open source application, FileZilla is a fast FTP and SFTP client for Windows with a lot of features. Both client and server modules are available.

Read More »

How to comply with SPAM laws

Q & A: How can I comply with the CAN-SPAM Act of 2003?


Clear identification of the message as an advertisement or solicitation.
Opportunity to decline further messages from the sender.
A valid postal address.
A valid header & subject line.

Up to 5 years imprisonment
Up to $11,000 in fines per incident
Forfeiture of Property

Read More »

SPAM: The best defense is to understand

Technology alone cannot stop junk mail – nor can governmental intervention – and neither can we.

There are a variety of ways that you might end up on a spammer’s mailing list; there are various methods they use to send you spam. Your best defense is to understand the nature of spam and choose the best strategy based on your environment and internet usage habits. The trick is to get rid of the spam without losing legitimate email.

Read More »

The future of SPAM

I subscribe to many, many newsletters that involve the IT industry – trends, troubleshooting, etc…. One of these newsletters I received had some alarming information in it regarding the trend of spam and viruses as related to email. The data, as reported, focused on email processed by one large vendor…

Postini recently predicted what 2005 will bring for spam and gave an overview of the situation in 2004. Here’s a summary of what happened – and what Postini thinks will happen during the next 12 months:

Read More »

HOW TO: Remove Hidden Data in MS-Office® documents

When you create a document in a MS-Office® application (ie. MS-Word®, MS-Excel®, MS-Powerpoint®), it retains all of the modifications you’ve made during the creation of the document. It does this so that you can restore to a previous revision if need be, collaborate with others, etc. While this is a nice feature while you are editing a document, you might not want to include this content in the final product.

Read More »

How To: Microsoft Outlook Mail Merge

As with everything else with computers, there are a dozen different ways to do anything. Most of them are for more complicated than they need to be. Using the step-by-step instructions provided in this document, you will learn an EASY way to merge your contacts from MS-Outlook® into a MS-Word® document.

For the sake of simplicity, we are creating address labels.

Software Version Required:
MS-Office® 2002

Read More »


Some Web sites store information in a small text file that they save on your computer. This file is called a cookie.

What types of cookies are there?
A first-party cookie is originated by the website that you are viewing, while a third-party cookie is originated by a different site – perhaps another site linked to the site you are viewing – or maybe a site relative to a pop-up advertisement that displays on your computer.

What purpose do cookies serve?
A first-party cookie allows you to edit customization features of the website (your local weather for instance) or specify your preferences for viewing the site. A third-party cookie usually provides some type of content (usually an advertisement) on the website that you are viewing.

Read More »


We all like something free now and then. It’s even better when it’s something of quality for free …  Picasa® is a digital photo album owned by Google®—one of the (if not THE) top-rated search engines on the internet.

Read More »

Windows XP: Getting help through remote access

Windows XP comes with a simplified version of Terminal Server which will allow us to access your system through the internet. To make it work, you have to give us access. This document will walk you step-by-step through that process.

Read More »

Safer Surfing

First of all, I don’t think I’ve ever encountered any application that was 100% bug-free; even ‘top of the line, $5000 per user license’ applications. Yes, they have bugs – but so does everything else. So in that respect …

Read More »


A lot of companies are afraid to allow remote access to their systems – and dependent upon the configuration of your system – your fears may be valid. Fear is a good thing – unless you are paralyzed by it.

Read More »