Ira Wilsker's archive

For the past few years, I have been using two primary methods for recording personal medical information. One method I have been using to keep track of my personal medical information and records is an 8 gig flash drive attached to my car key chain along with a large, red, aluminum, engraved medic alert logo.

shadow

In last week’s column about Google’s Chrome 12, I mentioned how one prominent computer columnist was publicly chastised for writing about the “recent” release of Firefox 5 while it was still officially in beta (pre-release version). Well, In the brief period between my writing last week’s column and its publication, Firefox did officially release version 5.

shadow

Strong competition is good for the consumer. In the heavily fought browser wars, Firefox 4 has been closing the gap with current industry leader Internet Explorer, partially since the new and improved IE 9 is incompatible with Windows XP while Firefox 4 will run on almost all platforms. Also in the race for browser supremacy is Google, which recently released version 12 of its popular Chrome browser. Chrome has developed a large and loyal following, and many have sworn off (and swear at) Internet Explorer, and to a lesser extent, Firefox.

shadow

The news has been dominated by stories about the dangers of the Internet. Just in recent days, we have heard of major banks losing the personal information of hundreds of thousands of account holders, a congressman’s indiscretions on a social networking Web site, hackers accessing thousands of accounts at a major retailer, and many other mass data breaches that may result in wholesale identity theft.

shadow

Sometimes, despite our best efforts, it seems impossible to remove the spyware and other malware from our computers. Despite their efficacy, there are just some times that the traditional and proven malware killers will not be able to neutralize the malware on our computers. While some of the so-called “experts” simply give up and reformat the hard drive, resulting in the loss of any programs and files on the computer (unless properly backed up), this is not an appropriate step in trying to restore the computer.

shadow