Ira Wilsker's archive

It is that dreaded time of year when our mailboxes start to fill with those W-2, 1099s and other forms that indicate to us what might be taxable income. Some people simply throw all of the tax documents in a shoe box or plastic bag, and take them to a CPA or storefront tax service for completion of 1040 forms and schedules.

shadow

I was recently helping a disabled Vietnam veteran with a not so unusual problem. He wanted to be able to watch live streaming sports events for free. His favorite free streaming live sports website now showed a frightening image stating that the domain had been seized by ICE (Immigration and Customs Enforcement) for copyright infringement. Since he was living on his disability income, money was in short supply and the various legitimate subscription websites were beyond his means.

shadow

I frequently hear about Internet users who always clean all of their cookies, citing fears of privacy issues or identity theft. If I ask some of those users what an Internet cookie is, I receive a variety of replies indicating a multiplicity of definitions varying from somewhat accurate to wildly inaccurate. There is equal misunderstanding about the functions of cookies and the degree of risk they pose to the user.

shadow

While almost all major security products implement a variety of techniques to protect against unknown malware, so called “zero day” attacks have been especially successful in penetrating most security utilities.

shadow

It should be no surprise that smart computing devices are outselling traditional desktop and laptop computers. There is an intensive battle for market share of operating systems for these smart devices, which includes smart phones, tablets and related devices. The primary combatants are Google with its Android operating system, Apple with its iOS, and Microsoft with its newly released Windows 8 version for smart devices.

shadow