How to enable (or improve) two finger scrolling on your Windows laptop
This is a small guide on to how to get two finger scrolling and other multi touch gestures on your Windows laptop. Even if your laptop is already capable of scrolling using two fingers, this guide can...
View ArticleThe fantastic Google
Most of us use Google to find things online. The reason is simple: Google delivers the best search result. Or do they? How do you know? Because honestly, when was the last time you tried another...
View ArticleHow much do you dare putting in the cloud?
A story I found on r/technology highlights the dangers of tying up your life in “the cloud”; more specifically to trust a company with your personal data. Google, without explanation, shut down a...
View ArticleThe easy way to clean your computer of dust
It’s no secret that computers have a tendency to attract dust. You should clean your computer now and then to avoid problems. The biggest threat of dust is buildup in the fans, causing them to spin...
View ArticleHow long do writable CD/DVD last? 400 discs put to the test!
It is a well known fact that the CD-R’s and DVD-R’s that you burn at home won’t last forever (neither does factory made media, for that matter, but that’s another story). Exactly how long is...
View ArticleStategies for using CD/DVD as backup media
In my previous article I conducted a test to see how durable CD’s and DVD’s are. This is a crucial consideration if you are thinking about using such media for backup purposes. This article contains...
View ArticleWhat is a portable application, and why should you use them?
Portable Windows applications have gained much popularity lately (which is kind of ironic, since originally all programs where pretty much portable). But what is a portable application? In this simple...
View ArticleGetting right click menus to work in 64-bit Windows Explorer
Shells extensions are components that extend the functionality of Windows. The most common type is contextual menus that appear when you right click on items in Windows Explorer. For example, an...
View ArticleTry a new PDF reader and you’ll never go back to Adobe Reader!
PDF has become the de facto standard for publishing electronic documents. Adobe created the file format and their Reader software enjoys a near-monopoly on reading PDF documents. But did you know that...
View ArticleBoost your computer with a RAM disk
Computers today are shipped with massive amounts of memory. Even a low-end computer has 4 gigs of RAM, and it’s not uncommon to get 6 or 8 GB. But 4GB is more than enough for your typical Windows 7/8...
View ArticleWhy Google isn’t my default search engine anymore
When I began using the Internet, web search technology was still in its infancy. The first search engine I can remember using was WebCrawler, mostly probably because they has a cool logo. Then I...
View ArticleSoftware piracy from a small developer’s point of view
As a hobby shareware developer I am a “victim” of software piracy. At least according to the traditional view by large software corporations and anti-piracy organization. But is this really true? Is...
View ArticleHow to send Exe files with GMail
As a software developer I often need to send exe-files by mail. Typically I send beta versions or bug fixes of my programs for people to try out and report back to me. But a lot of people use GMail...
View ArticlePreventing RSI could be as easy as switching mouse hand
I started using computers when I was about 17. By the time I was 20 I had a full time job servicing computers at an organization. At this time I began having uncomfortable, sometimes painful, feelings...
View ArticleMethod for determining candidate keys and highest normal form of a relation...
For my advanced database systems course I needed to learn how to take a given relation and functional dependencies, tell the highest normal form and then normalize it up to BCNF. It’s actually not that...
View ArticleMethod for normalizing a relation to BCNF based on functional dependencies
In the previous post I showed the method I use to determine the candidate keys and highest normal form of a relation. Now let’s break these large relations into smaller ones to make sure we achieve...
View ArticleGet a zero-installation SQL database for learning or dabbling
Database Management Systems typically require big installations and configuration to get running. I’ve always found this to be a major threshold for working with databases, especially if you only want...
View ArticleAuthentication with Passwords & Passphrases: Implications on Usability and...
The following text is a summary of an academic report I wrote together with a friend as part of a course on computer security at Lund University. The paper was graded “A” by the teacher. You can...
View ArticleSwedish Nintendo Brochure Scans 1988-1993
During the late 80′s and yearly 90′s Bergsala, the official distributor of Nintendo products in Sweden published yearly games brochures, leaflets and other promotional items. I still have some of...
View ArticleSega Game Brochure Scans 1989-1991
In a previous post I shared scans from my collection of old Swedish Nintendo game ads, brochures, pamphlets and posters. In addition to these, I also had some brochures from Sega that I have now...
View Article