I recently wrote an article explaining how to take a screenshot after I was asked me that very question. I believe many of the commercial screenshot-taking applications on the market today certainly confuse the issue. Hopefully my article answered a lot of the questions about this frequently overlooked tool, but one thing that I didn't cover was a method to capture webpages … [Read more...]
PDF in Firefox: The file is damaged and could not be repaired.
If you're viewing a large (file-size) PDF in Firefox, you might occasionally get an error message saying "The file is damaged and could not be repaired." However, if you try to open the PDF in Internet Explorer or save the file to the desktop and open it in Adobe Reader it works just fine. This fact causes you to doubt the validity of the message you're receiving in Firefox, as … [Read more...]
Microsoft Office 2010 Beta Publicly Available
Following in the footsteps of the (successful?) beta testing of Windows 7, Microsoft is making the beta of Microsoft Office 2010 publicly available. You can download and learn more about all the Office 2010 Beta Applications, including Word, Access, PowerPoint, Publisher, Outlook, InfoPath, Excel, SharePoint Workspace, OneNote, and Communicator (as well as Visio 2010 and … [Read more...]
Funny Videos: Know Your Meme
If you're looking to understand the Internet culture or keep up with the latest fads, Know Your Meme might be just what you're looking for. Know Your Meme features a database of submitted memes (rhymes with 'themes'), a catchphrase or concept that spreads quickly from person to person via the Internet. This resource allows you to have these cultural phenomenon explained and … [Read more...]
Ask 404TS: How do I find out a Windows 7 Password and other passwords?
An interesting question has come up in the 404 Tech Support forums that I have answered to the best of my abilities. It expands on several topics that I've discussed before such as using Kon-Boot to get logged into the machine (or other means), viewing saved passwords in browsers, and circumventing some security measures by using the target hard drive as a secondary hard drive … [Read more...]