Advanced Search
Search Results
1355 total results found
Is there a free Anti-Virus software for Windows XP 64-bit?
Sophos 6.x supports 64-bit Windows XP, but according to Bruin Online, the earliest it will become...
What are Favelets / How can I modify my browser on the fly?
Favelets, or bookmarklets, are a quick and easy way to add functionality to your browsing experie...
Shrink PowerPoint Files
ProblemPictures added to PowerPoint are added in a non-optimized form. Consequently, large image...
VPNs Across UCLA
Many in the UCLA community are aware of the BOL VPN, Virtual Private Network, for on-campus wirel...
Reducing Laptop Theft
To assist in reducing laptop theft UCPD participates in part of a nationwide security tracing pro...
PowerPoint Preferences / Options
Microsoft PowerPoint sets a large amount of default preferences which may not be in the best long...
Google Zeitgeist
Ever wonder about what search trends on Google are?Google Zeitgeist has an answer.Previous Year’s...
UCLA Phone Directory
Ever wonder how to contact a person at UCLA by phone, but all one has is their extension? Add th...
Recover from a Corrupted Windows Registry
When a Windows XP sp2 system cannot boot, but system restore had been enabled (as is now by defau...
What are some tips for making solid web forms?
Creating a form is arguably the most annoying pure (x)HTML task. This article provides resource...
Is there a way of making the smart folder's contents public while keeping the content's containing folder from appearing to the public?
What you can do is create a folder called “events”. Then what I like to do is restrict the addab...
What are the options for running Windows and OS X on an Intel Mac?
As of now there are two truly viable options for running Windows XP on the new Intel Mac computer...
What are Microformats?
Microformats are an unofficial solution to creating small, simple, standardized solutions based o...
Intrusion Detection Systems Information
Intrusion Detection Systems (IDS) have many approaches. This page is intended to document the di...
What is Trusted Computing?
An interesting (if you like technical) article excerpted from Amit Singh’s book, “Mac OS X Intern...
svchost.exe - application error
You get the error: svchost.exe – application error the instruction at “0×745f2780” referenced mem...
National Vulnerability Database
National Vulnerability Database is a comprehensive cyber security vulnerability database that int...
What's the best way to dispose of e-waste?
Computers and peripherals are filled with hazardous waste products, so it’s essential to dispose ...
Microsoft Volume Activation 2.0 Notes / Q& A
I attended the MS Live Meeting (10/27/2006) regarding the new Volume Activation 2.0 which will be...
Google Browser Sync!
Firefox’s major asset is its wide variety of user community created and supported extensions.The ...