• Home
  • About Me
  • Disclaimer

The Researching Paralegal

~ Articles and Research for Legal Professionals

The Researching Paralegal

Category Archives: PC Computers

Excellent Argument About Technology and Citation Placement.

13 Saturday Jun 2015

Posted by Celia C. Elwell, RP in Apple, Brief Writing, Citations, E-Briefs, E-Briefs, E-Filing, Footnotes, iPad, Laptop, Legal Technology, Legal Writing, Mac, Microsoft Office, PC Computers, Readability, Tablets

≈ Comments Off on Excellent Argument About Technology and Citation Placement.

Tags

Brian Garner, Brief Writing, Citing Legally Blog, E-Briefs, E-Filing, Legal Citations, Legal Technology, Legal Writing, Peter Martin

If the Judge Will Be Reading My Brief on a Screen, Where Should I Place My Citations? by Peter Martin, Jane M.G. Foster Professor of Law, Emeritus, Cornell Law School, Citing Legally Blog

http://citeblog.access-to-law.com/?p=149

 

As pointed out in this article, more courts require e-filing and are using tablets and other technology to read what you file. If you do not use technology, then you do not know how your document appears on the screen. It is quite different than reading something on a printed page.

So what to do? Keep writing as you always have and ignore changes brought about by technology or adjust? -CCE

A. Introduction

In a prior post I explored how the transformation of case law to linked electronic data undercut Brian Garner’s longstanding argument that judges should place their citations in footnotes. As that post promised, I’ll now turn to Garner’s position as it applies to writing that lawyers prepare for judicial readers. . . .

Continue reading →

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Teensy Change To Rule 41 Would Change Scope of Technology Search Warrants.

22 Sunday Feb 2015

Posted by Celia C. Elwell, RP in Computer Forensics, Criminal Law, Cybersecurity, Federal Rules of Criminal Procedure, Law Enforcement, Legal Technology, PC Computers, Rule 41, Search Warrants

≈ Comments Off on Teensy Change To Rule 41 Would Change Scope of Technology Search Warrants.

Tags

Advisory Committee on the Rules of Criminal Procedure, beSpacific Blog., Federal Rules of Criminal Procedure, Google, Law Enforcement, Legal Technology, Richard Salgado, Rule 41, Sabrina I. Pacifici, Search Warrant

Small Rule Change That Could Give the U.S. Government Sweeping New Warrant Power, posted by Richard Salgado, Legal Director, Law Enforcement and Information Security, by Sabrina I Pacifici, BeSpacific Blog

http://www.bespacific.com/small-rule-change-give-u-s-government-sweeping-new-warrant-power/

‘At the request of the Department of Justice, a little-known body — the Advisory Committee on the Rules of Criminal Procedure — is proposing a significant change to procedural rules that could have profound implications for the privacy rights and security interests of everyone who uses the Internet. Last week, Google filed comments opposing this change. It starts with the Federal Rule of Criminal Procedure 41, an arcane but important procedural rule on the issuance of search warrants. Today, Rule 41 prohibits a federal judge from issuing a search warrant outside of the judge’s district, with some exceptions. The Advisory Committee’s proposed change would significantly expand those exceptions in cases involving computers and networks. The proposed change would allow the U.S. government to obtain a warrant to conduct ‘remote access’ searches of electronic storage media if the physical location of the media is ‘concealed through technological means,’ or to facilitate botnet investigations in certain circumstances. The implications of this expansion of warrant power are significant, and are better addressed by Congress. First, in setting aside the traditional limits under Rule 41, the proposed amendment would likely end up being used by U.S. authorities to directly search computers and devices around the world. Even if the intent of the proposed change is to permit U.S. authorities to obtain a warrant to directly access and retrieve data only from computers and devices within the U.S., there is nothing in the proposed change to Rule 41 that would prevent access to computers and devices worldwide. The U.S. has many diplomatic arrangements in place with other countries to cooperate in investigations that cross national borders, including Mutual Legal Assistance Treaties (MLATs). Google supports ongoing efforts to improve cooperation among governments, and we are concerned that the proposed change to Rule 41 could undermine those efforts. The significant foreign relations issues associated with the proposed change to Rule 41 should be addressed by Congress and the President, not the Advisory Committee.’

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Time For A New Office Computer?

19 Monday Jan 2015

Posted by Celia C. Elwell, RP in Apple, Computer Forensics, Confidentiality, Law Office Management, Legal Ethics, Legal Technology, PC Computers, Technology, Technology

≈ Comments Off on Time For A New Office Computer?

Tags

Ball in Your Court, Client Files, Computers, Confidentiality, Craig Ball, Hard Drives, Personal Data

Give Away your Computer, Revisited, by Craig Ball, Ball In Your Court

https://ballinyourcourt.wordpress.com/2015/01/14/give-away-your-computer-revisited/

This is the fourth in a series revisiting Ball in Your Court columns and posts from the primordial past of e-discovery–updating and critiquing in places, and hopefully restarting a few conversations. As always, your comments are gratefully solicited.

Give Away Your Computer 

[Originally published in Law Technology News, July 2005]

With the price of powerful computer systems at historic lows, who isn’t tempted to upgrade? But, what do you do with a system you’ve been using if it’s less than four or five-years old and still has some life left in it? Pass it on to a friend or family member or donate it to a school or civic organization and you’re ethically obliged to safeguard client data on the hard drive. Plus, you’ll want to protect your personal data from identity thieves and snoopers. Hopefully you already know that deleting confidential files and even formatting the drive does little to erase your private information—it’s like tearing out the table of contents but leaving the rest of the book. How do you be a Good Samaritan without jeopardizing client confidences and personal privacy? . . . .

Continue reading →

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Is Email Between You And Your Client Safe? No, And This Is Why.

01 Monday Dec 2014

Posted by Celia C. Elwell, RP in Android Phones, Apple, Blackberry Phones, Clouds, Confidentiality, Emails, Encryption, iPad, iPhones, Legal Ethics, Legal Technology, Malpractice, PC Computers, Technology

≈ Comments Off on Is Email Between You And Your Client Safe? No, And This Is Why.

Tags

ABA Legal Ethics Opinion, Allen Mihecoby, Email, Encryption, Gmail, Hacking, Internet, Lawyerist Blog, Lisa Needham

How to Encrypt Attorney-Client Communications, by Lisa Needham, Lawyerist Blog (with hat tip to Allen Mihecoby, CLAS, RP!)

http://tinyurl.com/kfrpqz3

If you have decided you need to get serious about client data protection, you will need to consider encrypting both your data and your communications. We have previously covered how to encrypt your data and will focus here on how to encrypt your email communication.

What Is Encryption?

Simply by using the Internet, you are probably using some sort of encryption scheme during some activities, whether you know it or not.

Encryption is simply the act of turning your data into unreadable gibberish. If your data is intercepted or hacked, the thief now has nothing but a pile of garbage.

End-to-end encryption is a must for transferring sensitive data across the internet. In end-to-end encryption, your data is encrypted while it travels towards your intended location and the same encryption occurs on the reverse trip. Your bank (hopefully) uses end-to-end encryption. Your practice management software (hopefully) uses end-to-end encryption if it stores and syncs data remotely. This sort of encryption is done for you without any effort on your part, as it is just a standard feature of the infrastructure you are using to bank or update client data or similar activities.

Why Do You Need to Care?

A few years ago, the ABA issued a formal ethics opinion stating that if there is a significant risk that a third party might gain access to the email, attorneys have to warn clients about that risk.

This poses a problem, because unlike your bank and practice management software, email is usually unencrypted. This is true whether you are using a desktop client or a web-based email like GMail. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Pushbullett App – Connect Instantly Between Computer And Mobile Devices.

17 Sunday Aug 2014

Posted by Celia C. Elwell, RP in Android Phones, Apple, Apps, Blackberry Phones, Cell Phones, iPad, iPhones, Legal Technology, Mac, PC Computers, Tablets

≈ Comments Off on Pushbullett App – Connect Instantly Between Computer And Mobile Devices.

Tags

Apps, Legal Productivity Blog, Lisa Pansini, Notification Mirroring, Pushbullet

App of the Week: Pushbullet- Share Anything Instantly Between Your Electronic Devices, by Lisa Pansini, Legal Productivity Blog

http://bit.ly/1sOoY5P

In June’s WWDC Keynote, Apple introduced their new iOS for mobile devices as well as Yosemite, their new Mac operating system (both of which are due sometime in the fall). One of the most talked about features is the way it will connect your computer and mobile devices. Phone calls and SMS can be pushed to your computer, and with the new ‘handoff’ feature you can pass whatever you’re doing from one device to another.

If you don’t own a mac, or you’re just tired of being left of of the Apple loop and would still like to have similar functionality on your devices, download the free Pushbullet app today.

Pushbullet makes it easy to get files, links, and more from your computer to your phone or vice versa. You can also send information from one mobile device to another (e.g. phone to tablet) and anyone else who uses the app. All it requires is a chrome or firefox plugin for your computer and an active gmail account. Once the plugins are configured, you can use it to push links to your other devices, or go to Pushbullet.com to send files, notes, lists, or addresses.

Android and Windows devices have full use of the app’s abilities, but Apple devices are currently lacking the “notification mirroring” feature that allows you to receive your sms, phone calls, and other app notifications on your computer. While a major bummer, the Pushbullet website mentions that this feature is coming soon!

All other push notifications show up instantly on your desktop or your mobile device, making the Pushbullet app perfect for anyone who wants a seamless way to stay on top of their notifications. Pushbullet is currently available for iOS and android devices. You can download the apps and necessary plugins directly from Pushbullet’s website.

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Government Can Access Individual’s Gmail Account In Money Laundering Probe.

27 Sunday Jul 2014

Posted by Celia C. Elwell, RP in Android Phones, Appellate Law, Apple, Blackberry Phones, Cell Phones, Computer Forensics, Crime Scene Investigation, Criminal Law, Cybersecurity, Discovery, E-Discovery, Emails, Evidence, Experts, Forensic Evidence, Forensic Evidence, Forensic Expert Witness, Fourth Amendment - Search & Seizure, Google, Internet, iPad, iPhones, Legal Technology, Mac, PC Computers, Privacy, Search Warrants, Tablets, Trial Tips and Techniques, U.S. District Court for the District of Columbia, U.S. District Court for the Southern District of New York

≈ Comments Off on Government Can Access Individual’s Gmail Account In Money Laundering Probe.

Tags

Computers, Email, Evidence, Forensic Experts, Gmail, Google, Hard Drives, Magistrate Judge Gabriel W. Gorenstein, Money Laundering, Search & Seizure, Warrants

Federal Judge Rules Gmail Account Can Be Accessed For Investigation, by evanino in Evanino Blog

http://www.evanino.com/federal-judge-rules-gmail-account-can-accessed-investigation/

In a landmark ruling that might fuel a nationwide debate, the New York Court issued a warrant against Google, giving access to user emails.

A New York Court issued a warrant against Google Inc ruling that the government can access all mails of a Gmail account of an individual under a money laundering probe. The judge said that courts have long been waiting for law enforcement to take the required documents in the custody if it is within the purview of the warrant.

Contrary to previous rulings

This decision is not in line with the previous court rulings including courts in the Districts of Columbia and Kansas, Magistrate Judge Gabriel W. Gorenstein of the U.S. District Court for the Southern District of New York noted on Friday. Also, this latest ruling will spark a debate over the privacy, in the country, according to Computer World.

A District of Columbia judge denied from revealing the entire content of the email as this will seize a large amount of emails for which the authorities have not given any reason.

The Court in Kansas, also, did not rule in favor of a similar warrant, stating that it failed to ‘limit the universe of electronic communications and information to be turned over to the government to the specific crimes being investigated.’

However, the New York Court ruled in favor of such warrant, allowing authorities to take into account the emails and other information from a Google inc’s Gmail account, including the address book and draft mails, and also the authority to search the emails for certain specific categories of evidence.

Experts must scan emails, not Google employee

Judge Gorenstein argued that it is not possible to search the hard-disk drives of computers and other storage devices on the spot due to the complexities of electronic searches. Thus, the authorities can seize such storage.

‘We perceive no constitutionally significant difference between the searches of hard drives just discussed and searches of email accounts,’ the judge wrote. He added that in most of the cases data in an email account will be less ‘expansive’ compared to the information contained in the hard drive.

Judge Gorenstein stated that Google employees are not expert enough to know the importance of particular emails without having been given proper training in the substance of the investigation. Judge said this in response to an opinion by the District of Columbia court that gave the government the option of getting the email scanned by the host itself.

He said that an agent, who is completely absorbed in the investigation, will be able to understand the importance of a particular language in emails contrary to the employee.

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

10 Top Law-Related TED Videos.

20 Sunday Jul 2014

Posted by Celia C. Elwell, RP in Bad Legal Writing, Computer Forensics, Computer Fraud and Abuse Act, Computer Virus, Copyright, Criminal Law, Cybersecurity, Digital Millenium Copyright Act, Discovery, Encryption, Evidence, Finance and Banking Law, Fraud, Google, Government, Identity Theft, Intellectual Property, Law Office Management, Legal Technology, Legal Writing, Legalese, Malware, Management, Patent Law, PC Computers, Plain Language, Presentations, Search Engines, Trial Tips and Techniques, Trojans, Video

≈ Comments Off on 10 Top Law-Related TED Videos.

Tags

Copyright, Crime, Eyewitness, Fashion Industry, Government, Internet, Legal Productivity Blog, Legalese, Patent Troll, Plain Language, TED, Tim Baran

Top 10 Legal TED Talks, by Tim Baran, Legal Productivity Blog

http://www.legalproductivity.com/op-ed/top-10-legal-ted-talks/

Have you heard of TED? It began in 1984 as a conference and now covers a wide range of topics in more than 100 languages.  Think of it as a massive brain trust that shares great ideas and information.

Each of the law-related TED talks listed in this article are worthwhile on their own: (1) four ways to fix a broken legal system; (2) eliminate legalese by using plain English; (3) how to beat a patent troll; (4) how the Internet will change government; (5) laws that choke creativity; (6) copyright law; (7) why eyewitnesses get it wrong; (8) how technology could make crime worse; (9) the Internet and anonymity online; and (10) how great leaders inspire. -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Is It Time For A “Bring Your Own Device” Policy for Your Law Office?

01 Tuesday Jul 2014

Posted by Celia C. Elwell, RP in Android Phones, Apple, Blackberry Phones, Cell Phones, Clouds, Computer Forensics, Confidentiality, Cybersecurity, Disaster Preparedness, Emails, Encryption, Google, Intellectual Property, iPad, iPhones, Law Office Management, Legal Blogs, Legal Ethics, Legal Technology, Mac, Management, Marketing, Passwords, PC Computers, Social Media, Supervising Support Staff, Tablets, Technology, Using Social Media

≈ Comments Off on Is It Time For A “Bring Your Own Device” Policy for Your Law Office?

Tags

Apple, Blackberry Phone, Cell Phones, Confidentiality, Curo Legal Blog, Cybersecurity, iPads, iPhones, Legal Ethics, Mobile Device Policy, Passwords, Tablets, Will Harrelson

Mobile Device Security for Lawyers: How Solos and Small Firms can Ethically Allow Bring Your Own Device, by Will Harrelson, Curo Legal Blog (with hat tip to Jeff Richardson, iPhone J.D. Blog!)

http://tinyurl.com/lrrnp7g

The Start of Bring Your Own Device Policies

It really is the iPhone’s fault. Yes, Apple is to blame for designing the most desirable piece of technology of the last decade. So desirable, in fact, that employees of all stripes requested (and, often, begged) their IT departments to toss the increasingly-‘corporate’ Blackberry out the window and allow the use of their personal iPhones for corporate emails and calls. As a result, we have been living in the age of ‘Bring Your Own Device’ where employees use a single personal mobile phone (or tablet) for both their personal email, texting, and social media while also using it for work email, word processing, and other enterprise applications.

Before the Bring Your Own Device era, a company’s greatest out-of-office security concern was an employee who left a briefcase in a taxi. Today, the worry is an employee misplacing a device the size of wallet containing almost limitless amounts of data that criminals or hackers would easily and quickly exploit if given the chance. Clearly, there is an obvious financial motivation for all businesses to protect their own or customer’s sensitive data.

However, lawyers face particular ethical consequences if they fail to take reasonable efforts to either investigate the technologies that they implement or protect their client’s confidential information. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

IRS Says It Did Not Back Up Email, But Relied on Employees To Archive Email On Personal Computers.

17 Tuesday Jun 2014

Posted by Celia C. Elwell, RP in Depositions, E-Discovery, Emails, Government, Internal Revenue Service, Legal Technology, Litigation Hold, Microsoft Office, Outlook, PC Computers, Preservation, Requests for Production

≈ Comments Off on IRS Says It Did Not Back Up Email, But Relied on Employees To Archive Email On Personal Computers.

Tags

Computer Backups, Computer Crash, Disaster Preparedness, Emails, Evidence, IRS, Lois Lerner, Outlook, POLITICOPro, Rachel Bade, Ways and Means

GOP: IRS Lost More Emails In Tea Party Affair, by Rachel Bade with contributions by Josh Gerstein and Brian Faler, POLITICOPro

http://tinyurl.com/k9ycgz6

This did not catch my eye because of the politics or that the involved party is the IRS. I was simply in awe that anyone in this day and age of litigation holds and e-discovery could – with a straight face – claim to have irretrievably lost so much computer data.  -CCE

Republicans on Tuesday charged that the IRS has lost emails of a half dozen of its employees involved in the tea party targeting controversy, including a top aide to the now-fired acting IRS commissioner.

In addition to losing two years’ worth of emails sent and received by Lois Lerner, the central figure in the scandal, the IRS ‘cannot produce records from six other IRS employees involved in the targeting of conservative groups,’ Ways and Means Republicans said in a release.

* * *

Ways and Means does not say how the emails went missing or what time specific time periods are involved, though they say it includes the period at issue. In the case of Lerner, for example, her archived emails between 2009 and 2011 were washed away in a 2011 computer crash, the agency says.

* * *

The IRS says that at the time they did not keep records of or back up all emails. Rather, they relied on employees to archive them on their personal computers after they ran out of storage space in their Outlook inboxes. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Use Reflector App to Display Your iPhone or iPad on Your Computer.

07 Saturday Jun 2014

Posted by Celia C. Elwell, RP in Apple, Apps, Cell Phones, iPad, iPhones, Legal Technology, Mac, PC Computers

≈ Comments Off on Use Reflector App to Display Your iPhone or iPad on Your Computer.

Tags

Apps, iPad, iPhone, Legal Productivity Blog, Lisa Pansini, Reflector App

App of the Week: Reflector – Display Your iPhone or iPad on a Computer, by Lisa Pansini, Legal Productivity Blog.

http://tinyurl.com/loqy8ek

Please note the related posts at the end of this article by Ms. Pansini. –CCE

If you’ve ever tried to display your mobile device on a big screen without wires or an Apple TV, you know how complicated it can be. Enter, the Reflector app. Reflector is an AirPlay receiver that allows you to display your mobile device on a big screen without any hullabaloo. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

2014 Best of Legal Tech from Jim Calloway.

17 Saturday May 2014

Posted by Celia C. Elwell, RP in Android Phones, Apple, Apps, Cell Phones, Clouds, Computer Forensics, Dashboards, Emails, Encryption, iPad, iPhones, Law Office Management, Legal Technology, PC Computers, Tablets

≈ Comments Off on 2014 Best of Legal Tech from Jim Calloway.

Tags

Jim Calloway, Jim Calloway's Law Practice Tips Blog, Legal Technology, Solo and Small Firms, Weblog

The Best of Legal Tech for Solos and Small Firms 2014, by Jim Calloway, Jim Calloway’s Law Practice Tips Blog

http://tinyurl.com/mjqjp9a

This month’s Digital Edge podcast covers ‘The Best of Legal Tech for Solos and Small Firms 2014.’

John Simek is our guest, who is the business partner and spouse of my podcast teammate, Sharon Nelson. Together with Michael C. Maschke, they were the authors of The 2014 Solo and Small Firm Legal Technology Guide: Critical Decisions Made Simple, published by the American Bar Association. I was quite honored to be asked by them to write the forward for the book.

We discuss all sorts of technology for solo and small firm lawyers, including practice management software, workstations and cloud-based services. Enjoy the podcast.

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

PC World’s Answer Line — Solutions to Various Computer Problems.

11 Sunday May 2014

Posted by Celia C. Elwell, RP in Computer Virus, Legal Technology, Malware, Microsoft Office, PC Computers

≈ Comments Off on PC World’s Answer Line — Solutions to Various Computer Problems.

Tags

Answer Line Solutions, Gmail, Hard Drives, IP Address, Lincoln Spector, Malware, Microsoft Office, PC Computers, PC World, Wi-Fi

Answer Line Solutions, Tips and Answers for PC Problems from Lincoln Spector, PC World

http://www.pcworld.com/column/answer-line/

You may not want or have the skills to build or fix your PC computer. But no doubt there are a few things you would like to do for yourself, such as, recovering a deleted file? What about setting — and keeping — a preferred default font in Word or recovering files after a malware attack? Even if you are tech-challenged, this site answers all types of questions in a language anyone can understand. Browse a while. You may find something that interests you. -CCE

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

The Mashable Hit List.

13 Sunday Apr 2014

Posted by Celia C. Elwell, RP in Android Phones, Apps, Cell Phones, Clouds, Computer Virus, Disaster Preparedness, Dropbox, Emails, Encryption, Google, Heartbleed, Identity Theft, Law Firm Web Sites, Law Office Management, Legal Blogs, Legal Technology, Malware, Office Procedures, Passwords, PC Computers, Search Enginges, Technology, Using Social Media

≈ Comments Off on The Mashable Hit List.

Tags

Computer Bugs, Computer Fraud, Heartbleed, Identity Theft, Law Office Management, Password Managers, Passwords, Social media, The Mashable Team

The Heartbleed Hit List: The Passwords You Need to Change Right Now, The Mashable Team

http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/

If you wondered whether any main specific websites are affected, such as Yahoo, this list will help you.  It will also help explain the Heartbleed bug,  and why you should pay attention to what it is. If you want to know whether your specific bank was compromised, this list may not answer all your questions. So, if you’re not sure whether you should change your password, go ahead and do it.

Even better, find a password manager in this list of the best of the best from PC Magazine by Neil J. Rubenking — http://www.pcmag.com/article2/0,2817,2407168,00.asp. If you use one password for more than one website — and lots of people do — this is a good solution and a wise move regardless of the Heartbleed bug. -CCE

 

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...

Heads’ Up Window XP Users! The Last Weekend Is Here.

05 Saturday Apr 2014

Posted by Celia C. Elwell, RP in Legal Technology, PC Computers, Windows, Windows XP

≈ Comments Off on Heads’ Up Window XP Users! The Last Weekend Is Here.

Tags

Ian Paul, Microsoft, PC Computers, PC World, Security Updates, Windows XP

5 Key Things Windows XP Users Need To Know Before Buying A New PC, by Ian Paul, PC World

http://tinyurl.com/kbq3q6w

On Tuesday, April 8, Microsoft will bid adieu to Windows XP, delivering the final security updates for the twelve year-old OS. While many XP users out there plan on keeping their PC—with or without Microsoft’s support—many others are looking to at long last switch to a new computer.

Computer technology has changed a lot since the turn of the century, however. So as we head into XP’s final weekend, here are a few key things to keep in mind if you’re a displaced Windows XP lover on the lookout for a new PC. . . .

Share this:

  • Print
  • Tweet
  • Email
  • Share on Tumblr
  • Pocket
  • More
  • Telegram

Like this:

Like Loading...
Follow The Researching Paralegal on WordPress.com

Enter your email address to follow this blog and receive notifications of new posts by email.

Search

Sign In/Register

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Categories

Archives

  • March 2022
  • January 2022
  • November 2021
  • October 2021
  • January 2021
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • June 2020
  • May 2020
  • April 2020
  • January 2020
  • December 2019
  • October 2019
  • August 2019
  • July 2019
  • May 2019
  • March 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013

Recent Comments

Eric Voigt on Top 20 Paralegal Blogs, Websit…
profvoigt on Research Guides in Focus – Mun…
Make Your PDF Docume… on Make Your PDF Document Edit-Pr…
madlaw291282999 on Using Hyperbole -Are You Riski…
How to Treat Bad Cli… on Why Do Bad Clients Deserve The…

Recent Comments

Eric Voigt on Top 20 Paralegal Blogs, Websit…
profvoigt on Research Guides in Focus – Mun…
Make Your PDF Docume… on Make Your PDF Document Edit-Pr…
madlaw291282999 on Using Hyperbole -Are You Riski…
How to Treat Bad Cli… on Why Do Bad Clients Deserve The…
  • RSS - Posts
  • RSS - Comments

Blog at WordPress.com.

  • Follow Following
    • The Researching Paralegal
    • Join 456 other followers
    • Already have a WordPress.com account? Log in now.
    • The Researching Paralegal
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

You must be logged in to post a comment.

    %d bloggers like this: