Archive Tips

Archived tips provide helpful pointers for grassroots organizers on using technology. These tips were written many years ago and may be outdated. All PowerBase releated tips can be found on the PowerBase Tips Page.

Thinking about training and documentation and security made me think about planning for disaster. The following document is a good worksheet to get you thinking about not only recovery from a disaster--big or small--but also general IT training and documentation needs.

Mailshell, a company that makes a proprietary anti-spam product is giving away free licenses of it's desktop anti-spam product on December 14th and 15th.

It's not necessarily any better or worse than the open source products we talked about at the COaTI a few days ago, but if you're interested in the software and want to check it out, this is a great way to do it.

For more info, go to

¿Como tener seguridad del mail sin que nadien de afuera pueda chequear mi e-mail?

¿How to have secure email, that no one else access?

Hi all,

Hope that everyone had a wonderful holiday and wishing you the best in 2005.

Here's my problem: I am trying to allow remote access so that our bookkeeper can log into my Windows XP Pro computer when she needs to work on our company file (the file is currently too large to continue emailing back and forth). I have set her up as a user and have enabled Remote Access. She cannot log on. I'm thinking that the problem lies with the router and some type of firewall that is enabled. With that said, I thought if I set a fixed IP address on my PC it would help. It hasn't. The question is what do I do next?

What are the steps you want to take next to understand or improve privacy and security in your organization?