Skip to content

Home Computing

The Hidden Risks of QR Codes

In today’s digital age, Quick Response (QR) codes have become a ubiquitous feature of modern life. From advertising campaigns to contactless payments, these pixelated squares offer a convenient way to access information with a simple scan. However, beneath their seemingly innocuous exterior lies a realm of cybersecurity risks that can compromise personal data, security, and…

[Read More]
Guide to Operating System Types

The Essential Guide to Operating System Types

Operating systems are the foundation of computing, managing hardware resources, and providing services to applications. Many types of OS exist for different needs. This comprehensive guide to the types of operating systems examines popular operating system categories and examples in detail. What is an Operating System? Think of an operating system (OS) like a manager…

[Read More]
How to know your operating system

How to Check Your Operating System Version: A Comprehensive Guide

Knowing the specific version of your operating system (OS) is crucial for a variety of reasons. The latest versions often come with new features, enhanced security, and improved performance, while older versions might lack support or security patches.  Identifying your OS version ensures that your device is compatible with the software you’re using, allows you…

[Read More]
Virus detected on a computer

Types of Computer Viruses

“Creeper,” the first computer virus, hit servers over 50 years ago. However, Creeper wasn’t used for nefarious purposes. It was a test to see if programmed code could self-replicate, and it is known as the first “worm” virus.  In the decades since, and especially since the dawn of the Internet, computer viruses have been used…

[Read More]
How to find your printer’s IP Address?

5 Quick Ways to Find a Printer’s IP Address in 2023

Just like each of the devices you use on a regular basis, your printer has a unique IP address. It isn’t difficult to find your printer’s IP address, but you do have to know where to look.  There are several ways to find your printer’s IP address. The best strategy to choose is the one…

[Read More]
Multiple ethernet cables connected to a switch

What Is Ethernet?

When it comes to dealing with Internet device connections and networks, most of us have at least heard of the technological terminology involved. USB cables, WiFi, routers, and ethernet connections are used by everyone — even when we don’t necessarily understand how they work.  When discerning what connections will work best for your needs, you…

[Read More]
An image displaying a close-up of a web input for a login and password

What SQL Injection Is & How It Works

SQL injection is a mechanism that cyber attackers use to interfere with application queries to a database. Specifically, SQL injection exploits a security vulnerability and gives hackers access to data that they shouldn’t have access to. How SQL Injection Works To understand SQL injection (SQLi), you have to first understand code injection and SQL. “Code…

[Read More]
A person holding a clamshell mobile phone.

What Is Wireless Application Protocol (WAP)?

Wireless Application Protocol (WAP) is a packet-switching protocol that was designed for micro-browsers. Most mobile wireless networks and mobile phones from 1999-2010 used WAP to access the Internet.  For years, WAP provided the framework so that wireless devices can communicate instantly between themselves and the Internet. Today, WAP is essentially obsolete, as modern mobile browsers…

[Read More]