Skip to content

Home Computing

The Importance of Running Windows Updates Often and Regularly

What you need to know and do about Windows updates In May 2017 one of the largest ransomware attacks of all time struck more than 100 countries, thousands of businesses and affected millions of computers. When users tried to open a file on their computers, they got a scary screen message announcing that they’d been…

[Read More]

Wireless Hacking (Part 2)

Part two of a three-part story. This is the second installment of our series about how easy it is for you to get hacked when using the free Internet at a coffee shop or airport. In Part One, we saw how a hacker (Mr. H.) was able to see the Internet activity of others at…

[Read More]

What is a Web Browser and How Does It Work?

Let’s play word association, just like when a psychologist asks you what comes to mind when you hear certain words: What do you think when you hear the words “Opera. Safari. Chrome. Firefox.” If you think of the Broadway play version of “The Lion King,” maybe it is time to see a psychologist. However, if…

[Read More]
Some Website Privacy Policies Are Better at Protecting You from the Government

Some Website Privacy Policies Protect Well You from the Government

Internet privacy is a hot topic. Today, people are wondering if government agencies are capturing their online information and reading their emails. With what’s come out in the news the past year, that concern is understandable. More importantly, people want to know — if the government asks the leading websites for peoples’ private data, do…

[Read More]
Tor Is Almost a Secret Way to Be Invisible Online

Why You Should Start Using the Tor Browser for Privacy

The anonymous Internet is not as scary as you think. What is being “anonymous” online? It doesn’t mean that you don’t have an identity online. For the everyday computer user, it simply means a few things: That you can go online to any website and you won’t be blocked because of your IP address. That…

[Read More]

What is a Web Bug/Beacon? Your Ultimate Guide

A Web beacon is a hidden, transparent, but nonetheless “graphic” image that finds its way onto your computer. They’re small “objects” that are embedded into a webpage or an email and are “activated” when you visit the site or open the email. Web beacons are placed on a website or in an email and they…

[Read More]

Smartphone Security: Tips & Best Practices

How to prevent your smartphone from being hacked What are the signs that your phone has been hacked? Today’s smartphones can do MORE than computers did 30 years ago, and can do more than some of today’s laptops, at least in terms of versatility. That’s great news for those of us who have active online…

[Read More]

7 Ways to Protect Your Computer from Malware Attacks

Has your computer been moving slower than normal? There may be a reason—malicious software. When the performance of our hardware begins to behave unusually, our default reaction is to think that it’s a virus. Though a virus is always a possibility, more often than not the issue is a specific type of infection known as…

[Read More]
5 Browser Extensions to Protect Your Privacy

5 Must-Have Browser Extensions for Privacy Protection

Your browser is your gateway to the World Wide Web but it’s also how hackers, drive-by downloaders, and other malicious actors can get into your computer. Installing security-focused browser extensions that block pop-up advertisements and completely encrypt website traffic from being monitored or tracked will definitely increase your privacy—and may even speed up your browser.…

[Read More]
5 Things to do BEFORE your laptop is stolen

How to Protect Your Laptop from Being Stolen

How to Prevent a Stolen Laptop (or Stolen Phone) and the Data on It While many criminals today are finding ways to steal information from the comfort of their home by using malware, there still exists the thief who seeks the thrill of the touch—the touch of your phone or laptop, that is. The sad…

[Read More]
How to Boost Your Privacy Settings on Facebook, Twitter, Google and More

How to Change Your Privacy Settings on Social Media Platforms

Did you know there are a handful of steps you can take today that can help you protect your browser and your personal information? Many of the things you can do involve changing the privacy menu settings/options on the Internet browsers you use or your favorite social media websites. Those options have been there all…

[Read More]
10 Laptop Maintenance Tips for Maximum Performance

Laptop Tips that Will Keep Your Mobile Office Running Smoothly.

Whether your portable computer is new or a few years old, following a few tried and true laptop-tips can help it last for years. Having a laptop is more convenient for most active people than being tied to a desk with an unportable computer. Students, novelists, salespeople and entrepreneurs rely on their laptops to do…

[Read More]
LoJack for Laptops

Laptop LoJack: Recovering Stolen Devices and Protecting Data

Much like the famous LoJack for cars, LoJack for Laptops does nothing until needed; that is, when you report your laptop’s theft the company’s recovery experts start the recovery process. Over 100 devices are lost or stolen every minute and more than 12,000 laptops disappear weekly from U.S. airports alone. According to the Computer Security…

[Read More]
Kodi, teamed with a VPN, is the best way to use the home theatre software

What is Kodi and Which VPNs Support It? The Definitive Guide

Kodi is free, open-source, home theater software that turns any computer, smartphone or tablet into a digital set-top box or streamer. Kodi acts as a playable media library that not only stores and plays media files, but also intuitively organizes information on its own. That is, when you add movies you own, Kodi will download…

[Read More]
WAN IP Address. LAN IP Address. What

Difference LAN & WAN: Explaining Network Types

What do you mean I have two IP addresses? One day, as you’re poking around your computer’s networking preferences or maybe hooking up a new router, you might suddenly become aware of an interesting bit of information. There are two different IP addresses involved with you’re getting online and connected to the world. There’s the…

[Read More]
VPN Kill Switch

What Is a VPN Kill Switch and How Does It Protect Your Privacy?

A Virtual Private Network (VPN) is essential for anyone who wants more security on the Internet because it addresses the top three online concerns: security, privacy, and anonymity. Along those lines, a VPN kill switch is a feature you want on your Virtual Private Network. It helps ensure your IP address isn’t accidentally and unexpectedly…

[Read More]

Hey, Mom and Dad! I Need a Gaming Computer, and Here’s Why

Hey, Mom—you know how Uncle Steve gave me his old desktop to use when I started high school? Well, it works for school stuff just fine, but there’s a bit of a problem, at least in my eyes. That’s because the computer just doesn’t let me do other things I really want to do. You…

[Read More]

Why You Need a Gaming Mouse for Improved Experience and Performance

From the beginning, computers had games you could play. Today, PC-based games have become more sophisticated because of the technological advances in computer chips, animation software, and computer hardware. Even though you can play many of today’s games on today’s new computers, to play the more sophisticated games, and to get more out of your…

[Read More]

What Kind of Internet Connection Is DSL?

DSL stands for Digital Subscriber Line, and it’s one of the many technologies used to bring an Internet connection and information into homes and businesses. What makes DSL unique is that it uses existing telephone lines/connections, with special adaptations. DSL started to become popular in the 1980s and 1990s. In the early days of the…

[Read More]

Everything You Need to Know About Dongles and Their Benefits

Hard drive. Memory stick. Keyboard. Monitor. Those are all pretty straightforward and well-known computer terms. And then there’s the dongle. Yes, dongle. It must be the strangest name since the “scuzzy” port/connector from days past, which derived from “SCSI” (Small Computer System Interface). The word dongle has been around for a long time, but its…

[Read More]

5 Reasons You Need an Online Backup Service

Over a decade ago, someone estimated that there were 70 million computer crashes every day around the world. 70 million! And that doesn’t even factor in other dangers to your devices, like theft, ransomware, or getting dropped on a hard surface or into water. If something like this happened to your phone or computer, how…

[Read More]
Malware is Everywhere. Keep it Off YOUR Computer

Viruses vs. Malware: Understanding the Difference

What you should know about viruses, malware, IP impersonators, and more. Have you ever had a computer suddenly go bad on you? Maybe the programs just froze all the time, or maybe you could no longer go on the Internet without a lot of strange things happening? You may have thought it turned to the…

[Read More]

Your Definitive Guide to Using Proxy Servers (Proxies)

Please be aware that the use of proxy servers without the express permission from the owner of the proxy server may be illegal in some states and/or countries. Use them at your own risk. Use your favorite search engine and search for ‘proxy server list’. You’ll find many sites with lists of proxy servers, their…

[Read More]

What is User Agent: Understanding Web Browsers

Sometimes technical terms are both misleading and confusing. Here’s an example: user-agent. It sounds as if it could be someone who represents your rights as a computer user. But it’s not. Or maybe it’s what you call a spy for a software company that tracks your online behavior. But that’s not correct either. The fact…

[Read More]

Everything You Need to Know About USB-C Technology

The way you plug things into new computers is changing. An article about the history of computer cables might seem uninteresting, even unimportant. And maybe even boring. However, this article about cables we use every day is somewhat important. (If it isn’t today, it will definitely be someday—and maybe for you, sooner than you think.)…

[Read More]