October is National Cyber Security Awareness Month (NCSAM)

This is a sponsored post written on behalf of KnowBe4. The opinions expressed in this article are 100% my own.

October is National Cyber Security Awareness Month (NCSAM), and is an excellent time to educate your friends, family, and coworkers about cyber security and …continue reading

Does CAPTCHA Really Work?

Tenken89, a member of the LockerGnome community, asks:

Are CAPTCHA codes effective bot deterrents, or are they just annoying?

Do you find yourself annoyed by the scrambled numbers and letters you have to decode in order to gain access to a site? …continue reading

How to Secure Your Wi-Fi Network

Bboyhurricane, a member of the LockerGnome community asked: “How do you tell if someone is using your Wi-Fi?

With the proliferation of Wi-Fi as a primary access method for home networks, the inherent risk of someone gaining access to your network unknowingly increases …continue reading

Train Users to Recognize Phishing Scams

This is a sponsored post written on behalf of KnowBe4; the opinions represented are 100% my own.

Keeping your corporate network secure is challenging, especially if your business requires that your staff has access to an open Web. Powerful communication tools such …continue reading

What is Ping?

Ping is a term that’s thrown around all over the place. That being said, the root of what a ping actually is remains the same throughout most of them. In basic terms, it is a utility used to test the reliability of a connection between …continue reading

Wireless Security Made More Simple

At the infamous Def Con conference earlier this month, a hacker successfully implemented an MITM (man-in-the-middle) attack on a number of attendees’ cell phones in what might be the first recorded case of a 4G cellular network breach. The next week, researchers from Massachusetts Institute …continue reading

How to Protect Your Password

So many different sites and services online require you to have a login and password in order to take advantage of what they have to offer. More than that, they often have a specific set of requirements for that password that include specific lengths, …continue reading

What is a Supercookie?

The term cookies has been used in the tech world for years to describe little bits of code intended to keep settings and login information consistent each time you visit a server you frequent. In some cases, cookies are used to track your activity and …continue reading

How to Avoid Computer Viruses Without Anti-Virus Software

Good anti-virus software is a great way to safeguard against malicious software that would otherwise cause havoc on your system, your data, and your personal life. Unfortunately, finding a good solution that protects against almost all kinds of attacks without weighing down your system and …continue reading

How to Handle the Security of Your Computer Being Compromised

Whether you have that sinking feeling that comes after a few failed attempts at logging in to a site that you use daily, or an email from a service you use indicating that it feels your account has been compromised, there’s nothing that hits you …continue reading

Five Creative Ways to Name Your Home Network Devices

Do you have a unique naming scheme for your network devices? Do their names hold a literal meaning, or were they picked just to be silly?

In large networks, administrators tend to assign specific names to various network equipment in order to identify exactly where …continue reading

Five Things to Avoid in an Internet Service Provider (ISP)

So, the time has come to seek out an alternative to your current Internet service provider (ISP)? Chances are, you’re considering leaving it because you’re moving and it doesn’t cover your new area or it just isn’t providing you with the best service for the …continue reading

How to Play Pac-Man from Your Browser

Pac-Man is one of the longest-standing and most popular games in the history of video gaming. First released in 1980, Pac-Man features a very simple 2D interface where you control a giant yellow head that gobbles up little points of light called Pac-Dots while avoiding …continue reading

How to Find a Gravestone or Cemetery

Researching family history often includes a look at records of deceased ancestors. Unfortunately, these records (especially older ones) rarely show where someone was buried. Paying your respects to a deceased relative shouldn’t have to include an exhaustive series of phone calls to find a specific …continue reading

Do Online Backups Count Toward Your Bandwidth Cap?

More and more Internet service providers (ISPs) are imposing usage caps on their customers in order to limit the amount of traffic sent through their networks at any given time. For the most part, this limit is artificial and doesn’t result from any actual congestion …continue reading

How to Transfer LastPass to 1Password

It’s always a good idea to use unique, strong passwords for all of your online accounts. Managing dozens of logins with passwords that are hard to remember can be difficult, but there are several applications that can securely store these passwords and other login information …continue reading

Comcast Internet Problems

So, yeah — I’ve been a Comcast subscriber for a few years now. For the most part, I can’t complain about the service. It’s had its ups and downs (but what hasn’t?).

Seattle area Comcast representatives have been extremely friendly with their outreach, their approach …continue reading

Why Don’t Macs Get Viruses?

You’ve probably found this article because you’re either interested in tech, or you’re tired of your bulky anti-virus program hogging up your valuable resources on Windows and you’re considering a “virus-free” Mac. You may have been bitten by a nasty trojan or destructive virus in …continue reading

Skype Vulnerability Surfaces

Are you a frequent Skype user? Levent Kayan, a Berlin-based security consultant, discovered a critical flaw with Skype that allows malicious scripting to be used in the program which has the potential to allow attackers the ability to take over other user’s accounts. The flaw …continue reading

How to Turn On and Off Unified Folders in Thunderbird

If you’ve ever been dissatisfied with your operating system’s preinstalled or most popular email application, you’ve probably looked for other options. There are several good ones to choose from, but the most popular universal stand-alone mail application is Thunderbird created by the same people who …continue reading

How to Get Free Identity Protection Services Being Offered to PSN Users

Sony is extending an offer of free identity protection through AllClear ID PLUS for a year to users of its PlayStation Network. This protection comes in the wake of a massive breach of its customer databases resulting in millions of its account …continue reading

How to Block Spam in Google Voice

Spam in your Gmail inbox is annoying, but worse is getting a telemarketer phone call just as you’re about to sit down to dinner. If you use Google Voice, you can now mark these intrusive phone calls as spam and enjoy your dinner in peace. …continue reading

How to Use LastPass to Create a Secure Password

There’s nothing like starting a Saturday morning with a panic attack. After dragging myself out of bed, I logged into Gmail to receive a glaring red alert that my account had recently been accessed by a computer program or app hosted by AWS in California. While …continue reading

How to Stop Animated GIFs in Google Chrome

Google+, unless it stops supporting animated GIFs before its official launch, may bring about a sort of second coming for animated GIFs on the Web. Unfortunately, not everyone cares to see these short animated images pop up on their screen every time someone shares a …continue reading

How to Open an Incognito Window in Google Chrome

Imagine this: you’re over at a friend’s house and suddenly realize you need to check your bank account, or one of your several social networking profiles to find out where you’re meeting up later for drinks. You notice your friend uses Google Chrome, and you’re …continue reading

How to Convert Text to Lowercase in Safari

There is never a good reason to type in all caps. Unfortunately, some people seem to have caps lock stuck on at all times, AND TYPE LIKE THIS, or they are still stuck in 1996 and intercap every other letter LiKe tHiS. (Which is annoying, …continue reading

Chrome OS Vs. Chromium OS

Chromebooks have started rolling out and the question being asked across the Web is whether or not they are worth the hundreds of dollars required to pick one up. While the hardware alone should be considered to be the bulk of the value, it’s …continue reading

How to Stop Google from Saving Your Search and Web History

Did you know that everything you search and every site you visit is saved by Google? This is one of the tools Google uses to target ads to you as you’re browsing the web. By finding out what you’re interested in, they are able to …continue reading

How to Add Your iTunes Library to Google Music Beta

If you’re an iTunes user, you might be under the impression that you have to use Apple’s iCloud in order to take your collection to the cloud. On the contrary, you can actually enjoy the music you love through Google Music (currently in beta) using …continue reading

What is the Best Way to Back Up Your Hard Drive?

Losing your data sucks, and not having a backup can result in a catastrophe that could result in loss of work, personal documents, media files, and even your digital photo collection. No matter what you keep on your drive, it is always a good idea …continue reading