Travel Destinations for Escaping Technology and Recharging Your Inner Batteries

I know this is a tech blog, and I’m a computer nerd who spends most of my waking hours behind a screen, but every once in a while, it’s healthy to give your eyes and brain a rest and breath some fresh air. One of my passions is traveling, and I’ve been fortunate enough to … Continue reading Travel Destinations for Escaping Technology and Recharging Your Inner Batteries

Chatrooms and Politics

No matter where political philosophies reside on the left-right spectrum, we can all agree that we live in energetically charged political times. The rise of right wing reactionary political factions in Europe and America, reenergized and emergent left-wing factions in Latin America, Canada and Europe, growing desperate Islamic dissatisfaction in the Middle East and Africa as … Continue reading Chatrooms and Politics

Best Apps for Weight Loss and Fitness

There's an old adage that says "Summer Beach Bodies start in February". Since it's the beginning of March, what better time to go start trimming the fat then now? I've started a strict diet and exercise regemin, and being the techie that I am, I've done some research recently on apps that would assist me … Continue reading Best Apps for Weight Loss and Fitness

Tech Tip: How to Create a Restore Point in Windows

Using backups to create restore points are a great method to unwind damage caused by a virus or hack. They also help restore accidentally deleted information. Here's how to create a backup restore point on your device: Creating a backup: 1.) Go to Control Panel > System and Maintenance > Backup and Restore 2.) Select Setup … Continue reading Tech Tip: How to Create a Restore Point in Windows

How to Reduce Instances of Spam

We all receive spam emails at one point or another. They are an obnoxious fact of owning an email address, and they don't always get picked up by a spam filter. If you are being inundated with spam emails, here's some tricks you can use to reduce and prevent future spam emails. 1.) Be careful … Continue reading How to Reduce Instances of Spam

Protecting Your Systems Against Social Engineering

No matter how technically secure we set our devices, systems and accounts to be, there is always a human component to any cyber security protocol. Hackers and bad actors recognize this, and often times resort to manipulating users who have access to these systems to provide the information necessary to enter through the front door. … Continue reading Protecting Your Systems Against Social Engineering

Creating a Bootable Disk on an USB to Install Operating Systems

  Remember when you required a whole box of floppies to contain the Windows Installation files? Thankfully, those days are over. Our data storage and transportation technologies have vastly improved over the past decade or three, and now you can create a bootable disk on your single, pocket sized thumb drive. Here is a two-step … Continue reading Creating a Bootable Disk on an USB to Install Operating Systems

Tech Tip: How to Exclude a Domain from a Google Query Return

On any given day, there are over 3.5 billion search queries conducted through Google's search engine (or one query daily for every two people on earth).  Sometimes, however, we might want to filter the results to give a better targeted return for the search we are conducting. Even though I've discussed boolean search logic in … Continue reading Tech Tip: How to Exclude a Domain from a Google Query Return

Tech Tip: How to Prevent Skype From Automatically Launching At Login

There are several programs who's developer's designed them to launch immediately once you log in. This can be quite frustrating and annoying when you do not intend to use those applications during your sessions, and when they take a lot of valuable resources while your machine is still powering on. One of the biggest culprits … Continue reading Tech Tip: How to Prevent Skype From Automatically Launching At Login

Benefits of Two-Factor Authentication

It's becoming more common place to see suggestions or requirements for two-factor authentication from various pieces of technology, apps and sites. Often displayed with the shorthand 2FA, Two-Factor Authentication is an increasingly popular security method that requires two points of authentication from the user in order to grant them access. There is an obvious explanation … Continue reading Benefits of Two-Factor Authentication