I know this is a tech blog, and I’m a computer nerd who spends most of my waking hours behind a screen, but every once in a while, it’s healthy to give your eyes and brain a rest and breath some fresh air. One of my passions is traveling, and I’ve been fortunate enough to … Continue reading Travel Destinations for Escaping Technology and Recharging Your Inner Batteries
Chatrooms and Politics
No matter where political philosophies reside on the left-right spectrum, we can all agree that we live in energetically charged political times. The rise of right wing reactionary political factions in Europe and America, reenergized and emergent left-wing factions in Latin America, Canada and Europe, growing desperate Islamic dissatisfaction in the Middle East and Africa as … Continue reading Chatrooms and Politics
Best Apps for Weight Loss and Fitness
There's an old adage that says "Summer Beach Bodies start in February". Since it's the beginning of March, what better time to go start trimming the fat then now? I've started a strict diet and exercise regemin, and being the techie that I am, I've done some research recently on apps that would assist me … Continue reading Best Apps for Weight Loss and Fitness
Tech Tip: How to Create a Restore Point in Windows
Using backups to create restore points are a great method to unwind damage caused by a virus or hack. They also help restore accidentally deleted information. Here's how to create a backup restore point on your device: Creating a backup: 1.) Go to Control Panel > System and Maintenance > Backup and Restore 2.) Select Setup … Continue reading Tech Tip: How to Create a Restore Point in Windows
How to Reduce Instances of Spam
We all receive spam emails at one point or another. They are an obnoxious fact of owning an email address, and they don't always get picked up by a spam filter. If you are being inundated with spam emails, here's some tricks you can use to reduce and prevent future spam emails. 1.) Be careful … Continue reading How to Reduce Instances of Spam
Protecting Your Systems Against Social Engineering
No matter how technically secure we set our devices, systems and accounts to be, there is always a human component to any cyber security protocol. Hackers and bad actors recognize this, and often times resort to manipulating users who have access to these systems to provide the information necessary to enter through the front door. … Continue reading Protecting Your Systems Against Social Engineering
Creating a Bootable Disk on an USB to Install Operating Systems
Remember when you required a whole box of floppies to contain the Windows Installation files? Thankfully, those days are over. Our data storage and transportation technologies have vastly improved over the past decade or three, and now you can create a bootable disk on your single, pocket sized thumb drive. Here is a two-step … Continue reading Creating a Bootable Disk on an USB to Install Operating Systems
Tech Tip: How to Exclude a Domain from a Google Query Return
On any given day, there are over 3.5 billion search queries conducted through Google's search engine (or one query daily for every two people on earth). Sometimes, however, we might want to filter the results to give a better targeted return for the search we are conducting. Even though I've discussed boolean search logic in … Continue reading Tech Tip: How to Exclude a Domain from a Google Query Return
Tech Tip: How to Prevent Skype From Automatically Launching At Login
There are several programs who's developer's designed them to launch immediately once you log in. This can be quite frustrating and annoying when you do not intend to use those applications during your sessions, and when they take a lot of valuable resources while your machine is still powering on. One of the biggest culprits … Continue reading Tech Tip: How to Prevent Skype From Automatically Launching At Login
Benefits of Two-Factor Authentication
It's becoming more common place to see suggestions or requirements for two-factor authentication from various pieces of technology, apps and sites. Often displayed with the shorthand 2FA, Two-Factor Authentication is an increasingly popular security method that requires two points of authentication from the user in order to grant them access. There is an obvious explanation … Continue reading Benefits of Two-Factor Authentication