Tech Tip: How to Exclude a Domain from a Google Query Return

On any given day, there are over 3.5 billion search queries conducted through Google's search engine (or one query daily for every two people on earth).  Sometimes, however, we might want to filter the results to give a better targeted return for the search we are conducting. Even though I've discussed boolean search logic in … Continue reading Tech Tip: How to Exclude a Domain from a Google Query Return

Tech Tip: How to Prevent Skype From Automatically Launching At Login

There are several programs who's developer's designed them to launch immediately once you log in. This can be quite frustrating and annoying when you do not intend to use those applications during your sessions, and when they take a lot of valuable resources while your machine is still powering on. One of the biggest culprits … Continue reading Tech Tip: How to Prevent Skype From Automatically Launching At Login

Benefits of Two-Factor Authentication

It's becoming more common place to see suggestions or requirements for two-factor authentication from various pieces of technology, apps and sites. Often displayed with the shorthand 2FA, Two-Factor Authentication is an increasingly popular security method that requires two points of authentication from the user in order to grant them access. There is an obvious explanation … Continue reading Benefits of Two-Factor Authentication

What Not to Post On Social Media

Many of the tips this blog provides are active measures to protect yourself from cyber security threats. However, sometimes less is more. You can be super secure with your security setup, then blow it all away by oversharing on social media. Here's a list of items you should avoid posting on social media sites like … Continue reading What Not to Post On Social Media

How to deal with Internet Trolls

The internet is a strange and fascinating place. It's full of interesting works of art, entertainment sites, political action groups, cat videos and plenty of pornography, amongst many other things. It's a virtual space where people congregate and share ideas. However, it's also a largely anonymous place. This anonymity has encouraged the rise of the … Continue reading How to deal with Internet Trolls

Tech Tip: Traveling Securely

Part 1: Cyber Security Millions of people travel through airports and airlines for business or personal reasons every day, and most of them will carry a laptop, smart phone or some other device during their travels. When you and your devices are in motion, particularly while going across international borders, you and your devices are … Continue reading Tech Tip: Traveling Securely

Nostalgic Retrospective of the 1990’s

I grew up in the 1990s and consider myself a child of that decade. It was a crazy time to be a kid, what with the catchy advertising campaigns, questionable food choices, forgettable fads, and total disregard for fashion. So here is a nostalgia-infused list of the most groundbreaking trends in tech in the 90's, for … Continue reading Nostalgic Retrospective of the 1990’s

State of the Union, Satirical Edition

Every year, except for the first year of a new president's term, the President of the United States makes an address to a joint session of congress reporting on the status of America's economy and detailing his or her's administrations policy goals for the upcoming year. This address is called the State of the Union. … Continue reading State of the Union, Satirical Edition

Tech Tip: Using a VPN to Secure Your Internet Usage

Online privacy is of serious concern to many users of the internet. In today's age, the public should be wary of hackers, spy agencies and governments trying to tap into users online activities in order to monitor their sessions or steal their information. With the increased focus on information security and narrative control by many … Continue reading Tech Tip: Using a VPN to Secure Your Internet Usage

The Gap Between Technology and the Law

It is illegal for a potential employer to ask you about your religion, race, ethnicity or national origin while conducting a job interview. Discriminating against your application based on the results of those queries would be an absolute violation of your rights. However, there is nothing stopping a potential employer from looking you up on … Continue reading The Gap Between Technology and the Law