Following up on Predictions for 2018 in Tech

On New Years Eve, 2017, we wrote an article with predictions for the 2018 year in tech.  Now that the Halloween has passed and we are in the midst of the end of the year Holiday season, now's a good time as any to reflect on those predictions, and see what we got right, and … Continue reading Following up on Predictions for 2018 in Tech

The First Recorded Cyberattack

Twins Francois & Joseph Blanc were men ahead of their time. They are quite possible the first people to hack technology in order to commit insider trading, and they got away with it! We’re talking about two guys who hacked the top-of-the-line highest tech communication networks in the world at the time they hacked it: Napolean’s … Continue reading The First Recorded Cyberattack

Best Apps for Weight Loss and Fitness

There's an old adage that says "Summer Beach Bodies start in February". Since it's the beginning of March, what better time to go start trimming the fat then now? I've started a strict diet and exercise regemin, and being the techie that I am, I've done some research recently on apps that would assist me … Continue reading Best Apps for Weight Loss and Fitness

Tech Tip: How to Create a Restore Point in Windows

Using backups to create restore points are a great method to unwind damage caused by a virus or hack. They also help restore accidentally deleted information. Here's how to create a backup restore point on your device: Creating a backup: 1.) Go to Control Panel > System and Maintenance > Backup and Restore 2.) Select Setup … Continue reading Tech Tip: How to Create a Restore Point in Windows

How to Reduce Instances of Spam

We all receive spam emails at one point or another. They are an obnoxious fact of owning an email address, and they don't always get picked up by a spam filter. If you are being inundated with spam emails, here's some tricks you can use to reduce and prevent future spam emails. 1.) Be careful … Continue reading How to Reduce Instances of Spam

Protecting Your Systems Against Social Engineering

No matter how technically secure we set our devices, systems and accounts to be, there is always a human component to any cyber security protocol. Hackers and bad actors recognize this, and often times resort to manipulating users who have access to these systems to provide the information necessary to enter through the front door. … Continue reading Protecting Your Systems Against Social Engineering

Protecting Your Security on Social Media and Social Networks

One of the most vulnerable nodes in the average user's technological presence is on social media. With hundreds of millions of users on many different popular social media and networking platforms, these platforms prove fertile ground for spammers, scammers and cyber-criminals. Don't be a target, use these tips to protect yourself when interacting on social … Continue reading Protecting Your Security on Social Media and Social Networks

Shameless Plug (aka I’m Available for Hire!!!)

Howdy Folks! After an enjoyable stint with a great organization, I have found myself back on the job market. If anyone reading this blog feels that my services and expertise fit a need in your organization, feel free to contact me for my CV. My contact information can be found here. I look forward to … Continue reading Shameless Plug (aka I’m Available for Hire!!!)

Creating a Bootable Disk on an USB to Install Operating Systems

  Remember when you required a whole box of floppies to contain the Windows Installation files? Thankfully, those days are over. Our data storage and transportation technologies have vastly improved over the past decade or three, and now you can create a bootable disk on your single, pocket sized thumb drive. Here is a two-step … Continue reading Creating a Bootable Disk on an USB to Install Operating Systems

Tech Tip: How to Exclude a Domain from a Google Query Return

On any given day, there are over 3.5 billion search queries conducted through Google's search engine (or one query daily for every two people on earth).  Sometimes, however, we might want to filter the results to give a better targeted return for the search we are conducting. Even though I've discussed boolean search logic in … Continue reading Tech Tip: How to Exclude a Domain from a Google Query Return