Protecting Your Security on Social Media and Social Networks

One of the most vulnerable nodes in the average user's technological presence is on social media. With hundreds of millions of users on many different popular social media and networking platforms, these platforms prove fertile ground for spammers, scammers and cyber-criminals. Don't be a target, use these tips to protect yourself when interacting on social … Continue reading Protecting Your Security on Social Media and Social Networks

Creating a Bootable Disk on an USB to Install Operating Systems

  Remember when you required a whole box of floppies to contain the Windows Installation files? Thankfully, those days are over. Our data storage and transportation technologies have vastly improved over the past decade or three, and now you can create a bootable disk on your single, pocket sized thumb drive. Here is a two-step … Continue reading Creating a Bootable Disk on an USB to Install Operating Systems

Tech Tip: Fixing the Telugu Character Bug on iOS 11

While Apple's iPhone is the symbol of our current generations technological achievements, the iOS 11 operating system has probably been the buggiest OS of our generation. While Apple has been pretty responsive to the bugs that have been popping up in iOS 11, with their Patch Tuesday updates, each patch seems to be creating as … Continue reading Tech Tip: Fixing the Telugu Character Bug on iOS 11

Tech Tip: How to Prevent Skype From Automatically Launching At Login

There are several programs who's developer's designed them to launch immediately once you log in. This can be quite frustrating and annoying when you do not intend to use those applications during your sessions, and when they take a lot of valuable resources while your machine is still powering on. One of the biggest culprits … Continue reading Tech Tip: How to Prevent Skype From Automatically Launching At Login

Benefits of Two-Factor Authentication

It's becoming more common place to see suggestions or requirements for two-factor authentication from various pieces of technology, apps and sites. Often displayed with the shorthand 2FA, Two-Factor Authentication is an increasingly popular security method that requires two points of authentication from the user in order to grant them access. There is an obvious explanation … Continue reading Benefits of Two-Factor Authentication

Best Video Games of All Time

Video Gaming goes hand in hand with technology. Many graphical and processiong power advancements the gaming industry develops become more mainstream in the rest of the tech world as technology is diffused across industries. Most avid gamers have their favorite games that they have played. The list below contains my favorite console games that I've … Continue reading Best Video Games of All Time

What Not to Post On Social Media

Many of the tips this blog provides are active measures to protect yourself from cyber security threats. However, sometimes less is more. You can be super secure with your security setup, then blow it all away by oversharing on social media. Here's a list of items you should avoid posting on social media sites like … Continue reading What Not to Post On Social Media

Tech Tip: Hidden Secrets of the iPad

  Apple is one of the most recognizable global brands in today's tech market, and one of their signature products is the iPad. There are several cool little tricks you can do with your iPad. Interested? Read on: 1.) Four Finger Swipes If you are running multiple apps at once, and need to quickly switch … Continue reading Tech Tip: Hidden Secrets of the iPad

Best Free Antivirus Security Suites

In previous posts, I've repeatedly driven the point that having up-to-date antivirus protection on your machine is a must. Some of you might not want to shell out $70-120 for antivirus services. While the paid services are generally much higher end and better quality than free antivirus programs, even free antivirus is better than no … Continue reading Best Free Antivirus Security Suites

Tech Tip: Using a VPN to Secure Your Internet Usage

Online privacy is of serious concern to many users of the internet. In today's age, the public should be wary of hackers, spy agencies and governments trying to tap into users online activities in order to monitor their sessions or steal their information. With the increased focus on information security and narrative control by many … Continue reading Tech Tip: Using a VPN to Secure Your Internet Usage