Last week Apple surprisingly announced that it will facilitate “do it yourself” repairs for Mac computers and iPhones. Consumers and independent tech shops will soon be able to order genuine replacement parts and manuals.
Read more
Last time around, we wrote about cookies and how one should deal with them. Like many technology-related topics, it was a bit abstract. A reader, let’s call him Keone, wrote in with a specific example of how cookies have affected him. It’s an interesting tale to tell, and perhaps better illustrates how internet tracking mechanisms work.
Read more
Anyone who’s surfed the internet in the past 18 months or so should have noticed a new annoyance, usually presented as a small banner at the bottom of the screen, with a message similar to “This website uses cookies. By continuing to use this site you agree to our use of cookies.” It will have links to the site’s privacy policy and a button to click signaling your acceptance. What’s all this about and how should you respond?
Read more
As the pandemic wears on, so too do the associated supply chain issues. Technical goods are one of the most affected markets, and this is often felt most when purchasing computers. What used to be a straightforward process, taking just a few days from time of order to delivery, now takes weeks or even months. What can folks do to simplify such acquisitions?
Read more
With many of us still working from home for the foreseeable future, now might be a good time to adapt or upgrade your technology to improve the remote work experience. Chief among things to consider is your wireless network.
Read more
Some features available on the current release of Office 365 are not available on the Windows 7 version. This gap will only widen as time goes on.
Read more
The recent, highly publicized ransomware attack on Colonial Pipeline Co. was one of the latest in a string of attacks that have plagued businesses and government agencies. The Colonial incident was just the tip of the iceberg, concealing numerous other, less publicized events. Such attacks are ramping up at an ever-increasing rate. What can folks do to avoid such an attack?
Read more
Since the dawn of broadband internet, folks have always wondered, is my connection as fast as advertised? Is there any way to get an unbiased measurement? Obviously, the answer is yes. Otherwise, this would be an awfully short column. How, then, does one go about keeping the internet service provider honest?
Read more
A couple of weeks ago, it was discovered that data stolen from Facebook was available on the dark web. While the data was stolen in 2019, it can still be effectively used by bad actors today. Individuals and organizations should see this as a wake-up call to take care of their data themselves instead of assuming that everyone else will keep them safe.
Read more
Businesses and government organizations that don’t have a dedicated information technology staff typically engage an outside consultancy to support their computer operations.
Read more
Luckily, for the good netizens of the world, it’s easy to check whether you have been the victim of a past hack or data breach, and you don’t even have to delve into the dark web itself to check.
Read more
While MFA might seem like a pain, it is a necessity in today’s world. The extra steps required more than offset the security it provides.
Read more
So you have a computer problem, and you or your organization has just engaged a new IT engineer. Of course, you are skeptical as to their abilities. What are some telltale signs of whether the engineer is worth their weight in salt?
Read more
With so many folks working remotely nowadays, we are often questioned about the safety and security of Wi-Fi networks. Should one be worried when conducting sensitive business over Wi-Fi?
Read more
Since the advent of the personal computer, businesses and individuals alike have pondered the question, Do you want the extended warranty with that?
Read more
If you can’t beat ’em, join ’em. That seems to be the sentiment of Microsoft when it rather quietly introduced its new, open-source-based version of its Edge browser earlier this year.
Read more
Online learning from home, combined with parents who have to go to work, has created a quandary for many families. What if the kid needs help, either with their lessons or just plain old tech support?
Read more
Last time around, we talked about security and privacy concerns surrounding Zoom, the videoconferencing app du jour.
Read more
Zoom, the videoconferencing application, has experienced a meteoric rise in usage through the pandemic, as many folks work from home. It has come under fire, however, for privacy and security concerns. Do you need to be worried?
Read more
As more and more services move to the cloud, tracking one’s passwords becomes more difficult. Combined with the ever-increasing number of bad actors on the internet, intent on committing bad acts, use of a password management program is virtually a requirement.
Read more
As we run smack into the heart of another election season, one of the least desirable effects of social media raises its ugly head.
Read more