Free encryption
In the past there was a program called True Crypt that used to do advanced encryption. Unfortunately, during an inspection by the company there were
In the past there was a program called True Crypt that used to do advanced encryption. Unfortunately, during an inspection by the company there were
I’ve just received an automated phone call to my voicemail that pertains to be from HMRC. HMRC If you have ever dealt with the HMRC,
Firefox has a cool feature that protects your privacy as you use the Internet. Some websites use invisible content to track the sites you visit
Back in 2007, Apple filed a patent for Magsafe, a magnetic charger connector for their Apple laptop range. At the time, if someone tripped on
Home security can be expensive, although you can buy dummy cameras and make it look like you have security at your property, the cameras look
Earlier, I posted on my blog about Two Factor Authentication (2FA) using a Hardware Key. A hardware key sends a complex code on your behalf
QR codes (Quick Response) are matrix barcodes that have been around since 1994. They were originally designed for the purpose of tracking vehicles during manufacturer.
We all do a lot of travelling, whether it is for leisure or for business, we need to know where we are and where we
Sometimes, you may want to record keyboard and mouse actions so you can replay them later. There will always be repetitive tasks that you have
So you’ve bought a new computer and want to access the data and programs on the old computer. Rather than keeping the old hardware that
A Virtual Machine (VM) allows a computer to run inside another computer. The technology isn’t new, it has been around since mainframe computers. In fact,
When you plug a microphone into your computer, you can run software that enables you to talk to your computer or through it to others
The world of tech evolves quickly, and seems to be accelerating. I’ve not touched on tablets nor smart phones in this blog post, as this
China has a reputation for selling fake products for people to sell through stores like Amazon, eBay and Wish.com It is well known that the
What are Less Secure Apps? Less Secure Apps (LSA) are apps that don’t use OAuth (Open Authentication) to a code instead of a username and
I’ve been using the Internet for a long time (I started in 1994 with an account with Demon Internet) and have used web browsers pretty
If you need to run another operating system alongside Windows 10 Professional, you need to install the optional Hyper-V manager to your Windows 10 installation.
If you used to use Microsoft Publisher or Access on your computer and you switched to a Mac, or you switched to a computer with
All in One PCs have been around for some time, all you need is a keyboard and mouse. Some have a touch screen as well,
Whenever you have problems on Windows, you need to perform some basic checks Physical checks First check the network cables, if you are using wired