
Voice control and dictation
Voice technologies are becoming more powerful every day. Siri, Cortana and Google are common voice recognition services but if you need to take control of

Voice technologies are becoming more powerful every day. Siri, Cortana and Google are common voice recognition services but if you need to take control of

Ah the wonders of email. Now when it comes to receiving your emails from your server, you have two ways of doing that (excluding the

The Logitech K400+ is my go-to keyboard of choice when I’m repairing computers. If you have a laptop with a bad keyboard or the touch

Did you know that you can have beautiful and breathtaking views simply by opening a new tab in your browser? Tabliss for Google Chrome and

Let’s face it, reinstalling operating systems is a chore. You insert some sort of media, be that floppy disk; CD; DVD; or memory stick/flash drive

In my spare time I am reinstalling old laptops and desktop computers for Tubbs Computer Supplies so they can be given to low income families.

I have always used Trading Standards Buy With Confidence for my reviews and testimonials, however since they merged with Hampshire, I no longer get testimonials

If you are considering selling your Apple Mac or need to reinstall the operating system, perhaps when installing a replacement drive or SSD. Here is

In the past there was a program called True Crypt that used to do advanced encryption. Unfortunately, during an inspection by the company there were

I’ve just received an automated phone call to my voicemail that pertains to be from HMRC. HMRC If you have ever dealt with the HMRC,

Firefox has a cool feature that protects your privacy as you use the Internet. Some websites use invisible content to track the sites you visit

Back in 2007, Apple filed a patent for Magsafe, a magnetic charger connector for their Apple laptop range. At the time, if someone tripped on

Home security can be expensive, although you can buy dummy cameras and make it look like you have security at your property, the cameras look

Earlier, I posted on my blog about Two Factor Authentication (2FA) using a Hardware Key. A hardware key sends a complex code on your behalf

QR codes (Quick Response) are matrix barcodes that have been around since 1994. They were originally designed for the purpose of tracking vehicles during manufacturer.

We all do a lot of travelling, whether it is for leisure or for business, we need to know where we are and where we

Sometimes, you may want to record keyboard and mouse actions so you can replay them later. There will always be repetitive tasks that you have

So you’ve bought a new computer and want to access the data and programs on the old computer. Rather than keeping the old hardware that

A Virtual Machine (VM) allows a computer to run inside another computer. The technology isn’t new, it has been around since mainframe computers. In fact,

When you plug a microphone into your computer, you can run software that enables you to talk to your computer or through it to others