Spoof emails can be convincing if they contain the right information. Further, how do you know whether you have actually been hacked? Here are some tips.
I find people’s reaction to various technological tools somewhat baffling. If your child is about to use a hammer, you’ll likely give her some pointers. There’s a learning curve. If it’s a power tool, the instruction may be more careful. When the tool is technological, we tend to fear it and decline to spend the time actually learning to use it.
Computers users have gotten used to using user names, passwords, and pins to secure their data. They may not be thinking of it in terms like “securing my data,” but they don’t want snoopy people in their phones, tablets, or computers. Unfortunately, many people have passwords or pins that may be easily guessed.
From opensource.com, 4 opensource alternatives to Microsoft Access. Some may be easier to use as well.
Very soon now, WordPress will have a new editor, called Gutenberg. It has been in production for some time. I want to update my IT clients and authors about this change. There are many lengthy reviews of Gutenberg, and many … Read More
Note to self: Always remember that your Adobe Creative Suite apps work together. Don’t do it all in Photoshop when you like InDesign better for layout and can then edit graphics with Photoshop in the layout. Or overlays for video … Read More
If you’re having problems loading some secure sites using Firefox (for me it’s gmail.com, which is secure!), you might need to check the notes on this page.
Wordfence Lists Top Security Analysis Tools, and it is generally worthwhile to read their material.
We’re transferring our retail operations at Energion Publications (which includes Neufeld Computer Services) to the Aer.io platform. As part of this process, I wanted to import these products into a WooCommerce store as affiliate links. An Aside Why do I … Read More
“I really don’t pay much attention to security,” the potential client told me. “I don’t have anything on my computer that anyone would want to steal.” There was a time when that would have been an almost valid idea. If … Read More