A
Grace Hopper
“A Dangerous Phrase”
Read about the amazing Grace Hopper.
Read More
B
Fake FedEx
Beware of Emails You Expect
Do not open attachments or click on links, even if expecting the emails. Delete the email and go direct to the website.
Read More
C
Check Your Microsoft Account Privacy
Check Your Microsoft Account Privacy
Check your privacy, security and the data that Microsoft collects.
Read More
Should I Remove It?
Cleaning up your old (or new) computer
Sometimes you need to clean up software on a new or old PC. Use this free software to see what other people are uninstalling and if it makes sense for you to remove software about your computer that you have been unsure about.
Read More
E
LastPass
Essential Google Chrome Extensions
A collection of essential Chrome Extensions.
Read More
F
Forensics Field Tools
Forensics Field Tools
Tools for in-field forensics collections Multiple tools can be found
Read More
G
Google Inactive Account Manager
Google Inactive Account Manager
Add one or more trusted contacts to share data with if you don't access your account for the specified time.
Read More
Grace Hopper
Grace Hopper
I remember working with FORTRAN and COBOL at college, all those years ago.  The beauty, elegance and genius of those languages haunts me to this day when using other development languages. Thank you to Grace Hopper for giving us these languages.
Read More
Google Chrome Group Policy
Google Chrome Group Policy
Group Policy Dinosaur Easter egg game.
Read More
2017-03-10_15-53-02
GSuite Integration – A Plea To Google
Some really exciting things coming out of Google and I
Read More
H
"Hackers - The Immune system of the Internet"
“Hackers – The Immune system of the Internet”
The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve. Yes, some hackers are bad guys, but many are working to fight government corruption and advocate for our rights. By exposing vulnerabilities, they push the Internet to become stronger and healthier, wielding their power to create a better world.
Read More
Hyper-V APIPA Guest Issue
Hyper-V APIPA Guest Issue
A strange quirk of Windows Hyper-V bridges requiring the switch to be disabled and reenabled to get a valid IP in guest operating systems.
Read More
20141016_195150_Android
How to Recover An Apple Computer
Mac Mini bricked by Yosemite. How to recover from a Time Machine backup.
Read More
How Secure Is My Password?
How Secure Is My Password?
Choosing a high quality but memorable password.
Read More
I
2014-11-25_15-40-57
Is This a Phish ?
If you receive an email with a link in it that you are unsure about you can check to see if the email is a phish attempt.
Read More
L
LastPass Commits to "No Changes" Following Purchase by LogMeIn
LastPass Commits to “No Changes” Following Purchase by LogMeIn
LastPass Commits to “No Changes” Following Purchase by LogMeIn.
Read More
LinkedIn Breach (May 2016)
LinkedIn Breach (May 2016)
Read more about this notable but not unique event in LinkedIn's history.
Read More
LastPass
LastPass Hacked – The Facts Behind The Panic
2015 LastPass hack - What happened and what to do to continue to be secure with LastPass.
Read More
Keys
LastPass : The Ultimate Password Manager
LastPass is a password manager that allows you to have a unique password for every website on the Internet. You only need to remember a single master password to access them all.
Read More
M
My Amazon Recommendations
My Amazon Recommendations
Every item shown here is something that I have purchased and own.  Let me know in the comments if you have any questions in the comments section.
Read More
My Samsung Gear S3
My Samsung Gear S3
Looking for a solid, reliable, fast, well build, Android watch with multi-day battery life ? Then look no further than the Samsung Gear S3.
Read More
My New Antsle
My New Antsle
So a few days ago I received my Antsle one Pro
Read More
N
NASA Boarding Pass
NASA Boarding Pass
My NASA boarding pass.
Read More
O
101815_1451_Office365Fa1.png
Office 365 Fast Track Network Analysis
Microsoft provides a very useful network tool that analyzes VOIP
Read More
Opt Out of Magazines and Credit Offers
Opt Out of Magazines and Credit Offers
Opt out of receiving catalogs, magazines and other mail offers.
Read More
P
Podcasts
Podcasts
Podcasts I recommend.
Read More
S
Send To Kindle Problems
Send To Kindle Problems
Problems with SendToKindle ?
Read More
495
Spinrite, Drives and Hyper-V
A guide of how to use Spinrite with Microsoft Hyper-V. This example uses a USB drive.
Read More
2014-07-21_15-47-57
Supress Java Sponsor Offers
Disable the offer to installed sponsored products with Java.
Read More
T
Twitter Location
Twitter Location Privacy
Protect your location privacy when using Twitter.
Read More
V
Visit Noximaze for custom eDiscovery and IT Pro software
W
Weak Passwords
Weak Passwords
This page is dedicated to all those companies that have weak password policies. Enforcing an upper limit of anything under 20 makes no security sense when storing a salted, hash of a password should be the norm, not forcing an upper limit of length.
Read More
Windows 8.x Tablet Running Hot
Windows 8.x Tablet Running Hot
Windows 8.x Tablet Running Hot. Troubleshooting TiWorker.exe running at 40% CPU.
Read More
2014-10-01_19-15-28
Windows 10 Technical Preview
Pictures from the Windows 10 Technical Preview on a Hyper-V
Read More