10 (Mostly) Free Ways To Stop Robocalls and Spam

Angry woman customer claiming on the phone

10 (Mostly) Free Ways to Stop Robocalls and Spam How To Protect Yourself In Email and On the Phone The scams, hacks, and breaches that cost the average person and business the most money come through two of the most commonly used forms of communication. The first, you can probably guess, is email. Spam and […]

10 Tips Seniors Need To Avoid Scams

seniors

10 Tips Seniors Need To Avoid Scams Protect Yourself Online and In Real Life You’ve seen it all. The rise and fall of global superpowers. A dozen presidents. Technology the likes of which would have gotten your grandparents burned at the stake. OK, well maybe not the last one but things have definitely changed over […]

10 Teen Tips for Cyber Safety

teen

10 Teen Tips for Cyber Safety Keeping Them Safe Online and IRL (In Real Life) You are special! The Under 18 crowd is one of the most targeted groups on the Internet. Teens and Tweens (8-12 year olds) are not just under constant bombardment from advertisers, but also hackers. We call them cyber criminals, threat […]

The Time of Your (IT) Life

time

The Time of Your (IT) Life Synchronizing Your Logs For Fun and Profit Time. The common enemy of all humans. It is unstoppable, uncontrollable, unforgiving, and unbelievably necessary to keep your IT systems functioning. No police box or DeLorean required. What time is it? Computer systems see time differently than we humans. Yes, they can […]

Make The Internet Fast Again

internet

Make The Internet Fast Again! OR…12 Tips To Speed Up Your Internet Why is the Internet so slow? We pay for 100 Megs, right? Why is my maximum download speed under 10? I just want to download one picture of the grandkids. Why does it take so long? Sound familiar? Several things can cause slow […]

Hacker Series – Playing Hard To Get

hacker

Hacker Series – Playing Hard To Get OR…5 Ways To Stop Hackers In Their Tracks I am a hacker. After scouring one million IP addresses in the United States, I compiled a list of plump targets ripe for exploitation. (If you missed part 1, click here). While I wait for the rest of my scans […]

How The Internet Works

how the Internet works

How The Internet Works OR…Oh, Oh, It’s Magic! Hard to believe that the Internet is nearly 30 years old. Sure, AOL, CompuServe, and Prodigy had dial-up available in major cities as early as 1989 to their own internal services, but most households didn’t use a Netscape browser across a modem line to reach the World […]

Guide To The Dark Web

hacker

Guide To The Dark Web OR…I Think I See Something The Dark Web is a section of the Internet “hidden” from the open Internet, the one we can search and access freely. These servers and networks are invitation-only and you must have the proper credentials to enter. Typically, it is a place where buying and […]

A One-Sided Cyberwar with Russia

A One-Sided Cyberwar with Russia OR That’s Not Yogi Nor Does He Want Your Pic-i-nic Baskets Am I the only one feeling early 80s vibes? What has possessed the superpowers of the world into this standoff? Beijing won’t stand by idly if things get hot, but not likely before the Olympics end on February 20th. […]

Wrangling and Securing IT Vendors

Cowboy Sunset

Wrangling and Securing IT Vendors OR Who Let the Intellectual Property Out? Who? Who? Who? Who? Who? No single vendor can provide every Information Technology need. I have worked with individual entrepreneurs and Fortune 50 companies, and none of them do it alone. Everyone needs outside vendors. The most basic needs require five vendors, and […]