Here’s everything you need to know about forwarded emails and spam email — both of which are used to steal email addresses and spread viruses. See why you shouldn’t forward emails or OPEN forwarded emails either! …Plus how to forward an email message properly without unknowingly sending SPAM email.
You can use a custom QR code to store an unlimited amount of data, photos, and videos in one place and share it with a unique audience. See my favorite ways to use QR codes for your pet’s ID tag, as well as your own luggage tags, custom business cards, your resume & cover letter, and house-for-sale flyers.
What happens to your Facebook account after you die? Will someone set up a Facebook memorial page for you? It might not be at the top of your list of concerns right now, but you should know what happens to your Facebook after death. Here’s everything you need to know about online memorials for loved ones and how to plan for your own before you die.
Have you ever lost your smartphone? I have. It’s a terrible feeling! I left my phone in a women’s bathroom — never to be seen again (by me anyway). Smartphone security should be as high on your list as laptop security. Follow these 7 tips for increased cellphone security and download the suggested phone security apps to keep your phone safe at all times.
Because I travel a bit for work, I am constantly thinking about laptop security at various Wifi hotspots I use. You should also be very concerned about laptop computer protection especially if you use it to make online purchases. I’ve got some great tips for keeping your laptop and the data it holds safe. From choosing the right bag to carry your laptop in — to encrypting your own files, I know your data will be safer after reading this.
Have you seen all of the wearable technology devices out there lately? There are headbands, watches, patches, and more — all vying to be one of the best wearable tech trends. I’ll explain which wearables are worth buying, those that you shouldn’t waste your time on, and what the future of IoT looks like.
Wondering what to do with old computers? Don’t throw them out! An old computer or old laptop can be repurposed. I’ve found lots of clever ways to make good use of an old, beat up, used computer — better than selling it, and will save you money as well!
What is this Internet of Things, you ask? Basically it’s a fancy way of describing anything with an on/off switch that can also interact with the Internet. IoT devices can talk to each other, often without you even realizing it. Security is one of many IoT challenges – here’s how to stay safe.
Social media hackers are a sly and cunning breed. Use password managers, two-factor authentication and more tips to keep your social media sites safe.
Read this before you buy new wallets & purses with RFID protection! The facts about the security of chip credit cards and how electronic pickpocketing works
After malware infected my computer, see how I avoided a computer virus simply by using 2 great FREE programs: AVG antivirus and Housecall by Trend Micro.
Don’t take a chance on getting a computer virus! Here are 5 things you can do to protect your computer against malware and keep everything safe.
The dangers of MySpace… and the good stuff too! The point here is this: While MySpace has become all the rage for musicians to connect with their fans and teenagers to broaden their circle of friends, it is becoming more and more like a place to ‘hook-up’ and meet strangers. Here’s the rest of the story…