Category: Tech
Here you can view a specific archive, or you can go to the homepage.
-
Finale’s Unforseen Farewell
With Finale’s sudden and disruptive departure, there’s a big hole left in the music notation software sector. However, there are lessons to be learned for the next surprise shutdown.
-
Locked Out of WordPress Dashboard – Database Editing Not Working
I have been doing some extensive work with client sites (and my own) that involve moving sites across the internet. Now, moving a standard site consisting of simple files is relatively easy. Simply copying and pasting the directory (and then adjusting any DNS settings) is all that is required to get these up an running.…
-
Android Presents Users With A Fitness-Tracker Quandry
Recent updates to Google’s fitness tracking services mean that Android users may need to think about their next fitness tracker.
-
Amazon Is Full of Flash Drives That Will Eat Your Data
Those too-good-to-be-true 1 terabyte flash drives you find on Amazon might be more dangerous than you realize. Here’s how to protect your data!
-
LastPass: Revenge of the Breach
The LastPass breach – as bad as it was – looks like it’s reached worst-case. Now the vaults are (likely) being cracked.
-
NSA Best Practices on Network Security
The need for basic network security has led the NSA to create a 9-page PDF with some of the best ways to protect your home (or work) network!
-
WordFence: State of WordPress 2022
WordFence released its “2022 State of WordPress” report last month. Here’s what it says about the security of WordPress sites across the internet.
-
The Last Chance for LastPass
The latest LastPass breach has caused me to look for other options – here’s why.
-
The Best Way to Transfer to a New iPhone (and eSIM Thoughts)
Due to some weirdness, I’ve lately become an expert on transferring data to a new iPhone. Here’s the best way to do it. (Plus, thoughts on eSIM).
-
PaaS Attacks Enable More Dangerous Phishing Emails
A new phishing-as-a-service (PaaS) provider will likely lead to a wave of more dangerous and effective phishing messages. Here’s what to know.