How to Use VeraCrypt: Part 1
header image courtesy of WOCinTech Chat Have you ever thought about encrypting a flash drive or your whole computer? There’s lots of software out there that can do that, but which one should you pick? Many of them are for…
A Week With Tails
I never expected to see a reference to a Linux-based operating system in USA Today. But there it was, in the middle of an article about uses for old flash drives. The author called Tails one way “to protect your…
Securing Your Google Account
Updated September 2023 Google is no longer just a search engine. It is a tech company with all sorts of projects and products. Your Google account is a precious thing. Why should you protect it? Because it contains multitudes of…
What is PGP?
Update (November 2018): Please my related post on OpenPGP, the free, open-source version of PGP. Ever since the last presidential election, there’s been a lot of talk about online security and privacy. I’m sure many of you heard words like…
What Is a VPN and Why Do I Need One?
Note: This article is intended for people currently residing in the United States. The laws governing the use of encryption products may differ in other countries. The advice in this article is intended for the average Internet user. If you are…
Is Your Smartphone Snitching on You?
Our lives are intimately connected to our smartphones. They are as precious as our government-issued IDs. Smartphones aren’t just phones; they are tiny computers that can also make phone calls. We use our smartphones as web browsers, payment methods, banking…
Three Tech Tips for Holiday Entertaining
It’s the holiday season: the time of year when most of us will be hosting at least one family dinner or party with friends. But nowadays, our friends and family bring unexpected guests with them; you don’t just host your…
Recent Comments