Audio Thrifting for my office I wanted a nice-sounding audio system for the small office in my home. In addition, I did not want to spend a lot of money in the process. My budget was set at $150.00 for this project. I have been audio thrifting at Goodwill and the Salvation Army for years,… Continue reading AUDIO THRIFTING | Part 1
Create A RAM Disk For Mint, Ubuntu, and Debian
What is a RAM disk? A RAM disk is a virtual disk drive created using a portion of a computer’s random-access memory (RAM). It emulates a traditional hard drive, allowing users to both store and access data on it similar to a hard drive or a solid-state (SSD) drive. What are the benefits of a… Continue reading Create A RAM Disk For Mint, Ubuntu, and Debian
Why I Bought A 2013 Mac Pro
The 2013 Mac Pro Computer and the Dodo Bird have a lot in common. The 2013 Mac Pro has what seems to be a history of disappointment to both Apple and some customers as well. So, before I laid down some cash for one of these computers, I thought I’d better do some research into… Continue reading Why I Bought A 2013 Mac Pro
PASSWORDLESS WORDPRESS LOGIN
Password authentication is vulnerable, even with 2FA. A free WordPress plugin from Trusona makes a passwordless WordPress login both fast and secure. This video will tell you how to get the Trusona Passwordless plugin, how to install it, and how to use it. This website has been passwordless for a little over six months now.… Continue reading PASSWORDLESS WORDPRESS LOGIN
Run Multiple Computers With A Single Keyboard and a Mouse
You can run multiple computers with a single keyboard and a mouse by using an amazing little app called Synergy.
Improve Your Privacy On The Internet
Editor’s Note: This is the second installment in a series of articles on how to both improve your privacy and lower your digital footprint on the Internet. My last post discusses facial recognition, and my next post will focus on emails. To learn more about facial recognition and how to fool it, click HERE. Disclaimer:… Continue reading Improve Your Privacy On The Internet
Fool Facial Recognition
Editor’s Note: For the past three months, I have been spending much of my spare time working on ways to improve both my privacy and my digital footprint on the Internet. To accomplish this, I realized that Big Tech’s massive collection of personal data is the epicenter of the entire Internet privacy issue. What can… Continue reading Fool Facial Recognition
Mid 2008 iMac With Ubuntu 20.04
My iMac is 12 years old, with a version of OS X that was released 5 years ago, and the last update for the operating system was 2 years ago. Simply, it was time to rejuvenate the iMac with a contemporary operating system. An iMac with Ubuntu seemed like a direction I needed to take…..and… Continue reading Mid 2008 iMac With Ubuntu 20.04
Aegis Secure Key 3NX-C Review
Forward Several weeks ago, I received an email inviting me to write a review on Apricorn’s Aegis Secure Key 3NX-C. Before replying, I did some research on both the company (Apricorn) and the Aegis Secure Key 3NX-C. Apricorn focuses on designing, manufacturing, and marketing 256-bit AES encrypted external data storage devices. Storage platforms range from… Continue reading Aegis Secure Key 3NX-C Review
Enable Trim After Mac SSD Install
What Is Trim And Why Use It? Before we discuss Trim, let’s find out what a P/E cycle is. Basically, there are two processes involved when something is written to an SSD drive: Writing begins with erasing memory from flash memory cells. These cells are then programmed with the new information. This is called a… Continue reading Enable Trim After Mac SSD Install