AUDIO THRIFTING | Part 1

Audio Thrifting for my office I wanted a nice-sounding audio system for the small office in my home.  In addition, I did not want to spend a lot of money in the process. My budget was set at $150.00 for this project. I have been audio thrifting at Goodwill and the Salvation Army for years,… Continue reading AUDIO THRIFTING | Part 1

Fool Facial Recognition

Editor’s Note: For the past three months, I have been spending much of my spare time working on ways to improve both my privacy and my digital footprint on the Internet. To accomplish this, I realized that Big Tech’s massive collection of personal data is the epicenter of the entire Internet privacy issue. What can… Continue reading Fool Facial Recognition

The Spectrum Mystery Modem E31_2V1

Back Story: I use Spectrum Cable with a 300 Mbps download plan for my Internet. It is the fastest I can get in my area, and for the last couple of years, it has worked flawlessly. Recently, that wonderful euphoric digital state ended rather abruptly. My network would not stay connected. It went from “bad”… Continue reading The Spectrum Mystery Modem E31_2V1

The Difference Between Internet Speed and Bandwidth

Internet speed and bandwidth are concepts often confused to a point where both measurements seem interchangeable.  They are not. Here is how speed and bandwidth are described by a Cisco network engineer (Bandwidth vs. Speed | The Cisco Learning Center | Chandan Singh Takuli): “Too fast Too furious – who doesn’t like speed, especially when we… Continue reading The Difference Between Internet Speed and Bandwidth

Connect The Amazon Echo Connect To The Ooma Telo

Getting Started Several months ago, I “cut the cable” and unbundled my Internet, TV, and phone services from Spectrum.  Ooma was selected for the new phone service. At the heart of the Ooma service, is a little black box called the Telo. The Telo connects to my Internet router/modem via an Ethernet cable. A telephone… Continue reading Connect The Amazon Echo Connect To The Ooma Telo

Use Google Search Guide For Better Targeted Searches

Google Search is a powerful tool.  From googleguide.com, I downloaded to the desktop of each of my computers a PDF file version of the Google Search cheat-sheet seen below (which is two jpg files). This is a tool I use every day.  The Google Search cheat-sheet can help you improve the targeting of your searches.… Continue reading Use Google Search Guide For Better Targeted Searches

iOS 8.3 and Bad Elf: UPDATE

Some very good news from Bad Elf:  “During Apple’s Worldwide Developer Conference (WWDC) keynote yesterday, Apple announced several new services that will be included in iOS 8.4 and available by June 30th.  This release is expected to fix the open iOS bugs affecting external GPS receiver accessories.  Although we had hoped for a 8.3.1 update or… Continue reading iOS 8.3 and Bad Elf: UPDATE

Hacking Defined

While doing research for an upcoming article about protecting computers from Hacking, I found this slide presentation by Sal Sakoji, from Slideshare.net.  Its original title is: Hacking & Its Types.  Though I like to post my own original work, I feel this presentation is very well done, straight forward, and worth sharing.  You can find… Continue reading Hacking Defined

Cybersecurity 101 – NOVA Labs | PBS.org

Here is a very well done 3 minute 38 second video that explains Cybersecurity on the internet.  The video is from NOVA Labs | PBS.org. At NOVA’s website, in their Cybersecurity Lab, you can play a game where you are one of the people, protecting a company that is the target of increasingly sophisticated cyber attacks.… Continue reading Cybersecurity 101 – NOVA Labs | PBS.org

Port Forwarding and Small Network Security

I Hate Bots

Port forwarding is found in both business enterprise and small-business computer networks. As home computer networks are becoming both more common and complex, port forwarding can be found here as well. While enterprise level networks use highly advanced routers and hardware firewalls for protection, the processes of secure shells, tunneling, and port forwarding can function with a… Continue reading Port Forwarding and Small Network Security