Social Networks and Social Engineered Cyber Crimes

Where did my identity go?

Currently, one of the fastest growing cyber crimes on the internet is the harvesting of bits and pieces of user information placed on social networks, and using that information against the user by way of identity theft.  These types of cyber crimes refer to the psychological manipulation of people into performing actions or divulging confidential information… Continue reading Social Networks and Social Engineered Cyber Crimes

Use A Content Delivery Network For Your Website

Figure 1

Several months ago, my website’s page load times were, in a word, miserable. In the last couple of years, not only has the number of posts increased on LarryTalksTech.com, but the amount of graphics I use to add interest and help explain some part of a particular post has increased as well. Parsing out the… Continue reading Use A Content Delivery Network For Your Website

Onyx: A Swiss Army Knife for OS X Maintenance

In the beginning… Having once had my computer hacked, I have become very paranoid about the security of my machines and the network on which they run.  One security process I carry out daily when I am done using my computers is a very simple one:  I turn off the computers.  It is indeed very hard to… Continue reading Onyx: A Swiss Army Knife for OS X Maintenance

My Heuer Autavia Chronograph Model 1163 V and How I Found It – Twice

Introduction Good design and engineering are symbiotic. Add state of the art technology to both of these elements and you have the basis for a good product. It is no surprise to find these principles working in many successful manufacturers, Apple computers being one of the best examples. However, this is a story that is… Continue reading My Heuer Autavia Chronograph Model 1163 V and How I Found It – Twice

Using the Linux “Whatis” and “Man” Commands

Saying the Linux and Unix shell commands are not intuitive is an understatement of epic proportions.  It might be easier to learn Klingon.  There is help for finding out about the Linux and Unix commands however, and it is found in the unassuming commands, whatis and man.  The syntax for whatis couldn’t be simpler:  whatis… Continue reading Using the Linux “Whatis” and “Man” Commands

Droid – Bring It Back To Life

Where did my money go?

Where Did I Put My Old Droid? I replaced my Droid with a Galaxy S3, and the Droid quickly faded from my memory.  Then, not too long ago, my beloved iPod Classic crossed over to the electronic version of Valhalla.  I was crushed. After carefully paying my last respects to the iPod, I knew I… Continue reading Droid – Bring It Back To Life

Dog Food: How To Know What You Are Getting

My dog appreciates technology, he eats it several times a day

Dog food, really??? I know what most of you are thinking.  How does an article about dog food fit into a technology website?  Actually, the topic fits quite well: “Dry” dog food is a marvel of technology.  Each of those tasty kernels (also called kibbles) your pet crunches as he eats, is a totally engineered… Continue reading Dog Food: How To Know What You Are Getting

LarryTalksTech: A look back at 2012

A Look Back

Some Reflection The end of a year usually brings about some reflection and I thought this would be a good time to look back at the roots of LarryTalksTech, comment on some of the articles written during 2012, and provide updates where applicable. In The Beginning… I’d been kicking around the idea of writing a… Continue reading LarryTalksTech: A look back at 2012

Home Theater AV Receiver Listening Modes Defined

Listening modes create an immersive home theater experience

You unboxed your new home theater AV receiver, ran a spool or two of speaker wire to your speakers,  hooked all your devices into your receiver, calibrated your speakers, and finally ran the last HDMI cable from your AV receiver to your TV.  Time to watch a DVD.  After the movie starts, you notice the… Continue reading Home Theater AV Receiver Listening Modes Defined