The folly of banning the Tic Toc app

The folly of banning Tic Toc app

Why the Tic Toc app won’t work: The United States Congress is currently debating and investigating Tic Toc. There is little doubt that Tic Toc and their practices at shady and do not benefit the US citizens.  ByteDance, the company that owns Tic Toc operates at the pleasure of the Chinese Government and by law […]

Read More…

Getting Smart With: PASS – the command line password manager

Open source command line tool to store passwords securely

Getting Smart With: PASS – the command line password manager PASS is a password manager that uses the command line in Linux to create encrypted files for the sites that you visit. PASS was designed for simplicity and adheres to the Unix philosophy. With PASS, each password lives inside of a gpg encrypted file whose […]

Read More…

Hardening Your Home Router

Home Router Hardening

Hardening Your Home Router Hardening your home router is a fairly straightforward thing to do. I will explain all the steps involved and walk you through the process. So what is hardening? It is the process of securing your network so it is harder for the bad actors to get into it. Although all routers […]

Read More…

How to create Windows 10/11 boot repair disk

windows recovery

How to create Windows 10/11 boot repair disk It is wise to create a Windows 10/11 boot repair disk before you have problems. All hard drives fail, things get corrupted or you have other problems and without a Windows 10/11 boot repair disk you are left without a working computer. Here are the steps to […]

Read More…

Alternatives to Google Search

search-alternatives

Alternatives to Google Search Google is the three-hundred pound gorilla in the room when it comes to searching on the internet, but there are privacy concerns. Searches that you make online have the potential to reveal a lot about you and your private life. This includes, but is not limited to: your habits, your interests, […]

Read More…

How to achieve online privacy

Online privacy is the goal of many of us who surf the web. Unfortunately, it is a fluid concept that is only partially achieved in most cases. Who, might you ask is storing or collecting my private data? Who is spying on me? Your local device (ie. your computer or smart phone) Your local ISP […]

Read More…