Meet our writers

Win $1,000







Technology

August 2017
DeLaurentis
Bob’s Tech Talk

Device Disposal, Computer Repairs, and Quiet Evenings

Eventually, every smartphone reaches the end of its useful life. No matter what, do not dispose of it in the household trash. Electronics are packed with hazardous chemicals that should never be discarded in a landfill.

Kennedy
Musings of an Undefeated Matriarch

My New Computer Has One Eye

I long for the simplicity of the 1950s when a mouse was something you caught in a trap, a keyboard was part of a manual typewriter, a scroll was an ancient religious document, and “social media” was visiting the relatives on Sunday afternoon.

July 2017
Beeson
Sam's Side

Technoidiocy

“Well, first we have to configure the parameters for the wifi conglomerate.” (Note, he did not actually say THESE words. I have no idea what he really said. At this point, it was like Charlie Brown talking to an adult. “Bluh bluh bluh bluuuhhh.”)

DeLaurentis
Bob’s Tech Talk

Fake Facebook Requests, Outlook Backup, and Make Your Own Apps

To clean up your mom's situation, search Facebook for your mother's name, or a slight variation of it. If you spot a fake account, report it to Facebook via the "three dot menu" that appears below the header photo.

June 2017
Ashley
Add One More Day...

I Can’t Believe It’s Not Better

Now, don’t get me wrong, I’m not a complete dolt. I know the difference between a noun and a verb, aisle or isle, their, there or they’re. I got some smarts … just none that relate to anything particularly useful to future generations.

DeLaurentis
Bob’s Tech Talk

Roku Advice, Internet Filters, and USB-C

Controlling the Internet is a bit like trying to take a sip from a wide-open fire hose. Not only does it take considerable strength to hold on to the hose, the speed of even a trickle can sting your face and drench your clothing. Innocent bystanders get wet too. In short, it is a mess.

Siuru

Why Your ‘Connected’ Car Could Become a Hacker’s Dream Machine

Malware can be installed to later do bad things like set off air bags, lock the doors so you can't get out, or even take control of the vehicle...So far, there is no profit motive for vehicle hacking, but hackers are probably looking for one. One possibility is holding you ransom like locking doors or not allow engine starting until you send some money via your bank account or PayPal.

* * * * *

Connectivity allows access for hackers. So do simple items like remote and keyless entry, factory-installed garage door openers, Bluetooth, and even tire pressure monitors if they are connected to vehicle computer systems.

May 2017
DeLaurentis
Bob’s Tech Talk

Telephone Beware, Password Security, Video-Gamer Grandson

If your bank does not use two-factor, request they adopt it soon. Two-factor authentication is so important that I suggest favoring any business that uses it over one that does not.

April 2017
DeLaurentis
Bob’s Tech Talk

Fake News, Fake Phone Numbers, and Battery Dangers

I know of a case where a specific error message on Kindle, when searched on Google, would return a fake Amazon page with instructions to call a specific telephone number. Anyone who responded became a victim of fraud. Sadly, fake phone numbers are common online.

Siuru

Don't Get Locked Out of Your Car

These fobs not only let you secure and unlock your vehicle without using a key, they also let you start the engine remotely, set the driver seat to your desired preferences, pre-cool or pre-heat the interior before your trip, and more.

* * * * *

Just like the habit of putting on your seatbelt every time you enter your vehicle, get into the habit of checking for your keys every time you exit the vehicle.   

  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  Next 
  •  End 
  • »
Page 1 of 8