Some Early Information About Windows 10
In September 2014, Microsoft Corp. revealed its next operating system, Windows 10, at an unveiling event in San Francisco. Terry Myerson, the executive vice president of Microsoft's Operating Systems group, said at the event that the new OS represented "the first...
Enabling Two Factor Authentication for Your DropBox Account
Two-factor authentication is a security process in which the user provides two means of identification, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code. In this context, the...
Microsoft Office 365 – Two Factor Authentication
Microsoft Office 365 is a cloud-powered version of Microsoft Office. In addition to the standard features, this new version of Office now offers online conferencing, file sharing, business-level email, shared calendars, and website creation. Unfortunately, since...
Enabling Two Factor Authentication for Your PayPal Account
If someone could use your credit card online to make a purchase and just need to enter your username and password to do so, would you be a bit concerned? Well, that is what someone can do if they have your username and password for your PayPal account. Luckily PayPal...
Facebook – Enabling Two Factor Authentication
Earlier I have described how to enable two factor authentication for your Twitter and Apple accounts, today I will tackle Facebook. We are hearing about more and more online accounts being hacked almost daily. Setting up a strong password for each account you have is...
Enabling Two Factor Authentication for Apple’s iDevices
A few days ago I described how to enable two factor authentication on Twitter. Today I will show you how to do the same for your Apple products. You have probably heard in the news lately that numerous celebrities that had their Apple accounts hacked. This...
What you should know about the latest password heist
A group of Russian hackers has stolen the largest amount of Internet credentials in history, Milwaukee-based Hold Security announced this week. The stolen information includes 1.2 billion usernames and password combinations, as well as 500 million email addresses....
Pros and Cons of Using VoIP for Your Business
The days of needing a land-line to stay connected with your customers are coming to an end. VoIP (Voice over Internet Protocol) lets you make calls over the Internet. Benefits include cost savings, scalability, and mobility. However, there are certain drawbacks to...
The 7 Most Important Data Files You Should Be Backing Up Nightly
While regular backups are an important part of any disaster recovery plan, not every file on your system is mission critical. It's always good practice to back up your systems daily, but often that isn't practical or doable. Whether because of financial or time...
5 Signs Your Hard Drive is About to Fail
Whether you have a solid state or mechanical drive there is always a chance the device will fail. Regardless of the type of drive, your computer usually will show subtle signs of a pending disk failure. Paying attention to these signs can save you from unexpectedly...