- Seven Things Your IT Department Wishes You Knew About Tech Support
- Tesla Powerwall: Crunching The Numbers For Australia
- The Most Effective Way To Take Notes
- Top 10 Smart Ways To Organise And Upgrade Your Garage
- Beware Of These Pricing Tricks Retailers Use To Fool Your Brain
- How To Support Someone When They Decide To Quit Smoking
Having recently ditched the under-performing Microsoft Security Essentials for something better (in my case, the free edition of Avira), I know the pain of trying out new software. Anti-virus programs can sometimes be stubborn about removing themselves and if you’re finding the ghosts of old AV apps lingering on your system, ESET has an all-in-one removal tool that can help.
Say hello to Jason Eaddy of Elysium Digital. Elysium conducts digital forensic and security investigations, typically working with organisations in technology-related legal matters.
Data breaches have sadly become more common, though organisations are slowly beginning to learn the best way to handle them. Rather than hide the fact from those affected, Linux Australia has provided an extremely detailed and transparent account to its members explaining how its servers were hacked, what information was taken and how it has responded.
With the recent data retention shenanigans, you might have put serious thought into setting up a VPN (if you’re not already for circumventing geo-blocks). If you’re still considering your options, Private Internet Access is currently offering a good deal on two-year subscriptions.
Still using a four digit passcode to lock your iPhone? You should probably change that to a complex passcode, thanks to a new hardware hack.
Even if you’ve switched to another torrent client (or just an older version of uTorrent), now’s the time to make sure there are no hidden Bitcoin miners hogging your idle system resources. You’ll have to dive into your registry and file system, but a little effort is worth the peace of mind.