Best Chromebook Black Friday 2018 deals: by zdnet.com/
From $99 budget systems to the pricey PixelBook, these Chrome-running laptops will all be on sale.
Thanks to their low price and popularity with schools, Chromebooks remain one of the bright spots in a flagging PC market. No surprise, then, that retailers are offering many Chromebook deals for Black Friday. While some of the sales are for Chrome OS running laptops with smaller screens and minimal specs that cost as little as $99, Chromebooks have evolved to offer bigger displays, 2-in-1 capabilities, and more high-end features as found in Google's PixelBook. We've rounded up those specials below to make it easy for you to find the right deal if you're planning to buy a Chromebook on Black Friday.
Here are my favorites!
The best Android power user features you may have forgotten about By Corbin Davenport, www.androidpolice.com
Android has now been around for over a decade, and every single update has brought new features. Some functionality is unknown to the vast majority of smartphone owners, either because the options aren't well-advertised, or because their uses are limited.
In this post, we've compiled some of the best power user features that Android has to offer.
5 Best Chrome Extensions For Productivity That You Should Use In 2019 By Manisha Priyadarshini, fossbytes.com
Google is the most popular browser around and supports a vast number of extensions as well. Since there are a lot of Chrome addons available in the Chrome Web Store, picking the best Google Chrome extension can be quite a task.
How to Tell if Your Account Has Been Hacked By Lorenzo Franceschi-bicchierai, motherboard.vice.com
Hackers routinely target high profile victims like politicians or wealthy cryptocurrency investors. But you could become a target too. Maybe an abusive former partner wants to stalk you, or a run-of-the-mill cybercriminal wants to get into your bank account.
In our era of advanced technology and high-speed Internet connections, you can find information on virtually anything. In the space of just a few minutes, we can find recipes for the tastiest pie or learn all about the theory of wave-particle duality.
The Secret Powers of Chrome's Address Bar By Thorin Klosowski, lifehacker.com
Chrome's address bar doesn't do much at a glance. Type in a URL and you're taken to a web site. But it can do a lot more if you know how to use it.
We've covered plenty of great Chrome tricks over the years, but the address bar has always been a bit neglected. You can actually do a ton with it though, so let's dig into some of the better tricks.
Here’s every Google app with a dark mode, and how to enable it By Ben Schoon, 9to5google.com
For years now, the Android community has cried out for dark themes in applications and the system throughout, all while Google continued to slap more and more white themes basically everywhere. Slowly but surely, though, we’ve been seeing more Google dark mode apps on various platforms. Here’s every Google dark mode app available today.
Ultimate Guide to Google Calendar Settings By Simpletivity, www.youtube.com VIDEO
Major SMS security lapse is a reminder to use authenticator apps instead By Jon Porter, www.theverge.com
A recent data breach has exposed a database of around 26 million text messages containing private customer information, reports TechCrunch. In addition to the privacy concerns, the breach also highlights the dangers of relying on SMS messages for receiving two-factor authentication codes or account reset links, which sees sensitive information sent over an unencrypted communications platform.
What is Google One and how does Google Drive work? By Maggie Tillman, www.pocket-lint.com
Google has reduced the cost of Google Drive and is promising to add some really neat features to the online storage service.
Drive has been around for years now but has changed relatively little since launch; it lets you upload files, create files, share files, etc. However, Google recently switched up the service's pricing plans, giving them their very own brand (Google One), and it's bundling some nice-to-haves like live expert support and subscriber perks. Here's what you need to know about Google Drive and Google One.
The Best Grammar Checkers For Every Type Of Writing by Jennifer Allen @jenjeahaly
We all want to write better and more effectively. It’s easy to become both paranoid and complacent over one’s writing style. Fortunately, there are plenty of online services that help by checking your grammar. We’ve looked at some of the best grammar checkers out there.
Google Brings Enhanced Network Features to Project Fi By Paul Thurrott, www.thurrott.com
Google announced today that it is introducing enhanced networking functionality to its Project Fi wireless network. Among the changes are improvements to the Project Fi VPN and a faster, more seamless way to intelligently switch between Wi-Fi and cellular networks.
What you need to know about Android Pie’s lockdown mode By Contact, www.androidauthority.com
Hidden away amongst all the interface enhancements and feature additions in Android Pie is an all-new feature that has somewhat slipped under the radar for many users. Lockdown mode is a new security-focused addition that is going to be of particular use to anyone who is worried about protecting their private data in situations where their smartphone might not be in their possession.
How to See Recent Changes to Your Google Docs, Sheets, or Slides File By Brady Gavin, www.howtogeek.com
The Google Suite offers you a handy way to view all the changes that have occurred in a file on Google Docs, Sheets, or Slides. This is extremely useful when you’ve made lots of changes to a file or are working as part of a team and need to track the changes made to a shared file. Here’s how you can view the recent changes to your Google Docs File.
How to Take Better Photos Out a Window By Harry Guinness, www.howtogeek.com
Windows might seem clear when you look through them, but when you take a photo, you’ll notice that the glass has quite a significant effect on how things look. There’ll be reflections, flare, and all sorts of weird stuff going on that your brain mostly ignores—but your camera captures. Let’s look at how to take better photos out of windows.
Google gives the Pixel camera superhuman night vision By Vlad Savov, www.theverge.com
Two years ago, Google’s release of the first Pixel smartphone radically raised the bar for the image quality we could expect from mobile cameras. Today, even as everyone else struggles to catch up, Google is extending its lead with the introduction of an equally revolutionary new camera. It’s called Night Sight, and it effectively lets your phone camera see in the dark. Only it doesn’t require any additional hardware or cost: Night Sight is a new camera mode for Pixel phones.
Logging In With A USB Key (U2F Explained) by Techquickie VIDEO – USB keys that use Universal Two-Factor, or U2F, are an elegant way to log into your important accounts without having to enter a six-digit code every time. How do they work, and are they a good idea for you?
9 handy hidden features for Google Maps on Android By Jr Raphael, www.computerworld.com
Who doesn't love Google Maps? The native Android app helps those of us with oatmeal for brains find our way anywhere, without having to fire any neurons or exercise any synapses. It even helps us find places to pick up tasty cuisine — like, uh, oatmeal (yum!).
Privacy.com: Protect Your Bank Accounts By Justin, operational-security.com
It is no secret that I am a major fan of Blur, the privacy service that allows you to mask your email address and phone number. One of my favorite features of Blur is credit card masking – the ability to create one-time-use credit card numbers that are billed to your real credit card. A new service has come along that allows you to create one-time use credit card numbers. The service is a little bit different than Blur, and has some advantages and disadvantages. It is called Privacy.com.
Drive Cloning & Imaging By Explainingcomputers, www.youtube.com VIDEO
Published on Nov 11, 2018
SSD and HDD cloning and imaging explained and demonstrated using Macrium Reflect 7 Free Edition. Note that all cloning and imaging software should be used with great care and is downloaded, installed and used at your own risk.
The Samsung 860 EVO 250GB SSD that I used in the video can be found on Amazon here (affiliate link): https://amzn.to/2Dh2UMK
The free cloning and imaging software that I refer to in the video is available from the following links. Please note that these links are provided in good faith and that I have no association with any of these organizations:
Macrium Reflect 7 Free Edition (as I use in the video): https://www.macrium.com/reflectfree
Samsung Cloning Software (for Samsung SSDs only): https://www.samsung.com/semiconductor… EaseUs ToDo Backup Free: https://www.easeus.com/backup-softwar… Clonezilla: http://www.clonezilla.org/ My “Laptop SSD Upgrade” video referred to in this video is here: https://www.youtube.com/watch?v=EVDTN…
Why You Should Start Using Two-Factor Authentication Now By Cristina Chipurici, heimdalsecurity.com
Imagine waking up on a splendid spring day, opening your laptop and realising that you can’t access your online accounts anymore. Your email has been breached, your website, your most precious work, is now gone, and your credit card was used for shady transactions.
In a nutshell, this is what I experienced almost 6 years ago.
For years, two-factor authentication has been the most important advice in personal cybersecurity — one that consumer tech companies were surprisingly slow to recognize. The movement seemed to coalesce in 2012, after journalist Mat Honan saw hackers compromise his Twitter, Amazon, and iCloud accounts, an incident he later detailed in Wired. At the time, few companies offered easy forms of two-factor, leaving limited options for users worried about a Honan-style hack. The result was a massive public campaign that demanded companies to adopt the feature, presenting two-factor as a simple, effective way to block account takeovers.
Beyond Passwords: 2FA, U2F and Google Advanced Protection by www.troyhunt.com
Last week I wrote a couple of different pieces on passwords, firstly about why we're going to be stuck with them for a long time yet and then secondly, about how we all bear some responsibility for making good password choices. A few people took some of the points I made in those posts as being contentious, although on reflection I suspect it was more a case of lamenting that we shouldn't be in a position where we're still dependent on passwords and people needing to understand good password management practices in order for them to work properly.
5 Sysinternals Tools For Windows Power User by techwiser.com
If you are using Windows for long enough, you should have come across a bunch of useful built-in administrative tools. But do you know that Windows has a suite of free utilities called as Sysinternals, that provide the best configuration, troubleshooting, and diagnostic tools? If not, you should definitely give the tools discussed below a try.
Why you should use a password manager By Jack Wallen, www.techrepublic.com
Your password is weak. Is it your birthday? The birthday of your kids? Your anniversary? Or is it password123? Consider this: It only takes 14.17 minutes to crack a nine-digit password (such as 123456789) that consists of the numbers 1-9. Using a botnet or supercomputer, that same password can be cracked in .0085 seconds. So that weak-sauced password you use for every account you have can be hacked pretty easily.
How to Use Authy To Keep Your Data Safe by OnlineBusinessRealm VIDEO
Authenticator Apps By Twit Netcast Network, www.youtube.com Video
How to Use Tasks and Reminders in Google Calendar By Simpletivity, www.youtube.com VIDEO
What is phishing? How this cyber attack works and how to prevent it By Josh Fruhlinger, www.csoonline.com
Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment.
In the classic 1973 heist movie The Sting, two con men—played by Robert Redford and Paul Newman—build a fictitious world in a Depression-era Chicago basement to defraud a corrupt banker. They make an offtrack-betting room, hire actors to ensure the scene is convincing, and even enlist pretend law enforcement to fake-bust their mark. The film is memorable because it is one of the finest movies in the genre, well written and funny, but also because the duo’s work is so meticulously detailed.
Use Gmail and Google Drive Offline 2018 by dottotech VIDEO
Busting SIM Swappers and SIM Swap Myths by krebsonsecurity.com
KrebsOnSecurity recently had a chance to interview members of the REACT Task Force, a team of law enforcement officers and prosecutors based in Santa Clara, Calif. that has been tracking down individuals engaged in unauthorized “SIM swaps” — a complex form of mobile phone fraud that is often used to steal large amounts of cryptocurrencies and other items of value from victims.
5 Simple Windows Security Tips You've Got No Excuse to Ignore By David Nield, gizmodo.com
Computer security doesn’t really have to be hard. Some of the smallest, simplest measures can be the most effective in keeping your devices secure—they won’t take long, they’re easy to do, and you don’t really have any excuse for not doing them.
How to spot a phishing email By Andrew Burton, www.carbonite.com
Phishing and other social engineering attacks are only increasing in frequency, and unfortunately, sophistication. However, there are a number of common indicators of a phishing attack. Knowing what to look for goes a long way to protect yourself against attacks. If you spot any of the following tip-offs, proceed with caution.
Windows Defender Now Offers Ultra Secure Sandbox Mode, Here’s How To Turn It On By Chris Hoffman, www.howtogeek.com
Windows 10’s built-in antivirus can now run in a sandbox. Even if an attacker compromises the antivirus engine, they wouldn’t have access to the rest of the system. As Google’s Tavis Ormandy puts it, “this is game changing.”
Don't Get Caught in a Phishing Scam! – By Dottotech, www.youtube.com Video
How to Boot Into Safe Mode on Windows 8 or 10 (The Easy Way) By Walter Glenn, www.howtogeek.com
One of the most common steps when troubleshooting a PC is to boot into Safe Mode. Up through Windows 7, you did this by pressing the F8 key during boot—right before Windows started loading. This all changed with Windows 8 and its introduction of Automatic Repair mode—something that continues in Windows 10.
Secure Your Accounts and Passwords With a Hardware Token By David Murphy, lifehacker.com
Two-factor authentication is a quick, easy way to add extra security to your accounts (or password managers). For even more security and peace of mind, consider buying a hardware token like the YubiKey or Google Titan. They’re incredibly easy to set up, and as long as you keep the USB accessory on or near you—on your keyring, for example—you’ll be able to authenticate into supported accounts and services as quickly as typing in a password. And since nobody else will have your hardware authenticator, your accounts will be protected from other attackers.
Google Maps now lets you pick a light or dark scheme when navigating By News, www.androidauthority.com
With Google integrating dark themes into more and more of its apps, it makes sense for the company to do the same with Google Maps. The latest update to Google’s navigation app now lets you pick a dark scheme, but there is a big caveat.
A Guide to Common Types of Two-Factor Authentication on the Web By Jacob Hoffman-andrews, www.eff.org
Two-factor authentication (or 2FA) is one of the biggest-bang-for-your-buck ways to improve the security of your online accounts. Luckily, it's becoming much more common across the web. With often just a few clicks in a given account's settings, 2FA adds an extra layer of security to your online accounts on top of your password.
The Different Forms of Two-Factor Authentication: SMS, Autheticator Apps, and More By Chris Hoffman, www.howtogeek.com
Many online services offer two-factor authentication, which enhances security by requiring more than just your password to sign in. There are many different types of additional authentication methods you can use.
Two-Factor Authentication: Who Has It and How to Set It Up By Eric Griffith, www.pcmag.com
In 2014, the Heartbleed exploit left everyone's login information potentially up for grabs thanks to one itty-bitty piece of code, and in the past few years, our security nightmares have only gotten worse. In fact, more data was leaked in the first half of 2017 than in all of 2016 combined.
How to Use LastPass for More Than Just Managing Passwords By Chris Hoffman, www.howtogeek.com
LastPass is more than just a password manager. It’s an encrypted vault where you can store secure notes, secret bookmarks, and even entire files. It can also save your address and credit card numbers and fill those into online forms.
Using Cameras To Measure The Real Altitude Of The Space Station by Scott Manley YouTube video
See the International Space Station in front of the Moon!
How to Back Up All of the Photos From All of Your Apps By David Nield, gizmodo.com
Your photos and videos are likely to be some of the most precious files you have on your smartphone. Even if you’ve got new photos and videos taken with the camera synced to the cloud though, what about the pictures your family send you over WhatsApp? Or the Instagram Stories you post? Here’s how to make sure every photo and video on your devices is getting backed up.
Use Google Contacts Like a Pro By Dottotech, www.youtube.com ViDEO
Use Your Password Manager for Security Answers, Too By David Murphy, lifehacker.com
It’s been a while since I’ve had to type in some stupid answer to a made-up question when creating an account on a new service. You know what I’m talking about: Forget your password, and you can regain access to your account by typing in the name of your first pet (Mr. Mrglglrm), your favorite sports team (Saskatoon Sirens), or the street you grew up on (Third Street).
Google using lock screen passwords to encrypt Android Cloud backups By Lisa Vaas, nakedsecurity.sophos.com
Google’s got your back when it comes to your backups, it says – and it’s even promising to keep its own peepers off the goods.
Security Updates Are Even Breaking Your Printer (On Purpose) By Chris Hoffman, www.howtogeek.com
Printer manufacturers hate third-party ink cartridges. They want you buying the expensive, official ones. Epson and HP have issued sneaky “updates” that break these cheaper cartridges, forcing you to buy the expensive ones.
Google Advanced Protection Program by landing.google.com
What is phishing?
Phishing is a common technique that can be used to trick you into giving away your username, password, 2-Step Verification code, or other personal information. Phishing attacks can happen through a variety of channels, including email, telephone, text message, or in apps.How does Advanced Protection defend against phishing?
Advanced Protection requires you to use a physical Security Key.
Gboard adds floating keyboard feature By Dima Aryeh, androidandme.com
Google’s keyboard, (not so) cleverly called Gboard, has been updated with a new floating keyboard function. It’s a tad complex to access: Hit the G in the upper left corner (or the arrow, depending on how you have it set up), hit the three dots, and press on the floating keyboard button.
The Best Android Phones Under $300 by reviewgeek.com Michael Crider
One of the nicest things about the Android platform is that phones come in all sizes and price ranges. We’ve selected the best phones under the $300 mark for American shoppers.
With a price range under three C-notes, you won’t get the latest processors or a long list of extra features. But these phones have access to Google’s Play Store.
Look Out: Windows 10’s ‘Free Up Space’ Can Empty Your Downloads Folder By Justin Pot, www.howtogeek.com
Windows’ built-in cleaning tool can now empty out your Downloads folder, so make sure you don’t check that option if you keep anything important there.