How it works
Google Basic Part 3: Google Calendar – By Dottotech, www.youtube.com VIDEO
Google Calendar is one of the most valuable members of Google's ecosystem. It can form the centre of your productivity system!
How to Use Gmail – Google Basics Part 2 By Dottotech, www.youtube.com Video
Discover how you can use Gmail like a pro. I'll show you everything you need to do to set up your Gmail account and then share the most important Gmail features.
Google Account – Google Basics – Part 1 – By Dottotech, www.youtube.com VIDEO
Let's go over the Google Basics! In this video, you'll learn how to set up your Google account, what to expect from your Google account and what benefits you get from joining the Google ecosystem.
- G-Suite Pricing Plan https://gsuite.google.com/pricing.html
- Create a Gmail Account https://accounts.google.com/signup/v2
- Google News https://www.youtube.com/watch?v=9wf-U…
- 5 Must Know Google Drive Tips https://www.youtube.com/watch?v=Inl4n…
- Google Calendar Overview https://www.youtube.com/watch?v=t5cWR…
- Google Photos https://www.youtube.com/watch?v=YXe68…
- Google Keep https://www.youtube.com/watch?v=AG21_…
- Google 2 Factor Authentication https://www.youtube.com/watch?v=TLUz7…
- Google Privacy https://www.youtube.com/watch?v=vA9Z0…
What Is a Chromebook, and How Is It Different than a Laptop? – By Simon Batt, www.maketecheasier.com
If you’ve been in the market for a laptop recently, you may have seen a type of laptop called a “Chromebook” It might sound a little weird; after all, isn’t Chrome a web browser? Why are there laptops named after it?
Chromebooks fill a specific niche in the laptop world. If you purchase one expecting something similar to a normal laptop, you may end up very disappointed with your purchase. However, if your needs and wants from a laptop match what a Chromebook does, you may find yourself saving a bit of money in the process!
How to Import a Word Document into Google Docs – By Brady Gavin, www.howtogeek.com
Someone send you a Word document, but you don’t have Word? Giving up on Word and making the change to Google Docs? No problem; Google Docs lets you easily import Word documents. And while it might not support some of the more advanced features and formatting of some Word documents, it works pretty well.
Google Smart Lock: The complete guide – By Jr Raphael, www.computerworld.com
Think fast: How many times a day do you pick up your phone to look at something? Unless you live in the tundra or have far more self-control than most, the answer probably falls somewhere between "quite a few" and "more than any sane person could count." Assuming you keep your device properly secured, that means you're doing an awful lot of unlocking — be it with your face, your fingerprint, or the code you tap or swipe onto your screen.
A Description of Encryption: The How, Why and When of Cryptography – By Jacob Roach, www.cloudwards.net
Jacob Roach is a Midwesterner with a love for technology, an odd combination given his corn field-ridden setting. After finishing a degree in English at Southern New Hampshire University, Jacob settled back under the Arch in his hometown of St. Louis, MO, where he now writes about anything tech. His main interests are web technologies and online privacy, though he dips his toes in photography and the occasional card game as well. You can reach him at jacob[at]cloudwards.net.
The Pros and Cons of Two-Factor Authentication Types and Methods – By Saikat Basu, www.makeuseof.com
If you aren’t using two-factor authentication yet, you’re way behind and leaving your accounts vulnerable to hackers and phishers. How safe do you actually feel when a password is the only thing standing between a stranger and your bank account? Not too safe, I hope.
How to Remotely Troubleshoot a Friend’s Windows PC Without Any Extra Software – By Chris Hoffman, www.howtogeek.com
Windows offers a few built-in tools for performing remote assistance over the Internet. These tools allow you to take remote control of another person’s computer so you can help them troubleshoot it while you’re on the phone with them. They work similarly to Remote Desktop, but are available on all editions of Windows and are easy to set up.
Classic Editor – By WordPress Contributors wordpress.org
Gutenberg “Suckenberg” is the worst joke played on us. Thank you for giving us back the WordPress we love, and not the idiotic thing they will be forcing on us.
I’m guessing there will be many similar plugins, and they will all be super popular.
WordPress 5.0 “Bebo” – By Matt Mullenweg, wordpress.org
We’ve made some big upgrades to the editor. Our new block-based editor is the first step toward an exciting new future with a streamlined editing experience across your site. You’ll have more flexibility with how content is displayed, whether you are building your first site, revamping your blog, or write code for a living.
Best Phones for Google Fi in 2018 – By Hayato Huseman, www.androidcentral.com
For just $20/month for unlimited calls/texts and $10 per GB of data you use (any data past 6GB is free), Google Fi is one of the most compelling MVNOs around — especially when you factor in its excellent roaming support, nationwide coverage, and Bill Protection feature that credits back whatever data you don't use. Fi works on almost any unlocked phone these days, but certain features work better on some phones than others — these are the ones that will give you the best Fi experience.
Google Fi may sound like some weird sort of initiation ritual ("Whoa, what happened to Rick? I heard he got Googlefied!") — but if you can get past its silly-sounding name, the recently rebranded wireless service can both save you money and step up your smartphone security situation.
Tip: Download Windows 7 and 8.1 ISOs By Paul Thurrott, www.thurrott.com
I’m not sure when this happened, but Microsoft now has ISO downloads available for Windows 7 and 8.1, and not just Windows 10.
Google Assistant smart displays: Your need to know on touchscreen smart speakers – By Sophie Charara, www.the-ambient.com
The idea of the smart home controller is changing. If 2017 was all about the cylindrical smart speaker, it looks like 2018 will shift to home hubs with touchscreens alongside voice controls.
Google Assistant guide: The missing manual to your Google Home – By Sophie Charara, www.the-ambient.com
Ah, Google Assistant. While Amazon and Alexa get all the attention, Google’s series of smart speakers is improving and expanding and – most importantly – selling, albeit all slightly under the radar.
Broadcast voice messages to Google Home devices by support.google.com
Send a message to everyone in your home by broadcasting messages on all of your Google Home devices.
Unfollow People on Facebook for a Happier Life – By Josh Hendrickson, www.howtogeek.com
Facebook is a great place to keep in touch with friends and family—especially those for whom you’d like to do so at a distance. Unfortunately, your friend's list is probably filled with people you can’t unfriend but would prefer not to hear from. Go ahead and unfollow them.
Project Fi is Now “Google Fi,” Works with Most Phones—Including the iPhone – By Cameron Summerson, www.howtogeek.com
It’s been a long time coming, but Google is upgrading its Project Fi cellular service with a new name, more features, and compatibility with a lot more phones. Even the iPhone is along for the ride now.
6 Google Spreadsheet Tricks That Are Easy to Learn and Remember By Mahit Huilgol, www.makeuseof.com
Google Sheets is a popular Microsoft Excel alternative. As with other Google tools, the Sheets is a core part of Google Drive. In this article, we have taken the liberty to dive deep and unearth a handful of super useful Google Sheets tricks that you may have never heard before.
These Google Spreadsheet tricks are simple enough to learn and remember.
U2F Explained: How Google and Other Companies Are Creating a Universal Security Token – By Chris Hoffman, www.howtogeek.com
U2F is a new standard for universal two-factor authentication tokens. These tokens can use USB, NFC, or Bluetooth to provide two-factor authentication across a variety of services. It’s already supported in Chrome for Google, Dropbox, and GitHub accounts. Microsoft is working on implementing it in Edge.
How to use Startup Repair to fix boot problems with Windows 10 By Mauro Huculak, www.windowscentral.com
It's just a matter of time before your device gets stuck loading or won't start at all. Instead of spending time trying to find out the problem, Windows 10 includes the Startup Repair feature designed to quickly fix most common issues that may be preventing your computer from loading correctly.
What is the cloud? | CNBC Explains By Cnbc International, www.youtube.com VIDEO
The cloud is big business for tech giants like Amazon, Google and Microsoft. Revenues from cloud services are expected to exceed $200 billion in 2019. But what exactly does the cloud do? CNBC’s Elizabeth Schulze explains.
The Best Places to Buy a Domain Name By Anthony Heddings, www.howtogeek.com
Unless you’ve got a connection at ICANN, the organization responsible for managing the creation of domain names, you’ll be buying your domain name from a “Domain Name Registrar,” a company accredited by ICANN to sell domain names.
Microsoft Accounts Now Support Passwordless Login via FIDO 2 Security Keys By Lucian Armasu, www.tomshardware.com
Microsoft and Yubico announced today that all Microsoft account owners using the latest Windows 10 version (build 1089) and the Edge browser will be able to log in to their accounts using nothing but a FIDO2/WebAuthn-enabled security key like Yubikey 5.
20 Roku hacks every user should know By Nayomi Reghay, www.dailydot.com
For cord-cutters, there’s no better device to scratch your streaming itch than Roku. Offering a wide range of devices to meet the needs of users of all types, using Roku means you have access to the best TV streaming experience for your budget. But Roku is more than just a collection of the biggest streaming services on Earth, it’s also a highly customizable operating system with plenty of hidden tricks. Here are the best Roku hacks to get the most your of your Roku experience.
The best Android power user features you may have forgotten about By Corbin Davenport, www.androidpolice.com
Android has now been around for over a decade, and every single update has brought new features. Some functionality is unknown to the vast majority of smartphone owners, either because the options aren't well-advertised, or because their uses are limited.
In this post, we've compiled some of the best power user features that Android has to offer.
In our era of advanced technology and high-speed Internet connections, you can find information on virtually anything. In the space of just a few minutes, we can find recipes for the tastiest pie or learn all about the theory of wave-particle duality.
The Secret Powers of Chrome's Address Bar By Thorin Klosowski, lifehacker.com
Chrome's address bar doesn't do much at a glance. Type in a URL and you're taken to a web site. But it can do a lot more if you know how to use it.
We've covered plenty of great Chrome tricks over the years, but the address bar has always been a bit neglected. You can actually do a ton with it though, so let's dig into some of the better tricks.
Here’s every Google app with a dark mode, and how to enable it By Ben Schoon, 9to5google.com
For years now, the Android community has cried out for dark themes in applications and the system throughout, all while Google continued to slap more and more white themes basically everywhere. Slowly but surely, though, we’ve been seeing more Google dark mode apps on various platforms. Here’s every Google dark mode app available today.
Ultimate Guide to Google Calendar Settings By Simpletivity, www.youtube.com VIDEO
Major SMS security lapse is a reminder to use authenticator apps instead By Jon Porter, www.theverge.com
A recent data breach has exposed a database of around 26 million text messages containing private customer information, reports TechCrunch. In addition to the privacy concerns, the breach also highlights the dangers of relying on SMS messages for receiving two-factor authentication codes or account reset links, which sees sensitive information sent over an unencrypted communications platform.
What is Google One and how does Google Drive work? By Maggie Tillman, www.pocket-lint.com
Google has reduced the cost of Google Drive and is promising to add some really neat features to the online storage service.
Drive has been around for years now but has changed relatively little since launch; it lets you upload files, create files, share files, etc. However, Google recently switched up the service's pricing plans, giving them their very own brand (Google One), and it's bundling some nice-to-haves like live expert support and subscriber perks. Here's what you need to know about Google Drive and Google One.
Google Brings Enhanced Network Features to Project Fi By Paul Thurrott, www.thurrott.com
Google announced today that it is introducing enhanced networking functionality to its Project Fi wireless network. Among the changes are improvements to the Project Fi VPN and a faster, more seamless way to intelligently switch between Wi-Fi and cellular networks.
What you need to know about Android Pie’s lockdown mode By Contact, www.androidauthority.com
Hidden away amongst all the interface enhancements and feature additions in Android Pie is an all-new feature that has somewhat slipped under the radar for many users. Lockdown mode is a new security-focused addition that is going to be of particular use to anyone who is worried about protecting their private data in situations where their smartphone might not be in their possession.
How to Take Better Photos Out a Window By Harry Guinness, www.howtogeek.com
Windows might seem clear when you look through them, but when you take a photo, you’ll notice that the glass has quite a significant effect on how things look. There’ll be reflections, flare, and all sorts of weird stuff going on that your brain mostly ignores—but your camera captures. Let’s look at how to take better photos out of windows.
Google gives the Pixel camera superhuman night vision By Vlad Savov, www.theverge.com
Two years ago, Google’s release of the first Pixel smartphone radically raised the bar for the image quality we could expect from mobile cameras. Today, even as everyone else struggles to catch up, Google is extending its lead with the introduction of an equally revolutionary new camera. It’s called Night Sight, and it effectively lets your phone camera see in the dark. Only it doesn’t require any additional hardware or cost: Night Sight is a new camera mode for Pixel phones.
Logging In With A USB Key (U2F Explained) by Techquickie VIDEO – USB keys that use Universal Two-Factor, or U2F, are an elegant way to log into your important accounts without having to enter a six-digit code every time. How do they work, and are they a good idea for you?
Privacy.com: Protect Your Bank Accounts By Justin, operational-security.com
It is no secret that I am a major fan of Blur, the privacy service that allows you to mask your email address and phone number. One of my favorite features of Blur is credit card masking – the ability to create one-time-use credit card numbers that are billed to your real credit card. A new service has come along that allows you to create one-time use credit card numbers. The service is a little bit different than Blur, and has some advantages and disadvantages. It is called Privacy.com.
Drive Cloning & Imaging By Explainingcomputers, www.youtube.com VIDEO
Published on Nov 11, 2018
SSD and HDD cloning and imaging explained and demonstrated using Macrium Reflect 7 Free Edition. Note that all cloning and imaging software should be used with great care and is downloaded, installed and used at your own risk.
The Samsung 860 EVO 250GB SSD that I used in the video can be found on Amazon here (affiliate link): https://amzn.to/2Dh2UMK
The free cloning and imaging software that I refer to in the video is available from the following links. Please note that these links are provided in good faith and that I have no association with any of these organizations:
Macrium Reflect 7 Free Edition (as I use in the video): https://www.macrium.com/reflectfree
Samsung Cloning Software (for Samsung SSDs only): https://www.samsung.com/semiconductor… EaseUs ToDo Backup Free: https://www.easeus.com/backup-softwar… Clonezilla: http://www.clonezilla.org/ My “Laptop SSD Upgrade” video referred to in this video is here: https://www.youtube.com/watch?v=EVDTN…
Why You Should Start Using Two-Factor Authentication Now By Cristina Chipurici, heimdalsecurity.com
Imagine waking up on a splendid spring day, opening your laptop and realising that you can’t access your online accounts anymore. Your email has been breached, your website, your most precious work, is now gone, and your credit card was used for shady transactions.
In a nutshell, this is what I experienced almost 6 years ago.
For years, two-factor authentication has been the most important advice in personal cybersecurity — one that consumer tech companies were surprisingly slow to recognize. The movement seemed to coalesce in 2012, after journalist Mat Honan saw hackers compromise his Twitter, Amazon, and iCloud accounts, an incident he later detailed in Wired. At the time, few companies offered easy forms of two-factor, leaving limited options for users worried about a Honan-style hack. The result was a massive public campaign that demanded companies to adopt the feature, presenting two-factor as a simple, effective way to block account takeovers.
Beyond Passwords: 2FA, U2F and Google Advanced Protection by www.troyhunt.com
Last week I wrote a couple of different pieces on passwords, firstly about why we're going to be stuck with them for a long time yet and then secondly, about how we all bear some responsibility for making good password choices. A few people took some of the points I made in those posts as being contentious, although on reflection I suspect it was more a case of lamenting that we shouldn't be in a position where we're still dependent on passwords and people needing to understand good password management practices in order for them to work properly.
How to Use Authy To Keep Your Data Safe by OnlineBusinessRealm VIDEO
Authenticator Apps By Twit Netcast Network, www.youtube.com Video
How to Use Tasks and Reminders in Google Calendar By Simpletivity, www.youtube.com VIDEO
What is phishing? How this cyber attack works and how to prevent it By Josh Fruhlinger, www.csoonline.com
Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment.
In the classic 1973 heist movie The Sting, two con men—played by Robert Redford and Paul Newman—build a fictitious world in a Depression-era Chicago basement to defraud a corrupt banker. They make an offtrack-betting room, hire actors to ensure the scene is convincing, and even enlist pretend law enforcement to fake-bust their mark. The film is memorable because it is one of the finest movies in the genre, well written and funny, but also because the duo’s work is so meticulously detailed.
Use Gmail and Google Drive Offline 2018 by dottotech VIDEO
Busting SIM Swappers and SIM Swap Myths by krebsonsecurity.com
KrebsOnSecurity recently had a chance to interview members of the REACT Task Force, a team of law enforcement officers and prosecutors based in Santa Clara, Calif. that has been tracking down individuals engaged in unauthorized “SIM swaps” — a complex form of mobile phone fraud that is often used to steal large amounts of cryptocurrencies and other items of value from victims.
How to spot a phishing email By Andrew Burton, www.carbonite.com
Phishing and other social engineering attacks are only increasing in frequency, and unfortunately, sophistication. However, there are a number of common indicators of a phishing attack. Knowing what to look for goes a long way to protect yourself against attacks. If you spot any of the following tip-offs, proceed with caution.
Secure Your Accounts and Passwords With a Hardware Token By David Murphy, lifehacker.com
Two-factor authentication is a quick, easy way to add extra security to your accounts (or password managers). For even more security and peace of mind, consider buying a hardware token like the YubiKey or Google Titan. They’re incredibly easy to set up, and as long as you keep the USB accessory on or near you—on your keyring, for example—you’ll be able to authenticate into supported accounts and services as quickly as typing in a password. And since nobody else will have your hardware authenticator, your accounts will be protected from other attackers.
A Guide to Common Types of Two-Factor Authentication on the Web By Jacob Hoffman-andrews, www.eff.org
Two-factor authentication (or 2FA) is one of the biggest-bang-for-your-buck ways to improve the security of your online accounts. Luckily, it's becoming much more common across the web. With often just a few clicks in a given account's settings, 2FA adds an extra layer of security to your online accounts on top of your password.
The Different Forms of Two-Factor Authentication: SMS, Autheticator Apps, and More By Chris Hoffman, www.howtogeek.com
Many online services offer two-factor authentication, which enhances security by requiring more than just your password to sign in. There are many different types of additional authentication methods you can use.
Two-Factor Authentication: Who Has It and How to Set It Up By Eric Griffith, www.pcmag.com
In 2014, the Heartbleed exploit left everyone's login information potentially up for grabs thanks to one itty-bitty piece of code, and in the past few years, our security nightmares have only gotten worse. In fact, more data was leaked in the first half of 2017 than in all of 2016 combined.
How to Use LastPass for More Than Just Managing Passwords By Chris Hoffman, www.howtogeek.com
LastPass is more than just a password manager. It’s an encrypted vault where you can store secure notes, secret bookmarks, and even entire files. It can also save your address and credit card numbers and fill those into online forms.
How to Back Up All of the Photos From All of Your Apps By David Nield, gizmodo.com
Your photos and videos are likely to be some of the most precious files you have on your smartphone. Even if you’ve got new photos and videos taken with the camera synced to the cloud though, what about the pictures your family send you over WhatsApp? Or the Instagram Stories you post? Here’s how to make sure every photo and video on your devices is getting backed up.
Use Google Contacts Like a Pro By Dottotech, www.youtube.com ViDEO
Use Your Password Manager for Security Answers, Too By David Murphy, lifehacker.com
It’s been a while since I’ve had to type in some stupid answer to a made-up question when creating an account on a new service. You know what I’m talking about: Forget your password, and you can regain access to your account by typing in the name of your first pet (Mr. Mrglglrm), your favorite sports team (Saskatoon Sirens), or the street you grew up on (Third Street).