Getting Comfortable With The Basics

How it works

Google Account – Google Basics: Video

Google Basic Part 3: Google Calendar – By Dottotech, www.youtube.com  VIDEO

Google Calendar is one of the most valuable members of Google's ecosystem. It can form the centre of your productivity system!


How to Use Gmail – Google Basics Part 2 By Dottotech, www.youtube.com Video

Discover how you can use Gmail like a pro. I'll show you everything you need to do to set up your Gmail account and then share the most important Gmail features.


Google Account – Google Basics – Part 1 – By Dottotech, www.youtube.com  VIDEO

Let's go over the Google Basics! In this video, you'll learn how to set up your Google account, what to expect from your Google account and what benefits you get from joining the Google ecosystem.

Resources: –


 

What Is a Chromebook, and How Is It Different than a Laptop?

What Is a Chromebook, and How Is It Different than a Laptop? – By Simon Batt, www.maketecheasier.com

If you’ve been in the market for a laptop recently, you may have seen a type of laptop called a “Chromebook” It might sound a little weird; after all, isn’t Chrome a web browser? Why are there laptops named after it?

Chromebooks fill a specific niche in the laptop world. If you purchase one expecting something similar to a normal laptop, you may end up very disappointed with your purchase. However, if your needs and wants from a laptop match what a Chromebook does, you may find yourself saving a bit of money in the process!

Import a Word Document into Google Docs

How to Import a Word Document into Google Docs – By Brady Gavin, www.howtogeek.com

Someone send you a Word document, but you don’t have Word? Giving up on Word and making the change to Google Docs? No problem; Google Docs lets you easily import Word documents. And while it might not support some of the more advanced features and formatting of some Word documents, it works pretty well.

Google Smart Lock: The complete guide

Google Smart Lock: The complete guide – By Jr Raphael, www.computerworld.com

Think fast: How many times a day do you pick up your phone to look at something? Unless you live in the tundra or have far more self-control than most, the answer probably falls somewhere between "quite a few" and "more than any sane person could count." Assuming you keep your device properly secured, that means you're doing an awful lot of unlocking — be it with your face, your fingerprint, or the code you tap or swipe onto your screen.

A Description of Encryption: The How, Why and When of Cryptography

A Description of Encryption: The How, Why and When of Cryptography – By Jacob Roach, www.cloudwards.net

Jacob Roach is a Midwesterner with a love for technology, an odd combination given his corn field-ridden setting. After finishing a degree in English at Southern New Hampshire University, Jacob settled back under the Arch in his hometown of St. Louis, MO, where he now writes about anything tech. His main interests are web technologies and online privacy, though he dips his toes in photography and the occasional card game as well. You can reach him at jacob[at]cloudwards.net.

How to Remotely Troubleshoot PC’s

How to Remotely Troubleshoot a Friend’s Windows PC Without Any Extra Software – By Chris Hoffman, www.howtogeek.com

Windows offers a few built-in tools for performing remote assistance over the Internet. These tools allow you to take remote control of another person’s computer so you can help them troubleshoot it while you’re on the phone with them. They work similarly to Remote Desktop, but are available on all editions of Windows and are easy to set up.

– WordPress Classic Editor

Classic Editor – By WordPress Contributors wordpress.org

Gutenberg “Suckenberg” is the worst joke played on us. Thank you for giving us back the WordPress we love, and not the idiotic thing they will be forcing on us.

I’m guessing there will be many similar plugins, and they will all be super popular.


WordPress 5.0 “Bebo” – By Matt Mullenweg, wordpress.org

We’ve made some big upgrades to the editor. Our new block-based editor is the first step toward an exciting new future with a streamlined editing experience across your site. You’ll have more flexibility with how content is displayed, whether you are building your first site, revamping your blog, or write code for a living.

Best Phones for Google Fi in 2018

Best Phones for Google Fi in 2018 – By Hayato Huseman, www.androidcentral.com

For just $20/month for unlimited calls/texts and $10 per GB of data you use (any data past 6GB is free), Google Fi is one of the most compelling MVNOs around — especially when you factor in its excellent roaming support, nationwide coverage, and Bill Protection feature that credits back whatever data you don't use. Fi works on almost any unlocked phone these days, but certain features work better on some phones than others — these are the ones that will give you the best Fi experience.


Google Fi (aka Project Fi): The complete FAQ – By Jr Raphael, www.computerworld.com

Google Fi may sound like some weird sort of initiation ritual ("Whoa, what happened to Rick? I heard he got Googlefied!") — but if you can get past its silly-sounding name, the recently rebranded wireless service can both save you money and step up your smartphone security situation.

Google Assistant smart displays & speakers

Google Assistant smart displays: Your need to know on touchscreen smart speakers – By Sophie Charara, www.the-ambient.com

The idea of the smart home controller is changing. If 2017 was all about the cylindrical smart speaker, it looks like 2018 will shift to home hubs with touchscreens alongside voice controls.


Google Assistant guide: The missing manual to your Google Home – By Sophie Charara, www.the-ambient.com

Ah, Google Assistant. While Amazon and Alexa get all the attention, Google’s series of smart speakers is improving and expanding and – most importantly – selling, albeit all slightly under the radar. 


Broadcast voice messages to Google Home devices by support.google.com

Send a message to everyone in your home by broadcasting messages on all of your Google Home devices.

Project Fi is Now “Google Fi,” Works with Most Phones—Including the iPhone

Project Fi is Now “Google Fi,” Works with Most Phones—Including the iPhone – By Cameron Summerson, www.howtogeek.com

It’s been a long time coming, but Google is upgrading its Project Fi cellular service with a new name, more features, and compatibility with a lot more phones. Even the iPhone is along for the ride now.

Google Spreadsheet Tricks

6 Google Spreadsheet Tricks That Are Easy to Learn and Remember By Mahit Huilgol, www.makeuseof.com

Google Sheets is a popular Microsoft Excel alternative. As with other Google tools, the Sheets is a core part of Google Drive. In this article, we have taken the liberty to dive deep and unearth a handful of super useful Google Sheets tricks that you may have never heard before.

These Google Spreadsheet tricks are simple enough to learn and remember.

U2F Explained

U2F Explained: How Google and Other Companies Are Creating a Universal Security Token – By Chris Hoffman, www.howtogeek.com

U2F is a new standard for universal two-factor authentication tokens. These tokens can use USB, NFC, or Bluetooth to provide two-factor authentication across a variety of services. It’s already supported in Chrome for Google, Dropbox, and GitHub accounts. Microsoft is working on implementing it in Edge.

How to use Startup Repair to fix boot problems with Windows 10

How to use Startup Repair to fix boot problems with Windows 10 By Mauro Huculak, www.windowscentral.com

It's just a matter of time before your device gets stuck loading or won't start at all. Instead of spending time trying to find out the problem, Windows 10 includes the Startup Repair feature designed to quickly fix most common issues that may be preventing your computer from loading correctly.

Microsoft Accounts Now Support Passwordless Login via FIDO 2 Security Keys

Microsoft Accounts Now Support Passwordless Login via FIDO 2 Security Keys By Lucian Armasu, www.tomshardware.com

Microsoft and Yubico announced today that all Microsoft account owners using the latest Windows 10 version (build 1089) and the Edge browser will be able to log in to their accounts using nothing but a FIDO2/WebAuthn-enabled security key like Yubikey 5.

Roku hacks every user should know

20 Roku hacks every user should know By Nayomi Reghay, www.dailydot.com

For cord-cutters, there’s no better device to scratch your streaming itch than Roku. Offering a wide range of devices to meet the needs of users of all types, using Roku means you have access to the best TV streaming experience for your budget. But Roku is more than just a collection of the biggest streaming services on Earth, it’s also a highly customizable operating system with plenty of hidden tricks. Here are the best Roku hacks to get the most your of your Roku experience.  

Android Power User Features

The best Android power user features you may have forgotten about By Corbin Davenport, www.androidpolice.com

Android has now been around for over a decade, and every single update has brought new features. Some functionality is unknown to the vast majority of smartphone owners, either because the options aren't well-advertised, or because their uses are limited.

In this post, we've compiled some of the best power user features that Android has to offer.

Secret Powers of Chrome’s Address Bar

The Secret Powers of Chrome's Address Bar By Thorin Klosowski, lifehacker.com

Chrome's address bar doesn't do much at a glance. Type in a URL and you're taken to a web site. But it can do a lot more if you know how to use it.

We've covered plenty of great Chrome tricks over the years, but the address bar has always been a bit neglected. You can actually do a ton with it though, so let's dig into some of the better tricks.

Google app with a dark mode

Here’s every Google app with a dark mode, and how to enable it By Ben Schoon, 9to5google.com

For years now, the Android community has cried out for dark themes in applications and the system throughout, all while Google continued to slap more and more white themes basically everywhere. Slowly but surely, though, we’ve been seeing more Google dark mode apps on various platforms. Here’s every Google dark mode app available today.

– Major SMS security lapse is a reminder to use authenticator apps instead

Major SMS security lapse is a reminder to use authenticator apps instead By Jon Porter, www.theverge.com

A recent data breach has exposed a database of around 26 million text messages containing private customer information, reports TechCrunch. In addition to the privacy concerns, the breach also highlights the dangers of relying on SMS messages for receiving two-factor authentication codes or account reset links, which sees sensitive information sent over an unencrypted communications platform.

What is Google One and how does Google Drive work?

What is Google One and how does Google Drive work? By Maggie Tillman, www.pocket-lint.com

Google has reduced the cost of Google Drive and is promising to add some really neat features to the online storage service.

Drive has been around for years now but has changed relatively little since launch; it lets you upload files, create files, share files, etc. However, Google recently switched up the service's pricing plans, giving them their very own brand (Google One), and it's bundling some nice-to-haves like live expert support and subscriber perks. Here's what you need to know about Google Drive and Google One.

Google Brings Enhanced Network Features to Project Fi

Google Brings Enhanced Network Features to Project Fi By Paul Thurrott, www.thurrott.com

Google announced today that it is introducing enhanced networking functionality to its Project Fi wireless network. Among the changes are improvements to the Project Fi VPN and a faster, more seamless way to intelligently switch between Wi-Fi and cellular networks.

Android Pie’s lockdown mode

What you need to know about Android Pie’s lockdown mode By Contact, www.androidauthority.com

Hidden away amongst all the interface enhancements and feature additions in Android Pie is an all-new feature that has somewhat slipped under the radar for many users. Lockdown mode is a new security-focused addition that is going to be of particular use to anyone who is worried about protecting their private data in situations where their smartphone might not be in their possession.

How to Take Better Photos Out a Window

How to Take Better Photos Out a Window By Harry Guinness, www.howtogeek.com

Windows might seem clear when you look through them, but when you take a photo, you’ll notice that the glass has quite a significant effect on how things look. There’ll be reflections, flare, and all sorts of weird stuff going on that your brain mostly ignores—but your camera captures. Let’s look at how to take better photos out of windows.

Google gives the Pixel camera Night Vision

Google gives the Pixel camera superhuman night vision By Vlad Savov, www.theverge.com

Two years ago, Google’s release of the first Pixel smartphone radically raised the bar for the image quality we could expect from mobile cameras. Today, even as everyone else struggles to catch up, Google is extending its lead with the introduction of an equally revolutionary new camera. It’s called Night Sight, and it effectively lets your phone camera see in the dark. Only it doesn’t require any additional hardware or cost: Night Sight is a new camera mode for Pixel phones.

Privacy.com: Protect Your Bank Accounts

Privacy.com: Protect Your Bank Accounts By Justin, operational-security.com

It is no secret that I am a major fan of Blur, the privacy service that allows you to mask your email address and phone number. One of my favorite features of Blur is credit card masking – the ability to create one-time-use credit card numbers that are billed to your real credit card. A new service has come along that allows you to create one-time use credit card numbers. The service is a little bit different than Blur, and has some advantages and disadvantages. It is called Privacy.com.

Drive Cloning & Imaging

Drive Cloning & Imaging By Explainingcomputers, www.youtube.com  VIDEO

Links 

ExplainingComputers

Published on Nov 11, 2018

SSD and HDD cloning and imaging explained and demonstrated using Macrium Reflect 7 Free Edition. Note that all cloning and imaging software should be used with great care and is downloaded, installed and used at your own risk.

The Samsung 860 EVO 250GB SSD that I used in the video can be found on Amazon here (affiliate link): https://amzn.to/2Dh2UMK

The free cloning and imaging software that I refer to in the video is available from the following links. Please note that these links are provided in good faith and that I have no association with any of these organizations:

Macrium Reflect 7 Free Edition (as I use in the video): https://www.macrium.com/reflectfree

Samsung Cloning Software (for Samsung SSDs only): https://www.samsung.com/semiconductor… EaseUs ToDo Backup Free: https://www.easeus.com/backup-softwar… Clonezilla: http://www.clonezilla.org/ My “Laptop SSD Upgrade” video referred to in this video is here: https://www.youtube.com/watch?v=EVDTN…

– Why You Should Start Using Two-Factor Authentication Now

Why You Should Start Using Two-Factor Authentication Now By Cristina Chipurici, heimdalsecurity.com

Imagine waking up on a splendid spring day, opening your laptop and realising that you can’t access your online accounts anymore. Your email has been breached, your website, your most precious work, is now gone, and your credit card was used for shady transactions.

In a nutshell, this is what I experienced almost 6 years ago. 


Two-factor authentication is a mess By Garret Beard, Russell Brandom, www.theverge.com

For years, two-factor authentication has been the most important advice in personal cybersecurity — one that consumer tech companies were surprisingly slow to recognize. The movement seemed to coalesce in 2012, after journalist Mat Honan saw hackers compromise his Twitter, Amazon, and iCloud accounts, an incident he later detailed in Wired. At the time, few companies offered easy forms of two-factor, leaving limited options for users worried about a Honan-style hack. The result was a massive public campaign that demanded companies to adopt the feature, presenting two-factor as a simple, effective way to block account takeovers. 


Beyond Passwords: 2FA, U2F and Google Advanced Protection by www.troyhunt.com

Last week I wrote a couple of different pieces on passwords, firstly about why we're going to be stuck with them for a long time yet and then secondly, about how we all bear some responsibility for making good password choices. A few people took some of the points I made in those posts as being contentious, although on reflection I suspect it was more a case of lamenting that we shouldn't be in a position where we're still dependent on passwords and people needing to understand good password management practices in order for them to work properly. 


Two Factor Auth (2FA) List – List of websites and whether or not they support 2FA.

What is phishing?

What is phishing? How this cyber attack works and how to prevent it By Josh Fruhlinger, www.csoonline.com

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment.


Phishing Is the Internet’s Most Successful Con By Quinn Norton, www.theatlantic.com

In the classic 1973 heist movie The Sting, two con men—played by Robert Redford and Paul Newman—build a fictitious world in a Depression-era Chicago basement to defraud a corrupt banker. They make an offtrack-betting room, hire actors to ensure the scene is convincing, and even enlist pretend law enforcement to fake-bust their mark. The film is memorable because it is one of the finest movies in the genre, well written and funny, but also because the duo’s work is so meticulously detailed.

SIM Swappers and SIM Swap Myths

Busting SIM Swappers and SIM Swap Myths by krebsonsecurity.com

KrebsOnSecurity recently had a chance to interview members of the REACT Task Force, a team of law enforcement officers and prosecutors based in Santa Clara, Calif. that has been tracking down individuals engaged in unauthorized “SIM swaps” — a complex form of mobile phone fraud that is often used to steal large amounts of cryptocurrencies and other items of value from victims. 

– How to spot a phishing email

How to spot a phishing email By Andrew Burton, www.carbonite.com

Phishing and other social engineering attacks are only increasing in frequency, and unfortunately, sophistication. However, there are a number of common indicators of a phishing attack. Knowing what to look for goes a long way to protect yourself against attacks. If you spot any of the following tip-offs, proceed with caution.

Secure Your Accounts and Passwords With a Hardware Token

Secure Your Accounts and Passwords With a Hardware Token By David Murphy, lifehacker.com

Two-factor authentication is a quick, easy way to add extra security to your accounts (or password managers). For even more security and peace of mind, consider buying a hardware token like the YubiKey or Google Titan. They’re incredibly easy to set up, and as long as you keep the USB accessory on or near you—on your keyring, for example—you’ll be able to authenticate into supported accounts and services as quickly as typing in a password. And since nobody else will have your hardware authenticator, your accounts will be protected from other attackers.

-Common Types of Two-Factor Authentication

A Guide to Common Types of Two-Factor Authentication on the Web By Jacob Hoffman-andrews, www.eff.org

Two-factor authentication (or 2FA) is one of the biggest-bang-for-your-buck ways to improve the security of your online accounts. Luckily, it's becoming much more common across the web. With often just a few clicks in a given account's settings, 2FA adds an extra layer of security to your online accounts on top of your password.


The Different Forms of Two-Factor Authentication: SMS, Autheticator Apps, and More By Chris Hoffman, www.howtogeek.com

Many online services offer two-factor authentication, which enhances security by requiring more than just your password to sign in. There are many different types of additional authentication methods you can use.

Two-Factor Authentication: Who Has It and How to Set It Up

Two-Factor Authentication: Who Has It and How to Set It Up By Eric Griffith, www.pcmag.com

In 2014, the Heartbleed exploit left everyone's login information potentially up for grabs thanks to one itty-bitty piece of code, and in the past few years, our security nightmares have only gotten worse. In fact, more data was leaked in the first half of 2017 than in all of 2016 combined.

Back Up All of the Photos From All Apps

How to Back Up All of the Photos From All of Your Apps By David Nield, gizmodo.com

Your photos and videos are likely to be some of the most precious files you have on your smartphone. Even if you’ve got new photos and videos taken with the camera synced to the cloud though, what about the pictures your family send you over WhatsApp? Or the Instagram Stories you post? Here’s how to make sure every photo and video on your devices is getting backed up.

Use Your Password Manager for Security Answers, Too

Use Your Password Manager for Security Answers, Too By David Murphy, lifehacker.com

It’s been a while since I’ve had to type in some stupid answer to a made-up question when creating an account on a new service. You know what I’m talking about: Forget your password, and you can regain access to your account by typing in the name of your first pet (Mr. Mrglglrm), your favorite sports team (Saskatoon Sirens), or the street you grew up on (Third Street).

Tech News by Topic