Last week I wrote a post about Internet privacy. Basically I covered how the repeal of the Internet privacy act was simply allowing your ISP to continue to collect information regarding your Internet usage. The law was never enacted so its still business as usual for the service providers. I had suggested the use of a VPN to help protect you from prying eyes.
Previous Post: Internet Privacy Should I Care?
Today I am going to give you one more weapon to protect your surfing life style. You may have heard the term “Dark Web” or “Deep Web” on TV. Silly prime time network dramas make it sound like a hang out for hacker gangs and hit men for higher but for the most part its not. The Tor project as it is officially know is your answer to Internet privacy.
What exactly is the Tor project?
Continue reading “Shining light on the Deep Dark Web! How Tor can keep your online identity private.”
I remember joining the school news paper publication and was introduced to the Macintosh and MacOS for the first time. Up until that point I had used my Commodore 64 and IBM Compatible 386 for all my computing and gaming needs. To a teenager that loved computers the whole 90’s era felt like the Wild West.
Back to the future with emulation:
The Internet Archive has been around quite a long time with their Wayback Machine. This Internet marvel has been saving copies of web pages to be archived for all time. Who knows maybe some day this blog will be archived for future generations to enjoy.
One thing I didn’t realize was they were also archiving entire operating systems that could be launched and run in a browser.I found this beauty while rummaging through the archive the other day. Its a fully operational MacOS_7.0.1
Continue reading “Take a trip down memory lane with the Internet Archive and a working MacOS System 7.0.1”
My blog has mainly focused on computers, networking, electronics and an occasional “How To” small project. Today we are going to work on something a bit larger. Every Spring I dismantle my outside central air conditioner condenser units and give the condenser coils a good cleaning. This will help keep the unit running as efficient as possible keeping my house ice cold during the summer months. Also reducing wear and tear on the unit as well as lower my electrical cost too.
Tools you can use:
I completed the entire job with just a few basic tools.
A can of coil cleaner Nu-Calgon 4171-75 $14.12 at Amazon
I used this specific coil cleaner on my units and it works as designed. The thick foam lifted the dirt and grime for easy removal. The label said its a “self-rinsing” formula using the coils own condensation to wash away the dirt. I still used my hose to wash away the grime. One can was NOT enough for my 2 units.
A good cordless drill similar to this one from DeWalt
Any cordless drill with a decent amount of torque will do just fine.
Magnetic socket nut driver, I used a 5/16″ driver like this
The screws on my unit had a 5/16″ head and using the cordless drill saved me a ton of time. You can use a hand driver or a flat edge regular screwdriver as well. The screws on your unit may vary so take a look before you buy any new tools.
Time to get started Continue reading “Weekend Project – Clean You Central Air Conditioner Condenser Coils”
There is no simple answer to the Internet privacy solution, but lately the news media has been kicking up a storm regarding the repeal of the Obama era privacy laws.
Lets take a look at what is going on in the realm of Internet privacy and I will give you some good options to protect yourself if you deem it necessary.
How many people did you say?
You are just 1 of 3,200,000,000. Yes you read that correctly there are over 3.2 billion people on the Internet across the entire world. You are just one bit in the world of terabytes upon terabytes of people. Does any one marketer care about you specifically, not exactly. Most of the time your ISP and other Internet companies are compiling data in batches to analyze trends. Maybe count the number of Netflix subscribers, or the number of YouTube videos watched. However more recently we have been seeing increasingly targeted campaigns at specific groups users. Is this a breach of your privacy?
Was the Obama law repealed?
Yes and no. The new FCC rules would have given consumers greater control over what their internet service provider can do with their data by requiring them to get permission from customers before using their information to create targeted advertisements. However, the rules were never in effect. So basically we repealed a law that never happened anyway. Its business as usual. The controversy of the law stems from different standards for the ISP (like Verizon, Comcast, Cox, Spectrum etc) and other websites like Google and Facebook. In other words the law would force the Verizon and others to obtain consumer permissions to track and sites like Google would not need consent giving them an unfair advantage. Continue reading “Internet Privacy – Should you care? Is VPN the answer?”
The iPhone will be celebrating its 10th birthday in June. Awe double digits already! It feels like only yesterday we were looking at the world through your 2.0 megapixel camera and gazing at your 320×480 display. If we were lucky an upgrade from the standard 4GB model to a mind blowing 16GB.
All joking aside, in my opinion the iPhone is one of the most revolutionary devices in modern times. The amount of computing power in such a small device would have been incomprehensible just a few decades ago. Just think about it, roughly two-thirds of Americans are walking around with access to all the knowledge of the entire human race in their pockets.
What does Apple have in store for its 10th anniversary?
According to Bloomberg, Apple is preparing three phones for launch this fall, two will be the upgraded models of the current generation. (I would guess 7s & 7s Plus??) However the third is going to be something special, a so called best of the best iPhone and of course it will come with an alleged higher price point.
Whats so special about the new phone?
According to Bloomberg’s sources, the new phone will be stainless-steel and will be about the same size of the current iPhone 7. However a new curved glass screen will have a minimal 4mm bezel and be almost as large as the 7 Plus.
If you can trust the tech drawing to the left it would appear that the front camera, sensors and ear piece are under the display. Also the home button /finger print scanner is hidden as well..
- Front-facing Touch ID beneath the display.
- 4mm bezels around the entire edge of the device.
- 2.5D contoured glass on the front and back of the device surrounded by a metal frame.
- Wireless charging.
- Same dimensions as the iPhone 7.
- 5.8″ OLED display.
- “Invisible” front-facing camera hidden underneath the display.
- Large power button featuring two points of contact.
- New camera options including a dual camera system and different placements.
What can we actually expect?
We can most likely expect more of the usual from Apple, they will announce issues implementing the new features and supply delays with the new phones at launch. We will see a small group of die hard Apple fans waiting online to be the first with an iPhone 8 “10th Anniversary Edition” and the rest of us will just wait until they are back in stock. Don’t forget this iPhone will have the fastest processor yet with iOS 11.
Personally I hope Apple releases a “cool” new device, it doesn’t have to be revolutionary like the original iPhone, but I do hope there is some new technology that will at least make the iPhone fun again.
Thanks for reading my blog
Recently a colleague at my day job fell for a scam email that appeared to be from PayPal. She clicked and entered all the info they requested and at the very end realized she had been taken for a ride. This post will cover some of the things you can look for to help identify a scam “phishing email” .Many of you are able to identify a phishing email in seconds, but if I can help one person identify a scam its worth the effort to write this post.
1. English as a second language
A good portion of attacks originate in non-English speaking countries. The hackers generate a phishing email that may be grammatically correct in their language, however when translated using google translate some of the message is lost in translation.
Continue reading “6 Simple tips to AVOID email phishing scams!”
This credit card sized multi tool will surely satisfy your inner MacGyver and can really come in handy.
- Serrated Knife
- Bottle Opener
- Slotted Screwdrivers
- Compass & Magnifier
- Tweezers, Toothpick, Ruler
- Wrench and more!
Perfect gift for Fathers Day, or any occasion.
ONLY $10 AT AMAZON. Over 70% off!
We are bombarded with Internet advertisements all day long. They have become such a part of the landscape most of us don’t even notice them anymore, let alone click on them. Marketers have become ever more clever to get noticed on both our desktops and mobile devices. This is when the advertisements become obnoxious! Pop-ups, video ads with auto-play, even adds on our mobile devices that are ridiculously intrusive and hide the “X” to exit.
Enough is enough already!
This is where Pi Hole fits in! What is a Pi Hole you say? Think of the Pi Hole as an open source advertisement blocking network appliance for your entire home. The developers of the Pi Hole software found an easy way to block most advertisements from displaying on all your devices. When you boil it down the Pi Hole is simply a DNS black list joined with the inexpensive Raspberry Pi computer. Continue reading “Turn On Your “Pi Hole” and say hello ad blocking on all your devices!”
To turn back the hands of time, its something we all wished we could do at some point in our lives. Well this project won’t help you punch a hole in the space-time continuum, but it will help you make a cool desk or wall clock that has a counterclockwise movement.
We begin with the Q80 clock movement from Quartex they are readily available on the internet and I have a good stock of them if you would like to purchase one. (just email me at firstname.lastname@example.org)
STEP 1 – Remove the back cover
- To begin we need to remove the back cover of the movement. There are two plastic latching clips on each side of the movement. To remove the cover insert a flat small screwdriver, or pocket knife and gently pry the clip up slightly. Then wiggle the back cover off. Repeat this procedure on the other side. At this point the back cover should slide off easily. Don’t worry about any of the internal components as they are all self contained within a clear plastic case. However do note the battery terminals can fall out. They are easy to reinsert so just put them on the side for now.
Continue reading “Want To Turn Back Time? How To Make A Clock Tick In Reverse! (Counterclockwise)”
I have enjoyed the convenience of simply placing my thumb or index finger on my iPhone’s finger print scanner and having the phone quickly unlock. Apple has convinced me and many of you that the fingerprint scanners are secure and almost impossible to hack.
Well the honeymoon is over folks. According to a new study published in the journal IEEE Transactions on Information Forensics & Security researchers from Michigan State and NYU have created what they dub a “Master Fingerprint”. This new finger print composite was made by compiling patterns found in real fingerprints and is said to be able to unlock about 65% of phones. Continue reading “I guess its back to passwords for our smart phones!”