Blog

Blog category description

Just a Password?

Just a Password?

Here’s a little ditty about login and authenticate.

Read More

Stop Passing the Hoax and Check Your Privacy

Stop Passing the Hoax and Check Your Privacy

Stop Passing the Hoax and Check Your Privacy Recycling can be good but not if it’s a hoax. Every couple of years we see an old hoax come back, updated as needed, and people continue to believe it and share it on their social media sites. I’ve seen several posts on my Facebook Timeline from others “warning” friends that Facebook will make ALL you posts public even deleted...

Read More

Abandoned Devices

Abandoned Devices

We’ve been clearing out some old hardware and came across an iPhone 4 CDMA (Verizon). It was dropped off a year or more ago by a customer for a screen repair, but they never followed up. It is locked to an iTunes account that shows to be j*****@yahoo.com. If this is your iPhone or yours was lost or stolen please contact me. You will need to prove ownership by activating via your iCloud...

Read More

Recalling the Galaxy

Recalling the Galaxy

Bad news for Galaxy 7 owners, worse for Samsung. Just announced, over 2.5 million Galaxy Note 7 phones have been recalled. As of yet, Samsung has not released the recall process for its customers.

Read More

Apple Keynote 2016

Apple Keynote 2016

September 7 at 12 p.m. CT Watch the event onĀ apple.com/live. RT for a reminder on event day....

Read More

Tuesday Tip – Ransomware

Tuesday Tip – Ransomware

Tuesday Tip – Ransomware Today’s tip deals with one of the most devious and current computer threats – ransomware. By definition it’s “a type of malicious software designed to block access to a computer system until a sum of money is paid.” The majority of these attacks go after small to medium sized business, ones that most likely have inadequate security...

Read More