Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

You are the problem

And you don’t care.

My ‘Must Read of the Month’.

Lotta words to read here. But it’s important you know – and think.

* Your forgotten IoT gadgets will leave a disastrous, toxic legacy

With IoT devices increasingly a part of the real, physical world, something needs to be done to avoid disaster in the event of a cyberattack against connected systems.Read more..

* * *

Today’s quote:

Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

 

October 13, 2017 Posted by | advice, computers, consumer electronics, cyber crime, Cyberwarfare, hackers, Internet, Internet of Things, News, security, tech | Leave a comment

Nah. This isn’t creepy..

* How Google wants to build a world where every device is listening

The firm is gathering speech samples from people across the globe, as part of a push to get simple voice recognition everywhere, paving the way for voice commands throughout our homes.Read more..

Tell ‘ya what. I’ll gladly touch a screen/mouse/keyboard and Veto your developing this further. How’s that?

Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

September 19, 2017 Posted by | computers, consumer electronics, Google, Internet scam, News, privacy, tech | Leave a comment

More on Layer 8

“Layer 8” is a snarky, insider reference to you, the ‘End User’. (Also referred to as “pebcak” and “ID:10t” [ as in, “we have another ten-tee error”. ])

* 100% of government IT workers said employees are biggest threat to cybersecurity

“Only 14% of government organizations consider themselves to be well-protected against cyber threats, according to a report from Netwrix. Here’s why.Read more..

And I wager those 14% aren’t as well-protected as they think they are..
And this is why you don’t want gov’t agencies making ‘databases’.

Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

August 24, 2017 Posted by | computers, consumer electronics, cyber crime, hackers, Internet, News, privacy, security | Leave a comment

14 Tips to be safer on Public Wi-Fi (‘hotspots’)

A couple reading reco’s for mobile Internet users.

* 14 Public Wi-Fi Hotspot Security Tips You Need

Sometimes you need it so bad, you don’t care if it is clean or dirty. You don’t care who has been there before or what viruses they’ve left behind. I speak, of course, of public Wi-Fi hotspots, aka honeypots for weak-willed souls desperate for a sense of connection. Look, it’s okay to connect to strange networks. Just use protection, cover your tracks, and follow PCMag’s 14 Tips for Public Hotspot Security. Be safe out there.” Read more..

I disagree with what the author wrote there a bit.. it’s really not ‘okay’ to use public wi-fi.. (that’s why I put ‘safer’ where the Industry puts ‘safe’) but I know you’re going to. One of the main reasons is “53 percent can’t tell a secure network from an insecure one.”
That’s so shockingly stupid clueless in 2017 .. do we need to remove these devices from the hands of the masses?

* * *

Today’s quote:A paranoid is someone who knows a little of what’s going on.” ~ William S. Burroughs

Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

August 17, 2017 Posted by | advice, cellular, computers, consumer electronics, how to, Internet, mobile, privacy, security | , , , , , , , | Leave a comment

Told ya

less than a week, and down 100 page views a day avg.

Teach me to say negative things, or point at idiocy, eh?

July 2, 2017 Posted by | computers | 4 Comments

Start over

This is not “news”, but this ‘news article’ is why I’ve been saying –> scrap it ALL. Start over.

This time with security/privacy in mind.

To understand this, you need to know that “vulnerabilities” means “insecure computer code”. You need to note the idea “being found” and think “tip of the iceberg”, and you have to understand that NONE of the ‘computer languages’ are even designed to be secure. Were a ‘Programmer’ to try to write a hacker-proof ‘app’, they couldn’t because the Language, and the “libraries’ it uses are weak. Anywho.. bringing you this stuff is killing my ratings, but here’s the evidence .. um, article:

* ‘Unrelenting’ rise in vulnerabilities, Risk Based Security reports

We are on track for another record-breaking year in the pace of vulnerability disclosures, said a new report from Risk Based Security.Read more..

*     *     *

Today’s quote:No matter what people tell you, words and ideas can change the world.” ~ Robin Williams

Copyright 2007-2017 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

May 30, 2017 Posted by | computers, consumer electronics, cyber crime, hackers, Internet, News, privacy, security, software, tech | 5 Comments