An annual review by PC World: “Best antivirus: Keep your Windows PC safe from spyware, Trojans, malware, and more” (updated August 27, 2018): Antivirus software is nearly as crucial as a PC’s operating system. Even if you’re well aware of potential threats and practice extreme caution, some threats just can’t be prevented without the extra… Continue reading Best PC anti-virus program?
Author: site admin
Charging your smartphone battery — best practices
I’ve followed this topic for years: When and how often to charge your smartphone’s battery. What to do and not — in order to prolong the usable life of that battery (and so not worry about replacing the battery before you’re ready to get a new smartphone, eh). For many of us, charging the battery… Continue reading Charging your smartphone battery — best practices
Mute web page videos — Apple Safari Auto-Play settings
Safari > Preferences > Websites > Auto-Play and audio for web site videos The other day a client thought that her built-in (internal) Apple computer’s speakers weren’t working. Well, more specifically, on her favorite news site, posted videos were playing without sound — muted. Her iMac recently had been upgraded to the latest macOS version.… Continue reading Mute web page videos — Apple Safari Auto-Play settings
GDPR privacy notifications — primrose path of default settings
I’ve been getting a lot of privacy policy update notifications in my email since last month. As part of terms and conditions for use of a product or service. All in response to the GDPR — General Data Protection Regulation, a European Union Regulation which was implemented on May 25, 2018. Many companies sell products and… Continue reading GDPR privacy notifications — primrose path of default settings
Phishing attacks — fake “Apple” emails
I’ve noticed these types of scams for awhile: email messages (supposedly) from Apple purportedly about a payment or Apple ID or login from another device (which in fact you may not own). More and more email apps (especially on mobile devices) do not permit examination of the raw message text, which often permits detection of… Continue reading Phishing attacks — fake “Apple” emails