Essential Tips for Keeping Your Passwords Safe With LastPass

Most people have many different logins for many different sites. The problem is managing all the user IDs and passwords, at least keeping track of them in a secure manner. For me, I store all my login information in LastPass. While it can be difficult to trust a service that stores my login information on the cloud, I understand how LastPass keeps my data safe, so I’m not worried about security. As with most things about security – you can never be too careful.

Continue Reading

Actiontec 500Mbps Powerline Network Adapter Kit (PWR511K01) Review

If you are like me and have weak spots in your wireless network coverage, there are a few options that you can try to increase your network coverage. The first is to add repeaters or signal boosters in various locations in your home to increase your wireless coverage. Second, you can run Ethernet cables throughout your house. The third is to use powerline adapters to send network data through your house over your home’s electrical wires.

Continue Reading

How to Secure the Linksys EA2700 (N600) Wireless Router

When you buy a wireless router – any wireless router – you must ensure you take the time to properly secure the router and your wireless network. If you don’t secure both the wireless router and the network, you allow unauthorized users into either your router, your network, and possible any device attached to your wireless network. While securing the Linksys EA2700 wireless router may sound complex, there are only a few setting changes that you need to modify to secure both your router and network.

Continue Reading

The Most Effective Tactic to Mitigate 92% of Microsoft Vulnerabilities

Any software product that is installed on a computer can have vulnerabilities. When it comes to such vulnerabilities, Microsoft products are usually some of the most popular to have their vulnerabilities published. The number of Microsoft products in use have a lot to do with such publicity. A report recently released by Avecto has shed some light on Microsoft product vulnerabilities, and how a simple change in the way we access our computers can mitigate 92% of all vulnerabilities released in 2013. The change is one that I have advocated everyone make when running Windows 7 and above, and this report shows the difference the change can make

Continue Reading

Is Owning an iPhone 5 at All Costs Really Worth It? [Infographic]

Not so long ago, the iPhone 5 was released by Apple amid much fanfare. As well as pleasing existing iPhone users, it also ticked quite a few boxes for those considering a change from rival Android smartphones in terms of ease of use, looks and features. However, as you might expect, it costs a small fortune to buy and own on a monthly contract, putting some sensible smartphone users off.

Continue Reading

You Won’t Believe How Long Your Computer Will Last

With Microsoft’s support ending for Windows XP, many people are looking to move to one of the newer versions of Widnows – either Windows 7 (my preferred version), or Windows 8. I have been recently looking at helping someone upgrade a Windows XP system to a newer version of Windows, and have run into a bit of a snag. The desktop is old, and isn’t compatible with Windows 8. Windows 8 requires the processor to have the NX (No-eXecute) bit technology, and the processor in the desktop doesn’t have this technology.

Continue Reading