The Digiland DL718M tablet is an inexpensive (sub-$40) tablet sold at consumer electronics stores like Best Buy. Make no mistake, it’s a basic tablet for basic needs. But given reasonable expectations you can buy one of these and be happy with it.
This isn’t a new market by any stretch. But it seems like tablets in this price range are usually Black Friday specials, or only available on online marketplaces far abroad. The Digiland DL718M is one you can get today if you want.
Continue reading Digiland DL718M tablet: a review
Most buying guides for monitors assume you’re buying a really expensive monitor for gaming. But there’s a lot more to look for than refresh rate and response time.
A good monitor can last 10 years and multiple computers, so it pays to make a good decision when buying one, even when you’re not spending $500. There can be a significant difference even between two $100 models, or between a $60 model and a $70 model, that will save you money in the long run.
Continue reading What to look for in a monitor
Last week at work, I noticed some odd events in an event log, and when I investigated them, I found they were part of a failed ransomware attack. This got me thinking about how to prevent ransomware at home.
Ransomware, if you aren’t familiar, is an attack that encrypts your data and demands a ransom, usually around $300, in bitcoins, and you get a short deadline until it destroys your files. More often than not, paying the ransom is the only way to get the files back, so it’s much better to prevent it.
Continue reading Simple tips to prevent ransomware
If you regularly visit forums online, particularly forums powered by the forum software Vbulletin, you ought to change your forum passwords right now. The longer and more random you make them, the better.
Continue reading Why to change forum passwords right now
As a landlord, I’ve dealt with some difficult tenants, and I’ve noticed they all tend to use very similar tactics. Setting boundaries is a necessity to keep things under control, and in the end keep all of your tenants happy while keeping yourself sane.
Continue reading Setting boundaries with difficult tenants
I got e-mail the other day from Turbotax saying someone had filed my taxes for me. Obviously a cause for concern, right? Here’s how I determined the message was fake in about three minutes.
Some people will tell you not to even open a message like this, but if you’re a computer professional, at some point someone is going to want you to prove the message was fake. I think this is something every e-mail administrator, desktop support professional, security professional, and frankly, every helpdesk professional ought to be able to do.
So here’s how you can get the proof. And generally speaking, Outlook 2010’s default configuration is paranoid enough that this procedure will be safe to do. If you want an extra layer of protection, make sure you have EMET installed and protecting Outlook.
Continue reading Spot phishing e-mails with Outlook 2010
If you have a side business, you need to offer customer service, but it’s also perfectly reasonable to not want your phone to ring at 3 a.m. You can fix that if you set up office hours in Google Voice.
Fortunately it’s easy to set up Google Voice to allow your phone to ring during office hours and go straight to voice mail after hours. And the nice thing is, Google Voice transcribes your messages. This makes it very easy to filter out people who are calling you trying to solicit your services at 25 cents on the dollar. I can’t say for certain that people are more likely to do that at off hours. But it’s certainly more annoying to get awakened at 3 a.m. by someone wanting to lowball you. And yes, I speak from experience.
Here’s how you do it if you don’t want to be disturbed at unreasonable hours.
Continue reading How I set up office hours in Google Voice
The other day, this showed up in my e-mail:
A file change was detected on your system for site URL http://dfarq.homeip.net. Scan was generated on Tuesday, November 3rd, 2015 at 5:25 am
A summary of the scan results is shown below:
The following files were removed from your host:
/var/www/wordpress/wp-content/cache/supercache/dfarq.homeip.net/wordpress/index.html (modified on: 2015-11-03 03:23:52)
The following files were changed on your host:
/var/www/wp-content/themes/twentyfourteen/functions.php (modified on: 2015-08-19 22:24:04)
/var/www/wp-content/themes/twentyfourteen/header.php (modified on: 2015-08-19 22:24:04)
Login to your site to view the scan details.
I didn’t make those changes. Fortunately fixing it when changes appear in functions.php and header.php that you didn’t make is pretty easy.
Continue reading I got hacked. I did it to teach you a lesson, and I’m sure you believe it.
Over at CSO Online, there’s a nice war story about tracking down and resetting 300 passwords.
I could pick nits at a few of his details, but that’s annoying and counterproductive. His overall advice is very good–manage your passwords, set them to something random, keep in mind that some sites just won’t allow for a very strong password so do the best you can, and protect your main e-mail password and your password management system password with all the diligence you can muster.
Continue reading Password management advice from CSO Online
After a large company that has your data gets breached, the standard next step is to give you credit monitoring.
It’s not enough to protect yourself, but you can make it enough. Continue reading What to do after you get breached and sign up for the free credit monitoring