If you’re standing at a checkout and the chip won’t work on your credit card, don’t give up right away. Here’s what to do when you swipe but can’t complete your purchase because of a debit or credit card chip not working.
Your options include swiping, then inserting the chip and repeating three times. Some merchants allow this. Another option is cleaning the chip on the spot, which you can do by rubbing the chip with a dollar bill. If the chip is just dirty, which is the most common problem, this will usually clean it enough that it will work, even if it gets you funny looks.
Chips are a new security feature, but it’s hard to appreciate them when a broken chip keeps you from completing your purchase. It happened to a longtime friend, and another friend of his provided a solution. I had to share it, because I know it will happen to others.
USB flash drives are pretty much a necessity these days. They’re far more convenient for moving files around than optical discs, and they make good backup devices. But not all USB flash drives are created equal. Here’s what to look for in a USB flash drive.
Here’s a tip: I don’t just use USB flash drives for transporting data and backups. I like to keep a modest-sized USB flash drive plugged into my router, turning it into a small NAS. It gives me a convenient, reliable place to back up data from any of my computers.
The Linksys EA6200 is hard to open or disassemble. But there’s a trick. This trick looks like it will work with other 6000-series routers as well, such as the EA6300, EA6350, and EA6400. Here’s how to disassemble a Linksys EA6200 router.
“Does HTTPS matter?” a friend of a friend asked. “I heard it does. Is that still true?” Yes, yes, and yes. Here’s why.
HTTP connections are unencrypted. HTTPS connections are encrypted. You can tell when you’re using HTTPS because the URLs start with https:// instead of http://, and your location bar will have a lock in it. Encryption is good.
“Daniel” from “Microsoft” called me the other day. The number looked halfway legit so I picked up. He out and out claimed to be from Microsoft and said he was getting alerts from my computer. His voice sounded familiar–I think I’d talked to him before.
Someone I know got a tech support scam popup that said their computer was being hacked. I said to bring the computer over. I wanted to see it.
I found the malicious site in the browser history–I’ll tell you how to do that after I finish my story–and pulled the page back up. The computer played an MP3 file with a scary-sounding message and urged me to call an 888 number. So I called. I got voicemail. I left a message.