Password Nightmares

Good Morning Mr. Sampson. Please type in you Personal Identification Number

XXXXXX

Sorry, Mr. Forgetful Idiot! That is not the correct password. Please slap yourself three times around your head and then apply for a new card and number ? we are keeping this one.

Don't you just hate them? Passwords give you access to almost every walk of life. They are now the keys to doors that would otherwise violently slam in your face and tell you to XXXXXX, which they often do if you key the wrong password in anyway.

The first passwords to really come on the scene (apart from those required to gain entry into the back room of the Mafia club) where those at the ATM machines. A four-digit PIN number has to be entered before money can be withdrawn and for those with one account and a pass number drawn from an important date, no problem existed.

Then your one account became two as the building societies introduced ATM machines, then your savings account at the post office and then to beat it all Internet Banking came on the scene. Passwords are now required for Banking, shopping on the web, switch cards, visa cards, store cards, petrol cards and any other card that you may have.

Passwords are also required for so many of activities one does these days ? especially on the Internet. Get a web site and you have real problems! I have an email account with yahoo, one with AOL and others with a dozen other companies (they were all free at the time) and then I have a web site (well three in fact) and they all require passwords. And then the problems really start when you try marketing and joining discussion groups on the web, etc. Wow, each one requires a USERNAME, each one requires a password and many of them also ask you to have a 'handle' ? a name to be recognized by others. Not your real name of course!

I have at the last count 362 different and current usernames, 463 different and current pass codes or passwords and 152 different and often forgotten handles.

Shocked? I am when I put it like that. I have actually filled my brain up with a whole useless pile of words and junk that could otherwise be used to remember all the telephone numbers in my local directory or better still to learn Japanese.

We need these passwords and codes and things. Without them doors are shut and we become isolated from the world around us. So we have them and need them and the first codes are easy as we pull out of the hat some remembered birthday or event and use that with success.

But then companies and "bad people" started to find these codes by researching your past and then gaining access to your life. So we were all warned not to use a date from our past and instead pick a number or word that had no meaning but one that we would remember. A word that we can remember but one that has no significance is almost impossible ? why do they say these things? We get past all of that and force our brains to remember some unimportant word and to regurgitate it when required, like at the ATM machine or when checking your email account. That is all fine and well, when only one or two codes are required to be remembered.

Oh, and one must not forget that warnings came out from all corners of security that using the same password for more than one service could cause extreme problems and a heyday for the opportunist who is looking for fools.

Those with a few more (like me) do have serious problems in life. I can maybe remember them all and regurgitate them when required ? a no easy feat ? but I can never get the correct code for the required service. I stand at the ATM and punch in my pin code, it tells me to go away and if I put the wrong code in again it will eat my card up. I then realize that the code that I am punching into the pad is actually that for my gym club after hours access! So what is my number for this bank and this account? Which number could it be out of a possible 463 and even then have I got it right the right way round?

Life does get complicated. Some people started to write their numbers down, knowing that they would forget them in time. "Well, for heavens sake I only use that pass code once a year ? how am I supposed to remember it" can be heard ringing out all over the world. So gentlemen, ladies and others all opt to secretly write their codes in some weird and wonderful place that they think others will never find. Codes are pasted under ornaments, on the walls behind beds and on little scraps of paper all over the house and in drawers and closets and boxes in every conceivable place. Codes and passwords written down can be found everywhere one would look.

Some people then acknowledged the fact that, thieves and robbers (and friends and family) can find these numbers and use them with the cards that they have appropriated. They can probably find them easier than you can when one day you need to use that password yourself. They find them easily whilst you would have completely forgotten where you had hidden or written down the access code. Yes, writing the passwords down on pieces of paper and hiding them in what you thought was a suitable place is no longer acceptable. So what is the options?

Ah, why not encode the code in a series of other codes using a system that only you know how to decode. A great idea!

Around the world at any one moment in time there are hundreds of thousands of people scratching their heads over a pile of numbers and letters. Thousands of amateur coders having failed in their missions and are unable to decode the code that they had intricately designed all that time ago. The code of codes that was the answer to all robbers and others from finding out what your passwords are is now a mystery to you. Yes, take it from me that 99% of those that hide their passwords in a longer text of letters or numbers fail in their attempt to decode them one month later.

So where are we? We have hundreds of passwords to remember, they cannot be drawn from significant dates or events, we cannot use the same ones for more than one service, we cannot write them down and encoding them is just a waste of time. Ouch, not much choice in life. It looks as if we are all condemned to having a section of our brains filled with a succession of numbers and words that must be instantly available upon request.

For those with computers a solution became possible with the advent of the "password program". A clever piece of software that could remember all of those nasty passwords and usernames: to regurgitate them upon request. But then of course hackers and those unseen computer information thieves found ways to gain access to your computer through the telephone line, enter that marvelous piece of software and to rapidly use all of those codes that you had hidden away in the internals. And you, unawares of this entry into your private domain, find your emails have all been read by some unknown, that your bank account shows that you have fully utilized the 5000 pound overdraft and that you now owe Visa and American Express some amazing amount of hard currency that you do not have ? and never will. Oh, and do not think for a minute that your store cards are free of purchases or that your partner is not going to find out about the secret email accounts you have setup!

In short, this piece of software is no longer a viable solution for those with something to lose. It is not suitable for anyone ? in other words!

So what can we do? Remember them is all that you can do. Try and remember all of those passwords and numbers and codes in some sort of system in your heads. Life though is not that easy as certain recommendations have been coming out for us to enhance our own security further as nowadays hackers can now enter your computer and read off the pass codes as you tap them in. So even if you follow all of the security advice that is issued your accounts and your life can still be invaded easily and without second thought.

The answer? Well, all you have to do is make sure that you change all your codes at least once a month.

Impossible you say? Well, I must admit the thought of having just committed to memory over 600 passwords, numbers and codes and then having to throw them all out and input new ones every month is not my idea of fun. Impossible in fact!

Two thoughts to leave you with. Most people who use others passwords and codes to gain access to their accounts have in fact been given to them. The majority of theft from ATM machines and banks is through friends giving their supposed friends the number of their account in a loose moment. It is not as one would assume from people who have stolen the number from the hidden pocket in your wallet or the hacker through the telephone cable. These occur but not to such a great extent as those who give their passwords to others in a moment of stupidity.

Thinking about it, finger print identity is not such a bad thing after all. Would make life one hell of a lot easier! Just put your thumb on a little touch pad and you gain instant access to everything. And you only require one of them, you have no need to remember where you put it, if somebody steals it you will notice immediately and there is no need to change it every month.

Move on technology as at present my head is filled to busting with useless information!

About The Author

Author and Webmaster of Seamania. As a Chief Engineer in the Merchant Navy he has sailed the world for fifteen years. Now living in Taiwan he writes about cultures across the globe and life as he sees it.

In The News:

Sliding Backward on Tech? There Are Benefits  The New York TimesPamela Paul, editor of The New York Times Book Review, decided to downgrade her tech two years ago. It has worked out, with paper and DVDs instead of the ...
First genderless voice, "Q", created for personal tech assistants  FOX 13 News, Tampa BayVIRTUE Nordics is the team behind "Q", the first genderless voice assistant. With the launch of "Q", VIRTUE and Copenhagen Pride hope that consumers and ...
California's politicians rush to gut internet privacy law with pro-tech giant amendments  The RegisterAnalysis The right for Californians to control the private data that tech companies hold on them may be undermined today at a critical committee hearing in ...
How tech founders are trying to disrupt — and replicate — the Giving Pledge  RecodeThe Giving Pledge is the brainchild of some of the most prominent elders of Silicon Valley — people like Bill Gates, Pierre Omidyar, and Larry Ellison — who ...
Lifting Journalism by Knowing What Readers Are Looking For  The New York TimesClaudio E. Cabrera, who specializes in search engine optimization, describes how he keeps track of what's hot in search and how that informs coverage — and ...
WhatsApp Could Block Screenshots of Personal Chats, Which Renders Your Gossip Sessions Incomplete  News18The screenshot-blocking feature would be made available to users whenever WhatsApp plans to release the 'Authentication' feature, which is currently under ...
The Must-Have When Reporting on Disasters: A Satellite Phone  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Thomas Fuller, a national correspondent based in San Francisco, ...
Apple CEO Tim Cook: Europe is leading the U.S. when it comes to tech regulation  CNBCApple CEO Tim Cook said that the tech industry very much needs to be regulated but he's "not confident" in U.S. lawmakers to do it right.
Beware: Tech companies know everything about you right from income level to relationship status  National HeraldYou personal life - be it shopping, movie streaming, in-app experiences, long drives or late-night dinners - everything is being tracked, analysed and packaged ...
7 skin and personal care products that have gone high-tech  KnowTechieIn the world of beauty, cosmetics, and personal care, technology is either playing a role in the background or used as an innovative tool in skin care.
ImagineBC Gives You Control of Your Personal Information; Interview with the CEO Erik H. Rind  TechBullionImagineBC is leveraging technology so that people can unlock the value of their personal data. The CEO Erik H. Rind will be sharing more with us in this ...
The Cash Cache - Tech Tips For Simplifying Your Personal Finances  Tech GuideToday's technology has reinvented personal finances to the point that most Australians can essentially store their financial lives on their cell phones. However ...
Tech, Health Firms Race to Help Consumers Manage Personal Data  The Wall Street JournalTechnology and health-care companies—spurred by recent Trump administration moves—are competing to develop ways for consumers to corral their health ...
Samsung Postpones Rollout of Galaxy Fold  The New York TimesThe company, the world's largest handset maker, said it would postpone the release of the foldable smartphone after reports that the device was malfunctioning.
The New Face of Cyber Crime: Blackmail Gets Personal  Irish Tech NewsBy Jennifer Grey. Jennifer is a freelance writer covering topics related to technology and society. She has worked extensively with many leading lights and ...
The Personal Teaching Assistant Every Teacher Needs  The Tech EdvocateImagine teaching at a school where your personal assistant takes care of the routine tasks for your classroom. The assistant even prepares lessons for your ...
New Apple Card is generous, but only through Apple Pay  The Oakland PressApple is rolling out a new credit card that features ample cash-back rewards if used through Apple Pay — but mundane rewards otherwise.
Why unicorns can raise $1 billion but can’t figure out diversity and inclusion  TechCrunchI was 13 when I was selected for a competitive math, science and computer science program. Of the 100 kids, I was one of two black girls. The tech industry is no ...
A Favorite Tool While Reporting on Start-Ups: Paper?  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Erin Griffith, a start-ups and venture capital reporter in San Francisco ...
From Bubble Memory to Hot Spots and a Fly Rod  The New York TimesDavid E. Sanger, a national security correspondent, recounts his gear from the computers in use when he joined The Times in 1982 to his overloaded backpack ...
Coming to store shelves: cameras that guess your age and sex  The Oakland PressNEW YORK (AP) — Eyeing that can of soda in the supermarket cooler? Or maybe you're craving a pint of ice cream? A camera could be watching you.
I Used to Work for Google. I Am a Conscientious Objector.  The New York TimesAmerican companies continue to build surveillance tools that are used to violate human rights. Workers who refuse to comply deserve protections.
Uber vs. Lyft: Which Ride-Hailing App Is Better?  The New York TimesHere's a comprehensive comparison of the two services to help you choose your go-to app for hitching rides.
Ontario announces new foreign tech worker stream and immigration pilot for smaller communities  Canada Immigration NewsOntario will create a new immigration stream for tech workers and a new immigration pilot initiative with the goal of attracting highly skilled immigrants to smaller ...
Sidewalk Labs's signage explains public data collection tech  Fast CompanySidewalk Labs has created a new signage system to explain the invisible sensors that are tracking you when you're in public areas. But there's still no way to opt ...
VR’s True Innovation Isn’t Technological, It’s Human  WIREDI've never seen anything in VR quite as realistic as this car. It's like something out of the future, all chrome and curves; the lights of the Berlin platz twinkle off it as ...
Hey, remember that California privacy law? Big Tech is trying to ram a massive hole in it  The RegisterAnalysis A proposed amendment to California's new data privacy law would drive a huge hole through the legislation, privacy advocates have warned.
Hackers publish personal data on thousands of US police officers and federal agents  TechCrunchA hacker group has breached several FBI-affiliated websites and uploaded their contents to the web, including dozens of files containing the personal ...
How much is your personal data really worth?  NS TechIn January, hackers uploaded more than 12,000 files to a cloud hosting *service* called MEGA. The collection included 87 gigabytes of data, 21 million passwords ...
How-To Geek Is Looking for a Mac and iOS Writer  How-To GeekAre you a die-hard Mac and iOS user who knows the ins and outs of working with both? We want you to write for us.
Check out all the demos from TC Sessions: Robotics + AI  TechCrunchWe're incredibly proud of the programming we put together for this year's TC Sessions: Robotics + AI. It's my personal favorite TechCrunch event and I think this ...
Apple AirPods Review: Perfect Earbuds, but They Don’t Last  The New York TimesSleek and convenient, Apple's wireless earbuds are an engineering marvel. One problem: They are difficult and expensive to maintain.
You want AI with that? McDonald’s latest tech gambit gets highly personal  DiginomicaMcDonald's splashes out $300 million on its very own AI tech firm, the latest iteration of its tech-led growth strategy.
Fun and games? Online quizzes may be collecting your data  The Oakland Press“Which 'Game of Thrones' character are you?” “What dog breed matches you best?” These type of quizzes pop up on our social media feeds every day, and ...
Face recognition researcher fights Amazon over biased AI  The Oakland PressCAMBRIDGE, Mass.>> Facial recognition technology was already seeping into everyday life — from your photos on Facebook to police scans of mugshots ...
You Protect Your Personal Data, What about Your Child's?  The Tech EdvocateSignificant data breaches at Facebook and Starwood Hotels have left many people wondering: just how safe is my data? The answer is that it's probably not, ...
Protecting Your Internet Accounts Keeps Getting Easier. Here’s How to Do It.  The New York TimesThere are many tools for setting up two-factor authentication, a security mechanism that prevents improper access. These four methods are the most compelling.
Renting your office equipment is often smarter than buying  The Oakland PressComputers, phones and other office equipment will stop working at some point.
Elizabeth Warren unveils bill that could hold tech execs responsible for data breaches  The VergeOn Wednesday, Sen. Elizabeth Warren (D-MA) introduced a new piece of legislation that would make it easier to criminally charge company executives when ...
Tech pioneer whose work led to the first personal computers to speak at UMaine  Bangor Daily NewsORONO, Maine — A pioneer in the world of personal computers is returning to his alma mater to deliver a keynote address during a discussion on campus about ...
A Senate Bill Fights How Tech Companies Get User Data  FortuneA bipartisan bill introduced by Senators Mark Warner and Deb Fischer will ban the design tricks tech companies use to get personal data.
Organizing Your Unwieldy Photo Collection Is Easier Than You Think  The New York TimesThe artificial intelligence component of Google Photos automatically sorts photos based on the objects in them and then groups pictures together in the “Things” ...
BlackBerry opens BBM Enterprise for personal use after Emtek discontinues BBM Consumer  TechRepublicAttempts to make BBM more consumer-focused with social media functions saw limited success, leading to the discontinuation of the BBM Consumer app.
Financial services are going hi-tech and personal | The Mercury  IOLGreat customer experience is probably the biggest differentiator in an increasingly crowded South African financial services market.
Georgia Tech: Network hacked, exposing personal information of 1.3M people  Atlanta Business ChronicleGeorgia Tech says personal information for more than one million people was exposed following a hack of school's system late last month.
These Tech Execs Faced #MeToo Allegations. They All Have New Jobs.  BuzzFeed NewsSilicon Valley says it's committed to improving diversity, but high-profile male executives accused of sexual misconduct are getting second chances. Some ...
The 5-star reviews on these 5 Amazon products are probably fake  MarketWatchA new report claims Amazon is plagued with thousands of fake reviews.
Lip-reading smart speakers: Just what no one always wanted  The RegisterSomething for the Weekend, Sir? Your safe, cosy home is to become a place of weeping and gnashing of teeth. Don't worry, this is quite normal. It's how you will ...
Streaming to subscriptions: Video games enter new frontiers  The Oakland PressNEW YORK>> The video game industry is entering new frontiers.
People will sell sex in driverless cars, researchers say  The Oakland PressThe rise of driverless cars is expected to displace workers, slash cab fares and give people a new place to have sex. Possibly for money.
Tangled wires, digital photos: Here's how to declutter your personal tech  Economic TimesEveryone has a drawer full of ancient cellphones, tangled-up wires and earphones that are never touched.
Tesla’s full self-driving computer is now in all new cars and a next-gen chip is already ‘halfway done’  TechCrunchThe Tesla computer, a new custom chip designed to enable full self-driving capabilities, is now in all new Model 3, X and S vehicles, CEO Elon Musk said during ...
#TGW: Order of Ikkos Award – Women's Track & Field — Georgia Tech Yellow Jackets  Georgia Tech Official Athletic SiteGeorgia Tech's Chaunte Howard-Lowe awards Order of Ikkos to former coach Nat Page.
Creepy Facebook patent uses image recognition to scan your personal photos for brands  Fast CompanyFacebook has just been awarded a patent for technology that could let the social network scan through your photos, see what products you like, and then send ...
Google readies Pixel for the masses, but are the masses ready for Pixel?  The RegisterComment Industry sources have confirmed that Google is readying lower-cost Pixel smartphones for imminent launch. Metadata spotted at the Google Play ...
ID Cards to be Used Alongside Huduma Namba for Personal Identification  TechweezThere is no single day that elapses before the Government's nationwide database for people under the NIIMs program aka Huduma Namba trends on social ...
How to Declutter and Organize Your Personal Tech in a Few Simple Steps  The New York TimesAccessories and data may not take up much physical space, but they contribute to frustration and anxiety. Here are ways to keep e-junk at bay, Marie ...
Two out of three hotels accidentally leak guests' personal data: Symantec - Tech News  The Star OnlineTwo out of three hotel websites inadvertently leak guests' booking details and personal data to third-party sites, including advertisers and analytics companies, ...
The good, bad and the unknown of Apple's new services  The Oakland PressSAN FRANCISCO (AP) — It took a while, but finally — and with the carefully curated help of Oprah, Big Bird and Goldman Sachs — Apple has at last unveiled.
B.C. introduces law to require cars, trucks sold by 2040 be zero emission  Vancouver SunAll light-duty cars and trucks sold in British Columbia would have to be zero-emission by 2040 under legislation tabled Wednesday.
Researchers find 540 million Facebook user records on exposed servers  TechCrunchSecurity researchers have found hundreds of millions of Facebook user records sitting on an inadvertently public storage server. The two batches of user records ...
Facebook spent $20 million last year on Zuckerberg’s personal protection  TechCrunch2018 was by all means a very rough year for Facebook . The company, which spent the year reeling from the Cambridge Analytica scandal and a general ...
Experts Warn the Public About Sharing Personal Information on Social Media  Science TimesThink twice before sharing your personal information online, expert advises An expert on cybersecurity has warned social media users of fake pages that ask ...
Social media plays role in depression among young Americans  The Oakland PressOver the past decade or so, rates of depression, psychological distress and suicidal thoughts and actions have risen dramatically among people 26 and younger ...
Some of Samsung's new $1,980 folding phones are already breaking  Vancouver SunJournalists reviewing the phone said the Galaxy Fold screen started flickering and turning black before completely fizzling out.
DNA Review: Huawei MateBook 13 proves itself a good mate  Digital News AsiaThe latest ultra-portable notebook from Huawei, the Matebook 13 is sleek, slim and powerful but lacks the juice.
Big Tech must pay for access to America’s ‘digital oil’  Financial TimesIn an era of data harvesting big web platforms are the new Saudi Aramco or ExxonMobil.
Report: Grindr’s Chinese owner Kunlun is selling the dating app after CFIUS raised personal data concerns  TechCrunchGrindr, the popular dating app for gay, bisexual, transgender and queer people, looks like it might be changing hands again, a year after it was acquired at a ...
Personal/Private Cloud Market By Top Players like McAfee, Symantec Corporation, Trend Micro, Cisco Systems and Forecast 2019 To 2026  News Tech MarketsThe global Personal/Private Cloud Market is the professional and accurate study of various business perspectives such as major key players, key geographies, ...
Jeff Bezos’ personal data accessed by Saudis  Hindustan TimesGavin De Becker, a longtime security consultant, said Jeff Bezos' phone was hacked by Saudi Arabia, giving them access to the Amazon CEO's personal data.
Pixel 3 update turns your phone into your own personal kiss cam  MashableGoogle's Pixel 3 camera is getting even smarter. The latest camera update adds new "kiss recognition" abilities to the phone, allowing it to automatically detect ...
Amazon’s Alexa is about to become your personal doctor  Fox NewsAmazon's voice assistant has gained several skills that will allow consumers to ask questions such as “Alexa, pull up my blood glucose readings” and get prompt ...
China's Second-Richest Man Wades Into Controversy Over Tech Sector's Work Culture  ForbesAlibaba's billionaire founder Jack Ma has expressed his support for the deep-seated culture of working long hours in China's tech industry, but his comments ...
My home tech setup for 2019  Business InsiderTechnology can vastly improve the quality of your home and life. I've listed the computers, gadgets, and accessories I'm using on a personal basis in 2019 ...
He Reported on Facebook. Now He Approaches It With Caution.  The New York TimesNick Confessore, an investigative reporter who has written about social media and data privacy, has changed his tech habits after what he has learned.
Gonzaga’s Killian Tillie looks to improve personal record against Texas Tech’s Davide Moretti  Sports and Weather Right NowKillian Tillie will meet an old European nemesis in Gonzaga's Sweet 16 matchup with Texas Tech Saturday.
Tracking Phones, Google Is a Dragnet for the Police  New York TimesThe tech giant records people's locations worldwide. Now, investigators are using it to find suspects and witnesses near crimes, running the risk of snaring the ...
Devices That Will Invade Your Life in 2019 (and What’s Overhyped)  The New York TimesA.I. that responds to your voice. Next-generation wireless networks. If this year's biggest consumer technology trends have a familiar ring, there's a reason for ...
Only one Huawei? We pitted the P30 Pro against Samsung and Apple's best – and this is what we found  The RegisterSpecial Imaging Report Swaggering with cash, flashy and vulgar – Huawei has barged into the high-end smartphone market, upsetting the duopoly like a new ...
‘The Effects Cannot Be Overstated’: When Tech Invaded Media  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Jim Rutenberg, media columnist for The Times, discussed the tech ...
Melinda Gates on Tech Innovation, Global Health and Her Own Privilege  New York TimesYou would perhaps be demonstrating an excess of sympathy to feel sorry for ultrawealthy philanthropists. But it's fair to say that many members of that cohort ...
When License-Plate Surveillance Goes Horribly Wrong  The New York TimesThe pitfalls of automated policing, where one piece of bad information can lead to a guns-drawn confrontation.
Avengers: Endgame — our spoiler-free review  The VergeSpoiler notice: this review expressly doesn't spoil any specific plot points in Avengers: Endgame whatsoever, but does discuss general themes, ideas, and cast ...
Talking to Taffy Is Low Tech. And Intense.  The New York TimesArmed with an Olympus recorder, she's spent time with Gwyneth Paltrow and Bradley Cooper. Here's how Taffy Brodesser-Akner of The New York Times ...
Hacker group to publish thousands of federal officers' personal data  AxiosA collection of hackers have obtained the private details of thousands of federal officers and have published the findings online, reports TechCrunch.
Ed-Tech Problems Open Doors for Entrepreneurs to Solve Them  Education WeekThe only way an ed-tech company can have a meaningful impact in schools is by addressing a specific problem and offering a real solution.
This Tech Makes D.I.Y. Key Duplication Easy. Maybe Too Easy.  The New York TimesYou can now take key duplication into your own hands using kiosks and apps from start-ups. Our columnist explored whether the benefits of this outweigh the ...
Digital Privacy Is a Big Concern in Europe. For This Reporter, Too.  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Matt Apuzzo, an investigative correspondent in Brussels, discussed ...
Tech groups told to stop nudging children into using apps  Financial TimesTechnology companies must not suck children further into their websites and apps with psychological devices such as Facebook's “like” button or Snap's ...
Spending Is as Easy as Pushing a Button. The Hard Part? Keeping Track.  The New York TimesHow do New York Times journalists use technology in their jobs and in their personal lives? Tara Siegel Bernard, a personal finance reporter, discussed the tech ...
The Tech That Was Fixed in 2018 and the Tech That Still Needs Fixing  The New York TimesFrom Facebook to creepy online ads, the worst tech of the year made the internet feel like an unsafe place to hang out. Yet there were some products that were ...
Limiting Your Digital Footprints in a Surveillance State  The New York TimesTo protect himself and his sources from prying eyes in China, Paul Mozur, a technology reporter in Shanghai, leaves just an “innocent trace” of digital exhaust.
What Is 5G? Here’s What You Need to Know About the New Cellular Network  The New York TimesThe transition to new fifth-generation networks, known as 5G, will affect how you use smartphones and many other devices. Let's talk about the essentials.
I Deleted Facebook Last Year. Here’s What Changed (and What Didn’t).  The New York TimesOur personal tech columnist didn't lose touch with his true friends — but strange things did occur, including Instagram thinking he was a woman.
Facebook Did Not Securely Store Passwords. Here’s What You Need to Know.  The New York TimesFacebook said it had found no evidence of abuse and it was not requiring users to change their passwords, but you should do it anyway.
How to Save on Your Next Apple Purchase  The New York TimesGadgets like Apple's iPhone have become so powerful and durable that you can wait many years before buying a new one. The bad news is that your next ...
Where a TV Pro Goes for Video When YouTube Just Won’t Do  The New York TimesDonald Trump's old vlog? An archive of closed captions? Liz Day, a senior story editor for The Times's new television show, “The Weekly,” knows how to find ...
Review: The Galaxy S10+, a worthy 10th anniversary champ  Digital News AsiaTHIS is the one the world's been waiting for – Samsung's 10th anniversary iteration of its hugely popular Galaxy smartphone. The South Korean giant took the ...
What’s Next for Smartphones? Samsung’s New Galaxy Line Offers a Few Answers  The New York TimesOne of the company's newly unveiled models works with 5G wireless networks. Another folds up like a book.
The first major analyst calls on Lyft are out and they're bullish: 'Future of human transportation'  CNBCThe first round of Lyft analyst notes is bullish on the newly public company as brokerages clamor to recommend the stock.

Microsoft Great Plains Dexterity Customizations

Microsoft Business Solutions is on the way to popularize it's... Read More

CCNA 640-801 Certification Primer

The Cisco Certified Network Associate (CCNA) Certification is meant for... Read More

How to Buy a Plasma Television Set

Most people think that all you have to do to... Read More

Home Video? Bring it On

So you got yourself a digital camcorder. If you want... Read More

5 Ways to Speed Up Your PC

No matter how fast your processor and regardless of how... Read More

Is Desktop Search Deserving?

Google, in their march to stay ahead of the pack... Read More

Passwords and the Human Factor

Passwords have a strange dual nature. The stronger and safer... Read More

How Does My PC Get Hot

There are many sources of heat that can raise the... Read More

Why There Are Color Differences in Printing from Your PC

This article describes the basic properties of color, what the... Read More

Image Formats: GIF, JPEG, BMP

When browsing the internet you are likely to come across... Read More

Consumer Electronic Information: The Basics of the DLP Projector

Projectors have come a long way in the past few... Read More

Nephrology and Dialysis For a PDA

Saving Lives With A Pocket PCFree medical downloads can be... Read More

Learn the Lost Art of Touch Typing

Computers have replaced typewriters, but two-finger, hunt-and-peck typing can never... Read More

The Benefits of the New Firefox Browser

You probably heard of the new Firefox browser version 1.0... Read More

Are You Well Protected?

Winter?the official start of the cold and flu season. Though,... Read More

Refurbished Computers on the Internet

What is a Refurbished Computer?Refurbished Computers. Remanufactured Computers. Reconditioned Computers.... Read More

Email Management

If you utilize a computer at home or work it... Read More

Basic Diagnosis Guidelines for Your PC

Simone is exasperated. She has to work on her university... Read More

4 Easy Ways to Speed Up A Sluggish PC

Computers are supposed to speed up our productivity?to help us... Read More

Image Conversion In Computers

JPEG, GIFF/JIFF, BMP, and TIFF are the most commonly used... Read More

Is Your Web Browser Putting You At Risk?

It's free, it comes with Windows and it's used by... Read More

SmartCar Memory Stick for LapTop Transfer Data

With the new technology used to transfer information to from... Read More

Healthy Webmasters Choose Ergonomic Computer Products

Webmasters usually sit at their computers much longer in a... Read More

Emulation Manual - A Complete Guide on How to Change Your Windows XP to Mac OS X

IntroductionMac OS X is the most technologically advanced operating system... Read More

How to Use SQLXML to Retrieve Data from SQL Server Database?

Using SQL Server 2000 and above versions you can retrieve... Read More