Web Detritus

Seaton Dubman

Just Following the Rhumb Line

Showing all posts tagged "Tech"

2017-10 Short Guide to Motherboard Parts and Their Functions

The motherboard is the most important component of your PC. If you crack your motherboard or one of its connections malfunctions, it’s curtains for your PC. Unfortunately, motherboards also seem like a mysterious and magical entity to those who aren’t tech aficionados. With so many parts, pieces, and components, figuring out each individual part’s purpose can seem like brain surgery. That is, until now! Read on for a comprehensive, albeit basic, guide to your motherboard! Motherboard: An Overview Below i...

2017-10 Create a System Restore Point

System Restore points are a huge help in Windows. They let you roll back your system to a previous time before you started having a problem. Since they don’t touch your personal files, running a System Restore is a great way to troubleshoot problems without having to reset Windows. While Windows automatically creates Restore Points whenever you install software or apply critical updates, it’s also a good idea to make your own sometimes. This is especially useful when you’re about to make a change to your...

2017-10 Send Email to Any Cell Phone (for Free)

You’re at your computer, and your friend is out with their phone. You want to send them a message, and your phone is dead. What do you do? Okay, this scenario isn’t that big a deal. Sure, ten years ago it may have required some pondering, but now there are any number of answers. You could send an email, fire off a Facebook message, or hit them up on Twitter. They use iMessage, right? All of these methods are available on a desktop. But if you’re talking to someone who isn’t carryi...

2017-10 Ubuntu: A Beginner’s Guide

So you’re curious about Linux, and you heard Ubuntu is a great place to start? Maybe you’ve heard of Ubuntu and have no idea about this thing called Linux? Either way, you’ve come to the right place. This guide will teach you everything you need to know about Ubuntu in easy-to-understand language. Ubuntu is a free and open-source operating system with millions of users. It’s also an ethos, a collaborative project and, first and foremost, a community. If you’re reading this guide, you’re probably interest...

2017-10 Should I Remove My Laptop Battery To Increase its Life?

We all spend a lot of time on the go. And these days, a laptop is a vital part of anyone’s travel kit. Squeezing those last precious ounces of power from your portable lithium cell is a defining battle of the 21st Century. But how do you do just that? One eternal question relates directly to the battery. Does running your laptop on AC power damage the battery? Furthermore, should I remove the battery to increase its lifespan? Read on to find out the answers, and a few more useful laptop battery life tips...

2017-10 7 Swift Coding Challenges to Practice Your Skills

When Apple announced Swift way back in 2014, people were rightfully skeptical. Nobody knew if it would catch on, and many questioned the need for yet another programming language to learn. But then Swift went open source in 2015, and though it didn’t explode overnight, the language has steadily grown. There’s never been a better time to learn! We’ve covered online Swift tutorials as well as mobile Swift tutorials, so start there if you’re brand new. Once you’re comfortable with the language, consider tes...

2017-10 Enable Two-Factor Authentication for Cloud Backup Services

Backups are necessary because data has value. You never know when your hard drive that contains this data is going to crash. Cloud backups solutions can help you securely store your data in the cloud, but what if these services themselves get hacked? Enabling two-factor authentication adds an extra layer of protection, thus giving you peace of mind. Therefore, it’s necessary to choose a cloud backup service that supports two-factor authentication. If you still doubt its importance, here are a few inciden...

2017-10 You’re at Risk From a KRACK Attack: Everything You Need to Know

We’ve known public Wi-Fi networks are vulnerable to hacking for a long time. But according to experts, the situation is a whole lot worse than anyone imagined. It’s now believed that every Wi-Fi network in the world is vulnerable — or at least, every Wi-Fi network that uses either WPA or WPA-2 encryption, which is virtually all of them. The cause? An exploit called "KRACK," which is short for Key Reinstallation Attacks. But what exactly is a KRACK attack? How does it work? Can it be fixed? And what can y...