Easy to use VPN

A few months ago I decided I needed a VPN and wrote 5 reasons why you need a VPN.  After experimenting with a few services I had more ideas about what I need from a Virtual Private Network and settled on the following two essentials:

  1. The VPN needs to be sold with one licence that covers the whole house.

Posted in Security

Ransomware advice

Ransomware is a virus or other unwanted software that locks your entire computer.  When you have ransomware you can’t do anything including removing the ransomware or recovering your data.  I make a distinction between this type of program and cryptoviruses (even when the cryptovirus demands a ransom),

Posted in Security

Virtual Private Network

5 reasons why you need a Virtual Private Network (VPN)

There are plenty of reasons why a virtual private network is a must have today, but here are a few of the most important ones:

  1. Privacy

Posted in Security

Undeleting files

Undeletion means to take a file that has been erased and restore it.  It is possible because, in simple terms, when a file is deleted it is just removed from the index, but not actually removed.  This is like deleting a library book from the catalogue,

Posted in Maintenance

Cryptovirus advice

What is a cryptovirus?

Cryptoviruses are unwanted programs that lock your files.  Most of them try to take a ransom from you to unlock your data.  I make a distinction between these (cryptoviruses) and ransomware that locks your whole system,

Posted in Viruses

Bootable USB’s

Can you use an external drive to create a separate boot profile on a computer?  Can you use that drive on multiple computers?

This was the question that was put to me recently by a customer.  I’d like to break the question down a bit for simplification.

Posted in Hardware

Choosing Passwords

Password security is a relatively easy concept, if properly explained, but is often misunderstood, because it is often not well explained.  I will try to set a foundation for secure password management here.

Security Objectives

When we create an account on a service and assign a password to it we are setting up a system that will let us have convenient access,

Posted in Security

Fake Emails

One problem that often comes up with new internet users is getting replies to emails that you never sent.  Usually, you, seem to have been sending abuse or marketing emails to random people and you know you didn’t do it,

Posted in Security

Clicky Web Analytics for Marketers

Clicky Web AnalyticsAbout a month ago I setup Clicky Web Analytics and wrote wrote my earlier post.  Since then I have become addicted to it, but today my enthusiasm went through the roof.  Aside from being the best tool for web traffic analysis,

Posted in Clicky Web Analytics

Clicky Web Analytics – Google Analytics Alternative

Clicky Web AnalyticsI have been setting up websites for other people for years and had always recommended Google Analytics, because everyone else seemed to.  My apathy ended recently when I got really serious about my own websites and actually tried to use Google Analytics,

Posted in Clicky Web Analytics