Blog Archives

Easy to use VPN

A few months ago I decided I needed a VPN and wrote 5 reasons why you need a VPN.  After experimenting with a few services I had more ideas about what I need from a Virtual Private Network and settled on the following two essentials:

  1. The VPN needs to be sold with one licence that covers the whole house.

Read more ›

Posted in Security


Ransomware advice

Ransomware is a virus or other unwanted software that locks your entire computer.  When you have ransomware you can’t do anything including removing the ransomware or recovering your data.  I make a distinction between this type of program and cryptoviruses (even when the cryptovirus demands a ransom), as the approach to removing them differs.

Read more ›

Posted in Security


Virtual Private Network

5 reasons why you need a Virtual Private Network (VPN)

There are plenty of reasons why a virtual private network is a must have today, but here are a few of the most important ones:

  1. Privacy.  Your government is probably looking at what you look at on the internet. 

Read more ›

Posted in Security


Undeleting files

Undeletion means to take a file that has been erased and restore it.  It is possible because, in simple terms, when a file is deleted it is just removed from the index, but not actually removed.  This is like deleting a library book from the catalogue, but leaving it on the shelf. 

Read more ›

Posted in Maintenance


Cryptovirus advice

What is a cryptovirus?

Cryptoviruses are unwanted programs that lock your files.  Most of them try to take a ransom from you to unlock your data.  I make a distinction between these (cryptoviruses) and ransomware that locks your whole system, as the management for each is different.  If you can log into your computer,

Read more ›

Posted in Viruses


Bootable USB’s

Can you use an external drive to create a separate boot profile on a computer?  Can you use that drive on multiple computers?

This was the question that was put to me recently by a customer.  I’d like to break the question down a bit for simplification.

Can you boot from an external USB drive?

Read more ›

Posted in Hardware


Choosing Passwords

Password security is a relatively easy concept, if properly explained, but is often misunderstood, because it is often not well explained.  I will try to set a foundation for secure password management here.

Security Objectives

When we create an account on a service and assign a password to it we are setting up a system that will let us have convenient access,

Read more ›

Posted in Security


Fake Emails

One problem that often comes up with new internet users is getting replies to emails that you never sent.  Usually, you, seem to have been sending abuse or marketing emails to random people and you know you didn’t do it, but now you are getting a complaint back about it.  

Read more ›

Posted in Security


Clicky Web Analytics for Marketers

Clicky Web AnalyticsAbout a month ago I setup Clicky Web Analytics and wrote wrote my earlier post.  Since then I have become addicted to it, but today my enthusiasm went through the roof.  Aside from being the best tool for web traffic analysis, Clicky Web Analytics also offers a really attractive affiliate scheme,

Read more ›

Posted in Clicky Web Analytics


Clicky Web Analytics – Google Analytics Alternative

Clicky Web AnalyticsI have been setting up websites for other people for years and had always recommended Google Analytics, because everyone else seemed to.  My apathy ended recently when I got really serious about my own websites and actually tried to use Google Analytics, got confused, and looked for something else.  

Read more ›

Posted in Clicky Web Analytics