I recently came across this great website for creating backgrounds that you can use in your online profiles or accounts. Create your own unique background on the website. Create your own here. Cool Backgrounds shared as part of the Side Project Collective who are responsible for many great, free projects on the web. They welcome… Continue reading Create a Cool Background
When you pin a screen on Android, it keeps the screen open on top of everything else on your phone and deactivates the phone's buttons. You can even activate a setting to require the unlock pattern to unpin. This is handy to limit access to other data and apps on your phone if you borrow it to someone.
Castbox for Podcasts Castbox lets you listen to podcasts no matter what platform you're using. If you're switching platforms, you may be looking for a new podcast player. Castbox lets you create an account so that you can listen to your podcasts on any device. This is very useful if you're switching mobile phone platforms.… Continue reading Castbox for Podcasts
Do you know how the Internet works, or what WiFi stands for? Learn this and more from this handy infographic from Frontier Communications.
Spectre and Meltdown are two massive security vulnerabilities found in smartphone chips. If you have any devices with a processor, you're likely affected by these vulnerabilities. Desktops, laptops, cloud computers, smartphones and some internet of things devices are all affected. The vulnerability makes use of a feature of modern processors, called speculative execution. Security experts do… Continue reading Spectre/Meltdown
It's likely that you have a camera with you every where you go, as a feature of your phone or smart phone. It's a good idea to save your photos from your device to a cloud service. There are several motivations for you to do this: to be able to delete the photos that you… Continue reading Save all your Photos in One Place
Many of us use our devices as an extension of our brains. We keep personal information such as our banking details, passwords, addresses, social media accounts, contacts, etc. on our devices. This could be catastrophic in the wrong hands. In the best case, we would simply lose all of our data, but they would be… Continue reading 7 Steps to Secure your Device