Articles – random carousel

Random carousel of articles

payment cards

Payment card theft

Seems every day there are new reports of payment and credit card theft. Explore how payment card theft happens, and how to protect yourself.
Pixabay - an old rotary phone in a spooky yesterworld

The end of the (land) line

So you’ve looked at your local phone bill and it was… oh my, I’m paying that much for a simple landline phone number? This doesn’t …
Haunting

The first rule of security: “Be aware”

The COVID19 Coronavirus situation has affected our families, our homes, and our work environments. w can you protect yourself? The same methods you use to …
inmotion hosting review

Inmotion Hosting review

This article presents a candid review of inmotion hosting, focused on both “reseller” and “end user” accounts: Ease of use, setup, speed, and configuration.
Pixabay - Credential theft - phishing

Credential theft

This presentation will help you understand the risks, recognize when you have been compromised, and avoid credential theft
Your phone is access to your kingdom. Be careful to protect it!

Vishing-don’t be a victim

The vish: Vishing and social engineering are nefarious confidence scams that pretend to be helping you. This article will help you avoid being a …
pencil erasers - revise erase repeat

WordPress Post Revisions

Have you worked hard on a post, only to forget to save the post? I have. If you are looking to “autosave” your …
Private gate - keep your private information private

Privacy at the workplace

In today’s world of privacy, you might be surprised that your company is recording every one of your keystrokes. Keep your private information private.

Centrally managing WordPress sites

Managing multiple WordPress sites is no easy task. While managing a single WordPress site in itself can seem difficult at times, managing many WordPress …
arrows pointing

Link checkers

The user experience is paramount to revisits. Dead links are frustrating for users, and reduces that “first” (or second!)_ impression. This article provides …

Business & Technology Planning

This article explores basic ideas that you should keep in mind as you are starting or continuing your business. It is intended to …
Phishing is fun!

Phish for phun and profit

Phishing is a real problem, and that problem is only increasing in frequency. Phish attacks come in many different forms. Everyone is affected …
Cyber Security hackers

Exploiting the SDLC

Attacking software is really attacking the software development process. The adversary is looking to take advantage of software defects before those defects are repaired. …
Free public domain

Free domain names

Ready to show off a new domain? Want to use a “personalized” domain for a new customer, but don’t wish to buy the domain …
Theft through the screen

Identity theft

Our online identity IS our identity. Someone masquerading as you is potentially a dangerous situation, but it is at least creepy. The problem …

Zero day, 0day, ohday, oh my!

Hackers have a few things in their favor when it comes to getting into your network and stealing data.  One of those things is the …
Goal-Plan-Success

Business Continuity Planning

Business Continuity Planning (BCP) is the pre-planning effort put in to make sure your business continues to operate even during adverse situations. BCP is …
Pixabay - postman

WordPress Plugins – 2.1 Mail Relay

Let me ask an honest question.  Would you rather be doing business with “bobrx153@hotmail.com” or “bob@randolf.com” ?  Which one looks more professional?  Which one looks …
Pixabay - Jigsaw interconnections

WordPress Plugins (1.0 Introduction)

WordPress is an incredible Content Management System — and it is free!  WordPress off the shelf is just that — a content management system.  The …