When you're in charge of multiple tasks or you're managing a team and you need to keep track of the tasks assigned to your team members, you may feel a bit overwhelmed at times. Luckily, Trello has a nifty feature that allows users to filter cards and boards using specific labels, keywords, and due dates. … [Read more...] about Trello: How to Filter by Label
Adverts are extremely common on the internet with almost every website running at least one advert per page. On PC you can install an ad-blocking browser extension and on mobile, you can use a browser that blocks ads. Unfortunately, webpages inside the browser are not the only place that you can see ads. Many apps and smart devices also include adverts that you can’t block with … [Read more...] about What is Pi-hole?
You may occasionally hear about cyber-attacks in the news. The ones that get reported in the mainstream media often fall into two categories: data breaches and DDOS attacks. Data breaches are cyber-attacks where data is copied from computers, often this involves user data such as email addresses and passwords. A DDOS attack is an entirely different type of cyber-attack with few … [Read more...] about What is a Botnet?
As a social media platform, most people generally follow a number of other accounts on Twitter. There are many reasons you may choose to follow someone, perhaps you know them in real life, or you just like the sort of things they say and post about. Generally, the sort of content that most people want to see on Twitter is both primary and secondary content. On Twitter, the … [Read more...] about How to Stop Seeing Retweets From an Account You Follow on Twitter
Telegram is one of the most popular messaging apps out there. It doesn't have the number one spot like WhatsApp, but it's getting there. Telegram knows that having good security is something that will bring even more users. Thanks to the bots the app has, users can personalize Telegram in so many ways. Besides the previously mentioned, Telegram also allows its users to … [Read more...] about How to Organize Your Telegram Chats into Folders
Google Chrome is notoriously a system resource hog, specifically in RAM usage. This is because each tab and a number of background features are all distinct processes with their own memory allocation. The more tabs you open, the more RAM is used. This high level of system resource usage can have a negative impact on the performance of other applications if you don’t have enough … [Read more...] about How to Suspend Chrome Tabs to Free up System Resources
CSRF or Cross-Site Request Forgery is a website vulnerability where an attacker can cause an action to happen in a victim’s session on another website. One of the things that makes CSRF so much of a risk is that it doesn’t even require user interaction, all that’s needed is for the victim to view a webpage with the exploit in it. … [Read more...] about What Is Cross-Site Request Forgery?
There are many different types of security vulnerabilities found in websites, one interesting one is called “Session Fixation”. Session fixation is an issue where an attacker can influence the session identifier aka the session id of a user and then use it to gain access to their account. There are two ways this type of vulnerability can work, it can allow the attacker to … [Read more...] about What is Session Fixation?
When you get an email, your Android device lets you know with a notification. If it's nothing important, you usually dismiss the notification until you're ready to deal with it. But, if you get a lot of Gmail notifications, you're going to have to deal with them as soon as you open the app. With email that could be important, you may have no choice but to open each email and … [Read more...] about Android 10: How to Change Swipe Actions in Gmail
One of the things that pretty much everyone has done, and many people still do issue one, or a very small number of passwords for everything. This is because it’s much easier to remember one password, even if it is complex and long, rather than remembering a dozen or more passwords and what service they are used for. The downside of this approach, however, is that if someone … [Read more...] about How to Check if Your Passwords Have Been Leaked in a Data Breach