If you get a notification that you have a “Microsoft account problem,” you don’t have a problem and you don’t have to fix anything. You haven’t been hacked and you don’t have a virus. Microsoft is testing your patience.
Click on Start / Settings (the gear in the left column). […] continuedRead more
When you search for the phone number for Bruceb Consulting, Google shows the phone number.
Does that seem obvious? It’s a relatively recent change. Google only began serious efforts to provide One True Answer to search queries a few years ago. It completely changes Google’s role in the relationship between users and advertisers. […] continuedRead more
If you use LastPass, you have to remember your master password. The company does not know the password and cannot help you reset it.
It’s part of the reason that LastPass is secure. If bad guys hacked into LastPass and stole all the data, they would get nothing; they wouldn’t be able to reset your password or see your information. […] continuedRead more
“Is there any point to which you would wish to draw my attention?”
“To the curious incident of the dog in the night-time.”
“The dog did nothing in the night-time.”
“That was the curious incident,” remarked Sherlock Holmes.
— “Silver Blaze,” The Memoirs of Sherlock Holmes, Sir Arthur Conan Doyle
The United States is spearheading a multinational effort to destroy Huawei Technologies. […] continuedRead more
Security is complicated.
It turns out that giving your mobile phone number to Google can block almost all phishing attacks and automated bots attempting to hack into your Google account.Read more
Google, Microsoft, and Facebook held developer conferences last week to showcase new products and services. Google had some exciting announcements. Microsoft and Facebook, not so much.
MICROSOFT Microsoft is an enterprise company. At its Build Conference, it showed off new cloud services for developers and enterprises. That’s it. That’s what it does now. […] continuedRead more
A series of articles about privacy and trust in the era of tech overlords.
• Part 1: Data about you is being gathered by the big tech companies (as well as many other companies) in startling ways. Their ability to analyze that data and predict your behavior is more like magic than technology – and it has the potential to change the world, for better or worse. […] continuedRead more
These are the rules for computer and online safety in 2019. You can download a copy here.
Only your vigilance will protect you against bad guys. You will be safe if you are cautious. Stop and think before you click on links, before you call unfamiliar phone numbers, before you install programs, and before you fill in passwords. […] continuedRead more
Google has changed the steps required to pin a website to your Windows 10 taskbar. It’s still possible but it takes a bit of extra effort.
There are some websites that fit your workflow best when they are running in their own separate window. When you set up a website to open in its own window, it shows up separately on the taskbar so you can switch to it easily, and you won’t close it by accident when you’re closing 12 other tabs in your main Chrome window. […] continuedRead more
I wrote an article a few years ago about how difficult it is for non-tech people to manage the fiddly bits required to run a Windows computer. It’s one of the things that drove the transition from computers to phone and tablets.
An interesting thing is happening today. The explosion of devices, products and services is causing just as much confusion and frustration in the world of mobile devices. […] continuedRead more
The Google Home Hub is my favorite home assistant. Put it on your Xmas list, or sneak one under the tree for yourself. If your pictures are stored in Google Photos, then the Google Home Hub is worth the investment just because it is the best photo frame ever. But Google Home Hub stands out for everything else it does, too, so it’s highly recommended unless you are already so deep in the Amazon Echo ecosystem that it doesn’t make sense to switch. […] continuedRead more
The term “invasion of privacy” is distracting us from understanding important issues.
Invasion of privacy is frequently thrown around as a core issue where consumers need protection against tech companies. Apple has made it the cornerstone of its marketing.
The European Union has enacted strict privacy laws for websites that obtain any kind of identifiable information about users. […] continuedRead more
In the last two months, there have been major announcements of new products by every computer and phone manufacturer on the planet. You don’t know about any of them, do you?
On September 12, Apple put on its annual presentation of new iPhones for hundreds of tech journalists, with the same showmanship that it has relied on since the days when Steve Jobs would take the stage in his black turtleneck and wow the faithful. […] continuedRead more
Google has improved the password management built into the Chrome browser. It’s . . . okay! Not bad! Better than nothing, absolutely. Saving passwords in Chrome is easy and kind of secure, as long as you take a couple of precautions that we’ll talk about below.Read more
The most important thing you can do to improve your security is to use LastPass. It’s more convenient and more secure than a notebook in the desk drawer or any password system that relies on your memory. Once you have confidence in LastPass (or any password manager), you can use unique random passwords (the ones that look like this: g88*GZ&&HwRx) for every website. […] continuedRead more