Blog Authors

Latest from Your IT Consultant

Wi-Fi 6E is the latest standard for wireless networks. At this point, you’re probably ticked off that you just upgraded to a Wi-Fi 6 (not 6E) device. Don’t despair. Wi-Fi 6 is still a great improvement over Wi-Fi 5. So what’s the difference? Wi-Fi 6 is all about improving capacity and security. Previously, wireless networks used the 2.4Ghz and 5GHz frequencies. Wi-Fi 6E uses those same two frequencies, but also uses the 6GHz spectrum. That…
End-to-end (E2E) encryption protects data from being accessed by unauthorized users. In other words, data is encrypted with a user-controlled key from the source all the way through to the destination. Engadget reported that Ring has announced that E2E will be rolling out to some (but not all) of its products. Ring products that are battery or solar powered will not get end-to-end encryption, while wired devices will. The actual products to get E2E will…
Users are quickly abandoning Facebook’s WhatsApp and jumping over to Signal or Telegram. You don’t have to just use Signal from your smartphone. You can also run the messaging app from your computer. Yesterday’s post covered some features of Signal Private Messenger that you should be aware of. As TechViral listed, Signal provides these features. Like WhatsApp, Signal also offers features like messaging, voice, and video calls. All forms of communication on Signal Private Messenger…
I’m a big fan of Signal. You can’t beat the app for secure and private communications. It is even more secure than other products such as Telegram and WhatsApp. It’s free too. If you are a Signal Private Messenger user, don’t forget about some of the best available features that users look for in an instant messaging app. TechViral has a post that goes into more detail about five of the best features. Block Screenshot…
One of the most annoying things about using Microsoft Office is read receipts. I’ve always wondered why people insist on getting notice that I’ve actually read a message. Don’t they know that you don’t have to send confirmation and can just ignore the request? Therefore, there never is any proof that you actually read a message. Since many of us are still working from home, we are participating in a lot of virtual meetings. I…
Zoom has a lot of popular features that competitors have copied. One of those is virtual backgrounds. The ability to blur your background or transmit a different background image can make you appear more professional and “hide” the clutter of your home workspace. The Verge has posted instructions on how to change your background if you are using Microsoft Teams. You can change your background prior to starting the meeting. Start your meeting and turn…
Not crazy about the modern user interface of Windows 10? Dying to go back 25 years to how things were? Well, now you can. TechViral has a post with the instructions on how to replace your current Windows 10 desktop with a Windows 95 theme. Follow these abbreviated steps to install the Classic Theme. Download the Windows 95 Classic Theme from here. Unzip the contents of the file. Copy the Classic Theme file to…
Nobody wants to be the victim of a data breach. It’s bad enough that there is already so much of our personal information available to others. According to a post on Threatpost, T-Mobile revealed that it experienced its fourth data breach in the past three years. According to the notice, customer CPNI (customer proprietary network information) was accessed. The good news (if there is any) is that the accessed data did not contain account names,…
Own a Zyxel firewall or VPN product? Patch it now! The Hacker News reported that EYE researcher Niels Teusink found the vulnerability in Zyxel products back in November. Zyxel released a firmware patch on December 18. Apparently, there was an undocumented, hardcoded administrative account found in firmware version 4.60. “Zyxel said the hardcoded credentials were put in place to deliver automatic firmware updates to connected access points through FTP.” Really? Who thought that was a…
According to a post on Bleeping Computer, Microsoft has acknowledged a problem when you run the chkdsk /f command on some Windows 10 systems. After running the command, some machines fail to properly boot. That’s definitely a problem. The issue has been resolved and is being pushed out. Microsoft has a workaround if you have a machine that won’t boot following running chkdsk /f and the fix is not installed. This is the procedure to…