It’s rare to find a tool that’s simple, small, versatile, and useful.
It’s even more rare for me to realize that I had been staring at such a tool for years, and never realized it.
Thou shalt protect your data.
Passwords are the most versatile and effective way to protect your data, but most people break these simple rules.
Using a weak or ineffective password strategy in an always-connected world means that your money, data, and identity are at risk.
Thou shalt follow these commandments in order to protect yourself, both online and offline.
The default star rating system in zen cart, for registered users who post a review, is less than spectacular.
Many retail stores want you to go out early on a cold Friday morning to stand in line for that TECHNOLOGY DEAL THAT’S TOO GOOD TO PASS UP.
There are no good technology deals on Black Friday.
Regardless of what you see on TV, or what it says in the newspaper flyer this week, DON’T BUY IT.
The retail stores know how to manipulate the specs so that they can sell you a cheap piece of crap at a “discounted” price.
- That tablet for $150? Yep, it’s worth $150 – it’s not “discounted” from $300. It’s a CHEAP PIECE OF CRAP.
- Buy your loved one a new phone for $200? Yep, it’s the one with 32GB of memory, the crappy camera, the short battery life, and no external memory card. It’s not the $500 phone you think you’re buying.
- Every kid wants a drone! I’ll get one for little Timmy! Timmy is going to HATE a crappy little 3 inch drone that he can’t fly very well because it sucks.
- YOU CAN’T LIVE WITHOUT A 4K TV!!!!! Yes, you can. Wait until the new models come out in February. Right now, you’re buying last year’s model at this year’s price, at a slight discount because they have to get rid of it anyway.
- Time to upgrade to a state of the art computer! A 16GB Chromebook is NOT AN UPGRADE from anything!
- You get the picture
Instead, all online retailers, including the brick and mortar stores, are offering great deals online all week, and you can probably get a “real” deal next week during Cyber Monday as well.
Many mobile games need arcade-like controls, and implementing a virtual joystick is a quick and easy solution.
Here is a quick and simple way to implement a virtual joystick.
Every year, major electronics retailers and discount stores offer “amazing deals” on personal computing devices, such as laptops, tablets, and desktops.
Here are some reasons you should be skeptical, and perhaps avoid them altogether.
Tech Tip: Navigating Tabs
Browsers and other applications use tabs as part of the user interface, allowing the user to multi-task within the application.
Here are some time-saving shortcut keys for navigating tabs within browsers and other applications.
|CTRL+Tab||Move to the next tab|
|CTRL+SHIFT+Tab||Move to the previous tab|
|CTRL+F4||Close the current tab|
|CTRL+SHIFT+T||(Firefox and Chrome) Open the previously-closed tab|
Using hotkeys works especially well when you’re composing in one tab, while referencing material in a 2nd tab. Hotkeys allow you to move back and forth without lifting your hands off the keyboard.
It’s that Turkey time of year again, and with turkey comes leftovers.
Here are some amazing ideas that transcend the turkey sandwich.
Proxy vs Firewall
I got asked the question recently, “What is the difference between a proxy and a firewall?”
I’ll paraphrase my simple analogy in response:
If you think of a firewall as a telephone, you can think of a proxy as a telephone operator.
As analogous to a firewall, you can think of calling the server via telephone, and then speaking directly to the server in order to make a request, and the server responds to you directly. The telephone might have some rules built in to it, about who you are allowed to call, and when (these are the firewall rules).
Extending this analogy, a proxy is like a telephone operator. Rather than make a request to the server directly, you are only allowed to call the operator. The operator receives your entire request, and then makes a separate call to the server. After passing the request to the server, the operator then receives the entire response from the server, and passes the response to you.
Now, imagine that the operator must consult a long list of rules to see if your request is valid before passing it to the server, and also must compare the server response to another long list of rules to ensure that it’s valid before passing the response back to you. This is known as filtering.