The Get Windows 10 program (popularly referred to as GWX) was officially ended on July 29, 2016. This seemed to imply that the only legal way of upgrading to Windows 10 going forward was to buy it. This article explains how a free Windows 10 upgrade can still be done even though the GWX app has been removed from old Windows versions.
Zero Code Tech
...because I also write quite a lot of tech stuff that isn't necessarily programming. Every article in this category is a technology article. Some are even problem-solving (or how-to) articles. But generally, they contain zero code (or maybe very little generic code). If you love tech, but are not exactly a software developer, you should be able to follow and appreciate the content in this section.
These days, cloud solution providers everywhere are marketing “serverless” solutions. While serverless computing is not at all new, it is getting a lot more attention due to the increasing popularity of DevOps and cloud in general. The promise is that serverless will eventually replace how developers currently create software and how this software is managed in production by operations. This article provides an introductory look at serverless. What exactly is it? And what additional advantages does it offer to the DevOps process?
Out of all the malware currently being distributed around the internet, ransomware is one the most terrifying ones. Using scare tactics, it seeks to force people to pay a ransom, else lose all their important files for good. Fortunately, as scary as it is, ransomware can be easily avoided by taking a few simple precautions while online.
SQL injection is a form of hack that lets the hacker run SQL code against your database. Hackers can steal or destroy data, but they can also insert malicious code into your database. SQL injection is common on WordPress sites. If you own a website and download plugins on your site, this article will help you understand how SQL injection works and what you can do to be protected from it.
Saving a password in a browser might seem like a bad idea from a security perspective. But not really. For certain types of malware, saving a password in a browser could actually be a security measure. Very specifically, it can add a layer of security against keyloggers. This article explains what keyloggers are, and how saving your password in your browser could protect you against them.
Referrer spam is a black hat marketing technique that spoofs user agents and tricks webmasters into visiting a malicious web host. Referrer spam shows up in your traffic reports such as Google Analytics, and some webmasters are concerned that the spam affects SEO and search engine rank. This article describes referrer spam and how you can deal with it.