Hackers continue to think of new ways to get around security blocks on websites. Their goal is to bypass your user authentication process and gain access to sensitive data. Two-factor authentication (also known as 2FA or two-step verification) is one way to stop them in their tracks. This article explains two-factor authentication, the security process, and highlights what you need in order to implement it on your site.
"Musings" may not be the perfect title for this category. Much of what you will find here cannot exactly be described as "reflective" or "thoughtful" or even remotely "meditative". But I often write stuff that I just can't fit in any of my other clear-cut categories (and for some reason, I may think the content transcends my "Zero Code Tech" category). I dump all such stuff into this "musings" category. So yeah, the content in this section will probably always be tech stuff still. If I ever start posting reflective/meditative content (I doubt if that will happen anytime soon), then I will rename my categories accordingly.
Wearable technology can still be considered new technology today. Wearables include new smart watches, smart fitness bands, etc. Programming apps for wearables is different from development for mobile devices or desktops. This article highlights some basic concerns for programmers who want to embrace the new world of developing apps for wearable devices.
In a world where technology is constantly moving forward at an alarming rate, it sometimes seems odd when people are still using things like typewriters, fax machines, dial-up Internet, and landline phones. However, while many of these old technologies are becoming increasingly relegated to small niches, they continue to play an important role behind the scenes of modern society. This article takes a look at ten such technologies.
When your Wi-Fi signal goes down, so do all your cool high-tech devices. This article provides two tips you can use to boost your Wi-Fi signal without spending a dime.
While drones may be well known for military applications, there are many other evolving practical applications. Unmanned aerial vehicles are controlled by on-board computers or remote devices and the FAA currently estimates that as many as 7,500 small commercial Unmanned Aircraft Systems (UAS) may be in use by 2018, assuming the necessary regulations are in place. This article explores some different practical applications of drones, including storm forecasting and more.
Since the Snowden saga, everyone and their brother is now paranoid about government snooping and the privacy of their data and devices. There are discussions around how the big tech companies are misusing our data and how the government has access to all our social media information and chat history. We however, need to remember that the worst of the bad guys (at least for regular internet users) are not the government or social media companies at all. The more dangerous security and privacy threats are still regular hackers who are out to steal our data and use them for nefarious purposes.