Protect Yourself from Phishing Scams

They want your passwords.  Hackers use a technique called phishing to get you to unknowingly tell it to them.  The technique is simple and clever, but if you know the simple things to look for then you’ll never be duped. How Phishing Works: Hackers send you an email...

How to remove your Google Web History

March 1 is the day Google’s new unified privacy policy goes into effect, which means your Google Web History will be shared among all of the Google products you use.  You can opt out of this tracking if you like.  The link below contains information about this...

Help Protect The Internet

There are two bills before congress that would enable the U.S. government to censor what Web pages we are able to see. Please sign Google’s petition to help keep freedom alive online. Take Action

Protecting Your Computers in a Storm or Hurricane

Hurricane Irene is on the way. Electrical storms can severely damage computers and other electronics.  Not only are your computers at risk but so too are any peripheral devices such as external hard drives, printers, routers, etc. At first sign of electrical storm...