Paul Mah

Author Archives: Paul Mah

11 ergonomic gadgets your body will love

Ergonomics – they do a body goodImage by ThinkstockDo you work long hours on your computer? If so, we know the feeling and have identified a list of gadgets that you can use at your workstation, and which offer the necessary support and comfort as you work. While some may require making some adjustments or take some getting used to, your body will grow to love any of these devices -- in the form of reduced aches and pain.To read this article in full or to leave a comment, please click here

5 secure habits of the paranoid PC user

We know how it goes: You mean to practice safe computing habits, really you do. But when you fire up your computer, you just want to get stuff done -- and that's when even savvy users begin to cut security corners.We'd all do well to take a lesson from truly paranoid PC users, who don't let impatience or laziness stand in the way of protecting their data. Let's take a look at some of their security habits that you may want to practice regularly.After all, staying safe online doesn't have to be onerous or time-consuming. Invest an hour or two this weekend to put a few safeguards in place, consciously start to practice a few good habits -- and before you know it, your good intentions will become a daily reality.To read this article in full or to leave a comment, please click here

5 secure habits of the paranoid PC user

We know how it goes: You mean to practice safe computing habits, really you do. But when you fire up your computer, you just want to get stuff done -- and that's when even savvy users begin to cut security corners.We'd all do well to take a lesson from truly paranoid PC users, who don't let impatience or laziness stand in the way of protecting their data. Let's take a look at some of their security habits that you may want to practice regularly.After all, staying safe online doesn't have to be onerous or time-consuming. Invest an hour or two this weekend to put a few safeguards in place, consciously start to practice a few good habits -- and before you know it, your good intentions will become a daily reality.To read this article in full or to leave a comment, please click here

12 apps Windows power users must have

Windows power users, ftw!Are you a Windows power user?You know, the guy who everyone approaches when they’re having trouble with their computer. The guy who knows all the shortcuts, tricks and tips for just about any app or program on said computer. The guy who has an app for something most people didn’t even know you could do, let alone have an app for.To read this article in full or to leave a comment, please click here

How to set up a portable, non-cloud-based password manager

Nothing helps strong passwords become a central tenet of your electronic life than conscientious use of a password manager. However, the compromise of at least one cloud-based password manager last year and recent actions by a government agency may have given you second thoughts about using the cloud for something that instinctively feels like it should be managed locally.Those incidents aside, password managers remain the best way to avoid reusing weak passwords which is as commonplace as the number of password leaks that happen every year, even on large, reputable websites. And, if you don’t mind putting in a modicum of effort, you can still establish a non-cloud-based password manager that can be utilized across multiple devices.To read this article in full or to leave a comment, please click here

8 ways to fend off spyware, malware and ransomware

Spyware, malware, phishing and, more recently, ransomware -- the list of online threats can be confusing and daunting. Knowing what you’re up against is half the battle. Each of these types of attacks have specific characteristics:Spyware – software that collects information about you or your computer without your knowledge.Malware – a broad category of software (including viruses, worms, Trojan horses, etc.) that damages your computer, in either a minor or major way.Phishing – an attempt to get your personal information (usernames, passwords, credit card numbers and), usually for nefarious reasons. Usually accomplished by electronic communication (e.g., email), but also by "social engineering" (tricking people into abandoning standard security protocol).To read this article in full or to leave a comment, please click here

10 things to do before you lose your laptop

Whether you’re in the office, at home, in school, or at coffee shops and hotels around the world, laptops are everywhere. The portable computer allows you to stay in touch and do productive work regardless of where you may be physically – especially when you factor in the extended battery life and cloud-based computing applications and services.On the other hand, the sheer portability of the laptop also makes it vulnerable to unauthorized access or outright theft or lost. Gartner recently estimated that a laptop is lost every 53 seconds.MORE ON NETWORK WORLD: 6 simple tricks for protecting your passwords While nobody plans to lose a laptop, there are some things that you can do to reduce both the risk and the potential legal repercussions should your laptop ever be misplaced or stolen. As with most security measures, the best defense is a good offense. Here are 10 things to do before you lose your laptop.To read this article in full or to leave a comment, please click here

7 reasons to ditch your iPad for the Surface 3

Microsoft’s Surface 3 tabletImage by ShutterstockMicrosoft is releasing its new 10-inch tablet that runs on Windows 8.1. With a starting price of $499, the Surface 3 is pitted squarely against Apple’s iPad Air 2 tablet, and is a highly compelling option if you are looking to get a new tablet or replace your iPad.To read this article in full or to leave a comment, please click here