Google Voice's Screening feature allows you to configure your phone's reaction to calls from outside your contact list. Actions include sending directly to voicemail or asking for the caller's name. You can keep your normal phone number, or you could even get a whole new number! An alternative is Nomorobo for iOS, which compares a caller's number to known scammers/robocallers. However, it requires a paid subscription, unlike Google Voice.
The Tech Guy Blog
If you're going to use antivirus software, you may want to choose something other than Kaspersky. While Leo believes Eugene Kaspersky, the CEO of Kaspersky Lab, is a great person, his company is Russian and may be prone to manipulation or seizure by the Russian government/military. In any case, Leo simply recommends excellent alternatives with less baggage. While we don't know for sure what goes on with companies like Kaspersky or Huawei, it's best to err on the side of caution.
If you're going to buy a hub for home automation, Leo recommends purchasing from a tech company that's dedicated to IoT. Samsung SmartThings is a good, safe choice, and they use the Zigbee and Z-Wave protocols. Apple is making it difficult for companies to support Homekit, and Google has its own items that they may pull the plug on anytime. Unfortunately, a company like Lowe's just isn't big enough to support the breadth of the internet-of-things, which is why their IRIS service is being discontinued.
If you have an old computer that no longer will power on, you may be wondering how to transfer the data from the hard drive to a new system. Fortunately, this could be as easy as plugging in an external USB hard drive and just copying the files over. The USB Universal Drive Adapter from Newertech makes that possible.
If you need to transfer your data from an old phone to a new one, there are a few ways to do it. First of all, check to see if your data is already being synced to the cloud. Data such as email, contacts, and calendars are likely already stored with Google or Apple's iCloud. You can verify this by logging into your Google or Apple account from a web browser and checking to see if the data is there.
If you've seen a warning message or a popup online telling you that you've been hacked and that you need to take immediate action, chances are good that it's just a scam. These are nothing more than scare tactics designed to make you fall for something, whether it be giving your information or actually making a payment. But with all of the major security breaches happening, like the one at Marriott, there is some legitimate concern that your accounts could have been compromised. In other words, there is a chance you've been "pwned."
When testing your internet speed, you may have noticed that the numbers reported can vary quite a bit. Internet Service Providers quote a speed, but if you read carefully you'll notice the phrase "up to", which tells you that's just the maximum possible speed they can give. There are many factors that can contribute to the speeds you actually will get.
There's a lot of conflicting information about how to properly care for a lithium-ion battery (the kind of battery that is in your smartphone). There are basic things we know are bad for batteries, including extreme temperatures (hot or cold), overcharging, and complete discharging. Fortunately modern devices, including all smartphones today, are built to protect the battery automatically. For example, your phone will shut down before the battery is completely depleted, and it won't allow it to overcharge either.
If you've been in an accident or have suffered a major medical event that leaves you incapacitated, one of the first things that first responders will check is your phone for medical information or an emergency contact. Modern smartphones have created standards for this, and have made it easy for users to put in their information so that first responders have easy access to it. Here's how to put in your information on iPhone and Android phones:
One of the ways you can easily protect yourself against malware and viruses is by running as a "Standard" or "Limited" user in Windows. When you run as administrator, programs can easily get full access to your system, including those that might be installed without your knowledge. But when you run as a standard user, you may run into an issue where a program won't run because it requires more permissions. An example of software that would require additional permissions would be a screen recording program. When this happens, you can elect to run that individual program as administrator.