The internet has always been an incredible resource for information, but if you're motivated enough, you can take that a step further and get a free or inexpensive college education. MOOCs, or "Massive Open Online Courses," are real classes that have been made available online from schools and universities. Many of these courses are free, but if you decide to pay, you can actually get a certificate of completion or a MicroMasters from it. Here are some of the places you can find these MOOCs:
The Tech Guy Blog
Slow bootup times have always plagued many Windows computers, and it can often be tricky to figure out what causes it. Often times, it's as simple as a hard drive going bad. When hard drives start to wear out, the operating system can have difficulty reading all of the sectors on it. If it happens to come across bad sectors during the bootup process, it will have to repeatedly attempt to read that sector until it finally works. This can extend the time it takes to boot the PC up by several minutes.
If you have an iPhone, you may already be familiar with the Live Photo feature that it has. When Live Photos are enabled, whenever you take a picture, the iPhone will also capture a few seconds before and after the shot is taken. This gives the photo some motion, almost like a very short video clip. But you may not know that it can actually go beyond just that basic functionality. After you take a photo of something that moves, go to edit the photo and swipe up. This will reveal a few different effects that you can apply.
One of the best ways to make a backup of your drive is to create a "disk image." This will essentially take a snapshot of the drive and make it bootable so you can restore your PC to that moment in time if your drive crashes. There are a number of third-party tools that you can use to do this, but Microsoft actually has included the ability to create a disk image right within Windows. Here's how to get to it:
A company called what3words has set out to map the world in a new way, and it's coming to Mercedes Benz owners next year. Traditional addresses can be problematic — there are repetitive street names, homes and businesses are sometimes located far from the center of their postcode, and many locations don't have a formal address at all. what3words aims to solve these issues by giving every place in the world a 3-word address that's precise, simple and unique. Since it uses words and not numbers, it tends to be easier to remember and share with others.
Online ads have become increasingly pervasive and annoying over the years, so the effort to circumvent or block them entirely is no surprise. Some ads go as far as to completely obstruct content, and it can significantly slow down the responsiveness of the site as well. Some sites automatically start playing video and audio of ads or other content, which can interrupt something else you’re watching or listening to. It may seem like an obvious solution to install and run an ad blocker all the time, but this presents an ethical dilemma.
Leo has talked a lot on the Tech Guy show about using two factor authentication wherever possible to ensure the security of your online accounts. Two factor authentication requires more than just a 1 factor to login. This could include two of the following: something you are (such as biometrics like fingerprints or iris scans), something you know (a password), or something you have (a smartphone or hardware key). This could be called many things, including “Two-Step Verification” and “Two-Factor Authentication” depending on the site.
Finding Black Friday sales can be overwhelming and stressful, but Thrifter.com is focusing all of its energy to find the best deals for you. Every item on the site has been vetted by their team, and there are tons of categories to look through. This tip comes from Rene Ritchie, Editor in Chief at iMore.com, a site that's owned by the same parent company.
You may have heard about the latest Wi-Fi vulnerability in the news called “KRACK” or “Key Reinstallation Attack.” This is a security flaw in the WPA2 protocol that could allow a third party to intercept network activity between a router and a device. It does this by taking advantage of a problem with the way the client (your mobile device or computer) authenticates with the access point (the router).