Home Network Upgrade, Part II

b

(And in case you missed it, here’s link to Part I)

A home mesh network typically is comprised of 2-3 devices, doing triple duty as a router, a range extender and a wireless access point.

For example: You buy a system of 3 devices. They can be interchanged, and whichever you pull from the box first will get plugged into the cable/DSL modem and act as the primary router. The other 2 (or more) generally puck-shaped devices can then be plugged in and set around your house, and they’ll automatically pair with the primary puck to act as additional access points. This system of pucks will determine how best to share your internet signal between each other, and also among all the client devices asking for WIFI. This is often orchestrated by an app on your phone or tablet.

Phishing, Part II

Phishing-man

With all the security issues in cyberspace, I’m sure everyone has either heard of “phishing” or been targeted by it. If you have not, I’ll explain what it is and how to avoid being a target. Let’s start with the definition: phishing is the act of defrauding someone online by posing as a legitimate company or person. Simply put, phishing occurs when hackers pretend to be someone or something they are not — to steal from you.

The Cost of Convenience

l7j9i

Anyone who knows me knows that I loooove me some Google. I use Google services, applications, and products at every feasible opportunity I find. Their applications and products play well with others (unlike Apple) and the ecosystem that Google has built allows for things like real-time information right when I need it. I’m talking about the kinds of things that are actually useful like arrival/departure information for mass transit, based on the stations nearest to me at any given time.