Category Archives: Uncategorized

Getting And Staying Healthy Gets Easier Using New Devices From Fitbit

fitbit oneStaying healthy and physically active is one of the hardest things to do. Working in an office with a hectic schedule tends to keep me so busy at my desk that I find it hard to make time for the exercise and activities I need, much less keeping track of what I have done. But I recently checked out a system called Fitbit that simplified my health activities. Continue reading

Some Of The Biggest Tech Scams Aren’t Criminal – They Originate From The Retailers

evil villainA subject that is very near and dear to my heart, the technology related scam. But scams don’t always come in the email, or social media, sometimes the scam is right there in front of you, and completely legal in the fact that you will agree to it, often even sign a contract. Extended warranties, insurance, and extra services that are offered are the staple of many tech companies. Here are a few of the more common scams that people fall for… Continue reading

Women In IT – Are We Waiting For A Revolution Before We Become Vocal

computer science womenA few years ago, it was noted that women in IT were not only few and far between, but even the highly successful ladies were strangely silent on this. Industry leaders vowed that they would take greater strides to balance the gender scales, and they did. Soon upstart companies were being formed exclusively employing women, and the companies are competing with others in their league well. Continue reading

Keeping Your Connection Safe: 5 VPN Providers That Keep (Or Don’t Keep) Anonymity Close To Heart

YT crackerWith the recent divulgence of certain records by a very popular VPN provider to certain government agencies, it has become painfully apparent that not all VPN providers see anonymity and privacy in the same way. And, for many of us, reading through the legalese that is the “Terms of Service” is confusing and will leave the reader with a head-ache that most medications couldn’t get rid of. Continue reading

US Border Checkpoint Quick Guide For Traveling Abroad With Digital Devices Part 2 – Protecting Your Data

various computersIn the first part of this article, “US Border Checkpoint Quick Guide For Traveling Abroad With Digital Devices – What To Consider” I discussed what to consider if you need to travel with your digital devices…citizenship status, schedule, etc. and if you are here, you have found that it could be necessary to have your more sensitive and private data with you during your travels, but want to protect it from theft and intrusion. Here, I’ll give you an idea of one of the best methods of doing just this, but again I caution: This guide is not meant to instruct those attempting to get illegal material past the US border, but to help the traveler pass through the US border checkpoints with a little hassle from agents as possible…

There are many online privacy advocates like UsenetReviewz, the EFF,VPNReviewz, and BackupReviewz, that assert that traveling with unused, or blank, devices, and while many find the idea appealing, aren’t sure of how to go about doing it. Here’s a few of the better methods of doing just this…

In The Clouds lists a lot of services that can keep your data safe from those pesky prying eyes. But with this method, you will need to weigh the amount of data you will need to access against the level of internet access that you will be able to get. If you will have to be using dial-up internet, and a lot of data to get to, then you may want to consider one of the other methods.

USB Devices

usb recommends encrypted USB storage that can be transported with your luggage, or separately from your person. Remember, if your device, and the USB device are both present when the agent starts inspecting the device, then you may be asked to open the device so the agent can inspect the contents. UsenetReviewz also advocates the use of USB devices that will “self-destruct” when tampered with, and if this is the case, keep a backup copy just in case.


This is perhaps the best method, and a home network that you can access from abroad is fairly easily set up. With this method also, internet access is of the utmost importance. No one wants to have to download GBs of data on a dial-up connection. Using this method only those with the proper identification will be able to access the data, either locally or from afar. is an excellent resource for those wishing to go this route.

Keeping It Simple

VPNR LogoThese are probably the most commonly used ways of keeping sensitive data secure away from thieves and the occasional government invasion. It all boils down to one simple rule: If there’s nothing to look at, then what can they look for? If there’s nothing to look at, then the inspection at the US, (or any other, for that matter,) border, will go faster, smoother, and with a lot less stress.