Manage teams better by delaying your email! Improve productivity by slowing down your email. Email programs increasingly include the ability to schedule your emails. You can choose when they are sent – in the future, not the past. (They’re not…
Email hacker pest control
Check your forwarding rules. Email security is critical for everyone. It’s the account that controls most of your others. Need to reset a password? Or verify your identity for other reasons? You’ll probably get an email with a link. If…
The 10 laws of computer security
Basic principles of IT security don’t change. Microsoft published a list of 10 computer security “laws” that do not change over time. These “immutable laws” (amusingly published as version 2.0) give a good, largely non-technical shot of reality into data…
Podcasting workstation problems solved!
Manage your podcasting hardware the professional way. Introducing the Advanced Podcast Platform™ from DE:CODED. This unique device solves all of your podcasting workstation problems. Podcasting workstation problems solved! Our ingenious, hi-tech mobile podcast platform solves all of your podcasting workstation management…
The Coming Mac Threat (Revisited)
How we viewed security for the Mac in 2008. This is a republished article from MacUser magazine. In The Coming Mac Threat (Revisited) we look at how experts perceived security for the Mac back in 2008 and how well that…