The Hi-Tech Redneck ® has 20+ years of IT and Technical Trades experience. Working with people, or on my own, I strive to do the best job possible in the best manner possible. Keep in touch: Twitter - Google+
Feel free to contact at email@example.com
Guy's Latest Posts
When your USB port stopped working, did you just plug your device into another one? Well, you might need that port one day! The fix could be easy, so let’s give it a try.
Someone performed a factory reset on their wireless router and now they’re calling you for help. “I don’t remember the username or password!” they lament. As the go-to tech person for all your friends, you know what it is, or at least where to find it, right? You do, right?! Don’t worry if you don’t […]
Free. That’s my favourite brand of anything! It’s probably your favourite too. You know what’s even better than plain old free stuff? Free stuff on YOUR BIRTHDAY! Around where I live, there are a couple restaurants that offer a free meal or dessert on your birthday. I know, they just want you and and fifty […]
Did your TV remote control suddenly go dead? Wireless mouse died near the end of your term paper? Need AA batteries and all you have are AAA? I’ve got a quick hack for you to get you through those last minutes until you can get to the shops for some proper batteries. Time needed is about 5 minutes, supplies needed cost about 50 cents – not including your AAA batteries. You may very well have all these items on hand.
Microsoft is still in the innovation business. If you don’t think so, you haven’t heard about Microsoft’s open source electronics prototyping platform called Gadgeteer. You read that right – Microsoft and Open Source in the same sentence. Wanted to build a little invention you had in mind? Maybe you’re already programming C# and would like to work with some different hardware. Are you a technology teacher looking for a platform with which to teach? From the student to the professional, Gadgeteer can help you make your ideas a reality.
Need. Want. One is a four letter word and the other is a necessity. Listen up and heed this old man’s words as I get you set to go back to school, do some real learning, and save thousands of dollars by not buying into this computer fad. Look at me! I got an iPhone! Look at me! I can film my lectures! Look at me! I made a spreadsheet that does my arithmetic for me!
Did you ever get an e-mail and really wondered where it came from? Who sent it? How could they have known who you are? Surprisingly a lot of that information can be from from the e-mail header, or by using info from the email header to do some detective work. Today, we’re just going to focus on how to unhide the header in Gmail, and then look at what we can glean from the header.
Did you read our article, At What Age Should Kids Be Exposed To Technology? You should. Dave Parrack did a great job of compiling the results. Here’s the thing – kids going to introduce themselves to technology, and chances are it’s going to be when you aren’t looking! If you’ve got kids, you know that […]
Total privacy! Or so we think, as our words and information went flying through the air. Not so: First it’s word of warrantless wiretapping, then it’s word of newspapers, lawyers, insurers and more hacking your communications, who’s next? How do we stop this? Unfortunately, laws are very after the fact, so you need to take some measures right now. This is where we look at how to secure your smartphone communications to make cherry-picking your information a lot harder.
The Pebble E-Paper Watch (which we’ve just reviewed and will be giving away) has a lot of interesting functions, is highly customizable, and raised over $1 million within 28 hours of being put on Kickstarter. Maybe the Pebble isn’t exactly what you want though. Maybe you’d like a different look or functionality. Money talks, and these other smartwatch innovators are ready to listen. Some of these are concepts and some are already on the market! Which one do you want? Maybe all of them?
Kids can be cruel. Almost as cruel as so-called grown-ups. That cruelty has found its way on to the web and into the lives of countless young people who thought they might be able to escape the harassment by enjoying their on-line pursuits. It is very likely this is the story of an untold number of girls and boys the world over.
Personal privacy is the hot topic these days, at least in the news. It should also be the hot topic in your computing life, as well! What you do online and on your computer says an awful lot about you and, in the hands of the wrong people, can prove disastrous. Oh, fine, at least we have a password on our computers. But let’s say we are doing something where privacy really does matter. Imagine we had a benevolent reason to cover our tracks. On to some tools that will help us do just that!
With the Prism-Verizon scandal, what allegedly has been happening is that the United States of America’s National Security Agency (NSA) has been data mining. That is, they have been going through the call records of Verizon’s approximately 99 million users looking for, well, anything! If the thought of the occasionally overzealous government official isn’t enough reason to encrypt your smartphone, then all the identity thieves and scammers out there ought to be. Today, I’m going to show you a few things you can do to make that information a bit more secure.
Last week it was officially announced that the United States National Security Agency (NSA) has been mining data from cellular service provider, Verizon. People were, and are, freaking out! How could the government do such a thing? What kind of totalitarian state are we really in?