MakeUseOf

Gavin Phillips-Technology Explained Section Editor

Gavin Phillips

Technology Explained Section Editor

Page 48

About Gavin Phillips

Gavin is the Technology Explained Section Editor, co-host on the Really Useful Podcast, and a frequent product reviewer. He has a degree in Contemporary Writing pillaged from the hills of Devon, and more than a decade of professional writing experience. He enjoys copious amounts of tea, board games, and football.

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
high-gain-antenna-router 1
How to Attach a High-Gain Antenna to a Router (And Which One to Buy)

You can attach a high-gain antenna to your router for a boosted signal. But is it worth it? Here's everything you need to know about it.

slack-encryption 1
How to Keep Your Slack Messages Private Using Shhlack Encryption

Sending messages on Slack isn't secure, so what can you do? Well, you could install the Shhlack encryption tool to keep your Slack messages private.

mylobot-malware 1
What Is Mylobot Malware? How It Works and What to Do About It

Every so often, a truly new malware strain appears. Mylobot is a perfect example. Learn more about what it is, why it's dangerous, and what to do about it.

graykey-iphone-threat 1
What Is GrayKey? A Tool That Breaks iPhone Encryption and Passwords

Encryption is vital for privacy and security, but iPhones are now at risk thanks to GrayKey. Read more about GrayKey and why it has Apple so worried.

improve-google-drive-security-privacy 1
3 Useful Tools to Improve Google Drive's Security and Privacy

Is Google Drive's integrated encryption enough to keep your private files safe from theft and intrusion? Let's find out.

windows-10-iot-core-raspi 1
How to Install Windows 10 IoT Core on Raspberry Pi 3

Windows 10 is available on a range of devices, including the Raspberry Pi, thanks to the Windows 10 IoT Core. Learn what it is and how to get started.

amd-ryzen-intel-coffee-lake 1
CPU
The CPU Showdown: AMD vs. Intel (Ryzen vs. Coffee Lake Comparison)

Wondering whether an AMD or Intel CPU is right for you? We compare each company's current offerings at various price points.

windows-10-privacy 1
The Complete Guide to Windows 10 Privacy Settings

Do you know how much personal data you're actually sharing when using Windows 10? We show you every single Windows 10 privacy setting and what they mean.

Windows 10 homescreen 1
How to Fix the Master Boot Record in Windows 10

The Master Boot Record can become corrupt, damaged, or simply disappear. Here are the fixes you can attempt to revive your system.

best-free-3d-soft 1
The Best Free 3D Modeling Software

Most 3D modeling software is prohibitively expensive. Luckily, there is also an excellent range of full-featured free 3D modeling software for you to explore.

intel-spectre-vulnerability 1
Intel's Spectre Vulnerability Returns Like a Ghost from the Past

The Spectre/Meltdown revelations in early 2018 shook the computing world. Now, security researchers have uncovered eight new Spectre-style vulnerabilities affecting Intel CPUs, which could mean your computer is at further risk.

types-virus-scans 1
The 3 Types of Antivirus Scans and When to Use Each One

Scanning your system with an antivirus program is important for keeping your system secure. But which type of antivirus scan should you use? Full, Quick, or Custom?

election-hacking 1
How Does Election Hacking Work? Everything Explained in Simple Terms

Wondering what election hacking actually means and involves? We'll explain it in a straightforward way.

cloud-act-damage-data-privacy 1
How the CLOUD Act Will Damage Your Data Privacy Forever

The CLOUD Act eliminates any protection for overseas data, allowing government agencies to pick and choose where they take your data from.

botnet-hackers-use 1
How Hackers Use Botnets to Break Your Favorite Websites

A botnet can take control of web servers and take down your favorite websites, or even entire portions of the internet, and ruin your day.

baby-monitor-threat 1
How to Know If Your Baby Monitor Is a Security Threat to Your Family

If your baby monitor is connected to the Internet of Things, it could mean your baby monitor is a security threat.

url-spoofing 1
How to Stay Safe Online and Avoid URL Spoofing

Scammers are using lookalike website addresses to trick you into visiting fake sites. How can you avoid falling victim to this trickery?

amd-ryzen-good 1
The New AMD Ryzen Vulnerabilities Are Real: What You Need to Know

Sadly, there's a lot of truth to recent reports of critical vulnerabilities in AMD Ryzen CPUs.

word-password-recovery 1
The 5 Best Microsoft Office Password Recovery Tools That Actually Work

There are some great programs that remove or recover Microsoft Office password protection. Here are some of the best you should consider.

russian-bots-social-media 1
Don't Be Fooled: How to Spot a Russian Bot on Social Media

How can you know if the person you're passionately "debating" with online is a real person and not a Russian bot? Use these guidelines.

46 47 48 49 50
Page 48 / 60