Two-factor authentication is the official name for it, but I’d describe it as a verified login, because it is way easier to understand, and it also indicates its purpose better. In our digital age where identity theft can be a real issue, it is very important to secure your email account properly. Hackers may target your mail service to gain access to your social networks and scam your friends. However, with a verified login you are extra secured against such attacks.
I love to listen to good music, and on the go I found the in-ear headphones from Sennheiser to be of good quality and affordable in price. I’ve owned the CX 300 before, but one day it didn’t survive Hong Kong’s rush hour, and I needed a new pair. The CX 880i came to the rescue and this is where Senn and Siri fell in love.
High speed internet is a fact. At the moment of writing this is usually delivered as fiber-to-the-home (FTTH) connections with speeds ranging between 10, 100 and even 1000Mbit. However, is your home network ready to handle that extra pressure? If you are planning to upgrade your DSL or Cable connection to Fiber, have a look at the following 5 tips to prepare yourself for the upgrade.
Have you ever wondered how computers turn ones and zeros into actions, or what others may even call magic? There are no gnomes or unicorns hidden in computers, but Petzold does take you on a magical ride through computer history and starts all the way at the beginning.
A new weblog is born, on the magical date 12-12, 2012-01-02 or January 2, 2012.
This weblog will be a brain output for main author Bart Verkoeijen, and the content will focus on IT related topics for different audiences like end-users, IT folks and entrepreneurs.
In the coming weeks the structure will be defined and the template updated.
I wish you happy reading and please feel free to leave a comment!