Android Apps Screenshot

This article will show you how to easily enable Developer Mode on Android phones which will provide you with access to the Developer options menu. Let’s get started!

 

Read more

Windows Logo

In some Windows 11 Pro installation instances, which I won’t cover here to keep this article short, Windows 11 Pro will automatically enable BitLocker software based encryption on your solid state drive (SSD). Not sure if this auto-enabling occurs on traditional mechanical hard drives, let me know in the comments section.

The particular Windows 11 Pro installation on my Intel NUC 12 fell within the Microsoft threshold of auto-enabling the BitLocker software encryption. This was without my knowledge nor was I allowed to configure the encryption password or separately store the encryption key. My initial inspection leads me to believe that Microsoft simply uses your Microsoft Account password as the BitLocker encryption key but I have not confirmed this. Let me know in the comments section.

Also, when I originally setup my Windows 11 Pro installation, I used a local account instead of a Microsoft Account. I assume that when I accessed my Microsoft Account to connect my Microsoft 365 software (such as Word and OneDrive) Windows configured BitLocker at that time. I could be completely wrong, but the fact that BitLocker was enabled without my knowledge is a fact in my particular case.

It wasn’t until I discovered an article on Tom’s Hardware regarding “Windows Software BitLocker Slows Performance” that I became aware of a potential performance implication. In that article is covers how the BitLocker software encryption feature can slow an SSD by up to 45%.

This article will cover what I did in order to disable BitLocker software encryption on my SSD since I prefer daily maximum performance over the (in my opinion, false) sense of security provided by encrypting the data on my drive. Encrypting my data may also make data recovery more difficult should the need arise, but I may be incorrect there as well.

Read more

Email Protection using SPF, DKIM, DMARC

Tired of having your emails go into client junk / spam folders? You can increase the deliverability of your emails while protecting your brand and clients using free tools to create SPF, DKIM and DMARC records. With these free records in place, you can help block phishing, ransomware, and spam messages.

Email service providers like Gmail and Office 365 are increasingly sending unauthenticated emails to spam or rejecting them outright. This article will show you how to add an SPF, DKIM and DMARC record to your domain to help prevent this while keeping most malicious actors out. Note, this article is only intended for my personal use and comes with no guarantee of any kind.

 

Read more

If you come across an article or website which shows a paywall, the following website will assist you with bypassing the paywall: https://12ft.io

Alternatively, you can simply append the web address to the end of the 12ft.io URL as demonstrated below:

EXAMPLE: https://12ft.io/thewebsite.com/article-with-paywall

 

Conclusion

I hope my article on bypassing any paywall has helped you. I welcome your thoughts, questions or suggestions regarding this article.

You may support my work and future improvements by sending me a tip using your Brave browser or by sending me a one time donation using your credit card.

Let me know if you found any errors within my article or if I may further assist you by answering any additional questions you may have.

 

Windows Logo

Using a free network monitoring tool such as WireShark we can see that several discrete and background connections are made without our request when simply accessing our computers.

In this article I provide a few simple hosts file entries to help increase our privacy.

 

Read more

Windows Logo

To ensure that a file has not been tempered with or was corrupted during a transfer or download we can verify the checksums with tools built into Windows.

This is a crucially important for security purposes, especially if you install software from a source other than an official site. If the file has been changed it could contain malware that spies on you or takes your data hostage, for instance.

The checksum verification tool you use is also important which is why I recommend using the built in Windows PowerShell and certutil tools.

In this article I provide simple and quick Windows commands to verify MD5 and SHA256 checksums.

 

Read more

Windows Logo

Both the PowerShell and Command Prompt tools may be used to configure various system settings or access various apps. However, most Windows users will never need to use these tools directly. But because they exist and are accessible, it is often recommend to disable them to help prevent a malicious actor from utilizing these dormant tools against said users.

To help increase your cybersecurity it is recommend to toggle off the Command Prompt on your Windows based PC. You can then toggle the Command Prompt back on as needed.

Within this article I will show you how to disable (and re-enable) the Command Prompt on your Windows PC. You may also be interested in my other article on how to disable PowerShell on Windows.

 

Read more

Windows Logo

Both the PowerShell and Command Prompt tools may be used to configure various system settings or access various apps. However, most Windows users will never need to use these tools directly. But because they exist and are accessible, it is often recommend to disable them to help prevent a malicious actor from utilizing these dormant tools against said users.

To help increase your cybersecurity it is recommend to toggle off PowerShell on your Windows based PC. You can then toggle PowerShell back on as needed.

Within this article I will show you how to disable (and re-enable) PowerShell on your Windows PC. You may also be interested in my other article on how to disable the Command Prompt on Windows.

 

Read more

Windows Logo

Recently used my Microsoft Authenticator to access an email address on my mobile phone which I only needed temporary access to. After which I removed the email account from Outlook on my phone only to have it remain (greyed out) within Microsoft Authenticator.

To remove the greyed out account from Microsoft Authenticator I had to go to my phones’ “Settings” then “Accounts and backup” followed by “Manage accounts“. To my surprise, even though I deleted the email address from Outlook, the email account was still there. Once I removed the email address and reloaded Microsoft Authenticator the greyed out account was gone.

Conclusion

I hope sharing my experience on how I successfully removed an unwanted, greyed out account from Microsoft Authenticator has helped you.

You may support my work by sending me a tip using your Brave browser or by sending me a one time donation using your credit card.

Let me know if you found any errors within my article or if I may further assist you by answering any additional questions you may have.

 

Windows Logo

WARNING! The instructions herein are for my own personal use to jog my memory since I keep forgetting to take my memory pills. These instructions may be wrong and may cause you to lose all of your stored two factor authentication codes. This will obviously prevent you from accessing your two factor authentication enabled accounts. Do not attempt to synchronize your Microsoft Authenticator between devices using this article. Now back to jogging my memory.

 

Read more