Windows Logo

Recently used my Microsoft Authenticator to access an email address on my mobile phone which I only needed temporary access to. After which I removed the email account from Outlook on my phone only to have it remain (greyed out) within Microsoft Authenticator.

To remove the greyed out account from Microsoft Authenticator I had to go to my phones’ “Settings” then “Accounts and backup” followed by “Manage accounts“. To my surprise, even though I deleted the email address from Outlook, the email account was still there. Once I removed the email address and reloaded Microsoft Authenticator the greyed out account was gone.


I hope sharing my experience on how I successfully removed an unwanted, greyed out account from Microsoft Authenticator has helped you.

You may support my work by sending me a tip using your Brave browser or by sending me a one time donation using your credit card.

Let me know if you found any errors within my article or if I may further assist you by answering any additional questions you may have.


Windows Logo

WARNING! The instructions herein are for my own personal use to jog my memory since I keep forgetting to take my memory pills. These instructions may be wrong and may cause you to lose all of your stored two factor authentication codes. This will obviously prevent you from accessing your two factor authentication enabled accounts. Do not attempt to synchronize your Microsoft Authenticator between devices using this article. Now back to jogging my memory.


Read more

Google Authenticator versus Microsoft Authenticator

Recently switched my 80+ Two Factor Authentication Accounts application from Google Authenticator to Microsoft Authenticator on my Android phone and am very happy with the switch. It may also be worth noting that Microsoft Authenticator currently has a 4.6 star rating whereas Google Authenticator only has a 3.7 rating.

Even with that, I was reluctant to switch over. After all, I have over 80 accounts to manually port over. So I started out with only a few everyday accounts and once I obtained greater confidence I made the full conversion over.


Read more

Cortana Logo

Microsoft has, yet again, proven it has no ability to be original or creative with their integration of a digital personal assistant, called Cortana, into Windows 10.

This new built-in feature is just as unhelpful as it is annoying. It’s like Microsoft doesn’t even use their own products. On top of that, it is yet another invasion of my privacy.

For those of us who just want to search for a file on our PC, and nothing or nowhere else, the following instructions will help you do so. This will help you turn off and disable Microsoft’s Cortana from your Windows 10 computer as well as disable the Bing search results from the Start menu.


Read more

Google Chrome Logo

Don’t be evil” was a motto originally used by Google. A lot has changed!

A former Google employee is blowing the whistle on his former employer’s business practices. The whistle blower claims that Google has created algorithms to hide its political bias within artificial intelligence platforms – in effect targeting particular words, phrases and contexts to promote, alter, reference or manipulate perceptions of Internet content. This former employee has delivered roughly 950 pages of documents to the United States Department of Justice’s Antitrust division Friday, August 9th, 2019. He has also sat down with Project Veritas in a revealing interview which we highly recommend you view below.

Regardless of your political leanings, if companies are permitted to lie to the public and to congress about their business practices it opens the way for them to become malevolent. We all can agree that this would help no one and, due to their size, may hurt millions of unwitting participants.



Read more

Firefox Logo

Web site domain names, like, are simply a human friendly representation of Internet Protocol Address (IP Address). Rather than typing in or memorizing the four sets of three numbers (IP4) for, developers came up with the Domain Name Server (DNS) protocol. When you type in any domain name, this protocol looks up the associated numerical address and tells your browser where to go. Think of it as a hidden operator directing traffic on the world wide web.

The DNS over HTTPS (DoH) protocol works similarly to how the normal DNS protocol works. The major difference is the added privacy that it provides by encrypting your web related request and traffic. DoH takes your DNS query and sends it to a DoH-compatible DNS server via the encrypted HTTPS connection.

This way, DoH “hides” your DNS queries inside regular HTTPS encrypted traffic and bypasses the default DNS settings that exist at the operating system level. In most cases these are the ones set by your local internet service provider (ISP). What this means is that third-party “observers” won’t be able to “sniff” your web traffic and tell what DNS queries you have run and discover what web site(s) you are accessing. Best of all, the DoH protocol works at the App level as well!

Currently, only Mozilla’s Firefox browser has released instructions for enabling use of this protocol, but you’ll have to manual enable it. See instructions below on how to do just that.


Read more

WooCommerce WordPress eCommerce

A design flaw within the WordPress permission system and the eCommerce plugin, WooCommerce, could allow someone to alter account privileges on your WordPress website.

According to new research by Simon Scannell, a researcher for PHP Security firm RIPS Tech, when WooCommerce is installed it will create a Shop Manager role. The Shop Manager user role has the “edit_users” WordPress capability/permission enabled. This capability allows users to edit any WordPress user.


Read more

IDNS Internet Domain Name Services SCAM Letter

 We recently sent out a domain name renewal reminder to a client who replied that they had already renewed.

Suspecting a game was afoot, we requested a copy of the letter they received. Upon receipt it was apparent they had fallen for a common internet scam.

The letter they received was from a company called iDNS or Internet Domain Name Service. Sounds legitimate and the letter (as seen in this article) looks professional and legitimate. A closer look at the fine print you’ll notice that it is just a trick to get you to switch your domain registrar to them. On top of that, they are charging three times (3x) what we and most registrars charge for annual domain name registrations and renewals.


What should I do If I get a letter from iDNS?

Read more

Gmail New Confidential Message Feature

Google’s Gmail service recently released a new feature called “Confidential Mode“. This allows you to set how long an email is available for viewing by your intended recipient(s).

As you can imagine, after the set expiration date, the email message is simply and automatically removed from the recipients inbox. Recipients will not have the option of forwarding this email, coping the email contents, or even printing it out.


However, it is still possible for a recipient to simply take a photograph or screenshot.


Read more

Free SSL Secure Socket Layer Certificte Website Host Naples, Florida

As you may be aware, Google has begun enforcing their ‘secure by default‘ initiative. This means that they have begun marking all non-HTTPS websites, meaning websites without a secure socket layer (SSL) certificate installed, as ‘Not Secure‘ as of July 2018.

This ‘Not Secure‘ warning, visible within the address bar of Google Chrome, may scare off less technology savvy visitors. More importantly, not having an SSL installed on your website may negatively impact your website’s search ranking. It is rumored that Google may now be using the existence of an SSL certificate as a search engine ranking metric.


With this knowledge, our Naples based website design, maintenance and hosting firm has decided to provide free secure socket layer (SSL) certificates to all of our existing and future clients who have a hosting and maintenance account with us.

Manny Rodrigues, CEO @ENDURTECH


Read more