The power supply (PSU) is a critical part of any PC. It powers all the components in your PC, and a bad or faulty one can bring everything down. Here’s what to look for in a power supply while putting together a PC. A PSU Is a Critical Piece of PC Infrastructure When we turn on a light, open a faucet, or walk down a nicely paved street, we don’t often think about the wondrous infrastructure making all that possible. But if somebody hadn’t taken the time to think about it, things wouldn’t be so wondrous. It’s the same when building a PC. We get obsessed with how many cores a CPU has or the number of compute units in a GPU . But rarely do we think twice about the power supply unit (PSU,) which provides power to everything else in your PC. You don’t need to think about your power supply too much, of course. But, if you don’t consider the PSU at all, there’s a good chance you’ll be thinking about it a lot once it starts causing problems. If your computer doesn’t get … [Read more...] about How Important Is the Power Supply (PSU) When Building a PC?
Why is doubting thomas important
One of the biggest promises VPN services make is that they don’t keep logs. It’s plastered across their websites and features prominently in their marketing material. But what are logs, exactly, and what makes for a “no-log” or “zero-log” VPN? What Are Logs? In short, a log—also called a log file—is the record of events between two servers. When you visited this web page, your computer reached out to How-To Geek’s server through your internet service provider’s networks. Both the ISP and our server made note of that in their logs. Logs are available to your systems administrator (your ISP or boss, if you’re at work) as well as the websites you visit. The log contains your IP address , the time you connected, and the duration of your connection. Though it seems like pretty innocent information, it can be worth its weight in gold to marketers. They can determine somebody’s general location using their IP , then figure out some of their browsing habits thanks to the … [Read more...] about What Is a No-Log VPN, and Why Is That Important for Privacy?
Mozilla Thunderbird recently integrated OpenPGP right into the main application. No add-ons are needed for email privacy. OpenPGP’s world-class encryption is easy to set up and use without additional software. Thunderbird and OpenPGP Version 78.2.1 of the Thunderbird email client has support for end-to-end encryption (e2ee) built right in. This integration means you no longer need add-ons like Enigmail . Thunderbird uses OpenPGP for encryption, which is a free, nonproprietary protocol. Based on the freeware versions of Phil Zimmerman’s Pretty Good Privacy (PGP), it’s now very much its own thing. Thunderbird’s OpenPGP integration allows you to encrypt a message. Then, only the people you want to read your message will be able to do so. It also lets you digitally sign a message so your recipient can be confident the message hasn’t been altered in transit. OpenPGP uses the principle of pairs of public and private (or “secret”) encryption keys. To use OpenPGP, you … [Read more...] about How to Use OpenPGP Encryption for Emails in Thunderbird
Smart speakers like the Amazon Echo and Google Nest Mini can make life easier, but they also present some privacy concerns. Doesn’t a device that responds to voice commands need to be listening all the time ? Let’s talk about that. If you think about how a smart speaker or smart display works, logic would tell you that they need to be constantly listening. After all, how can your device hear your “Alexa” or “Hey Google” command if it’s not listening? Well, you’re right. These devices are always listening, but it’s not as scary as it sounds. Listening vs. Recording When people hear that smart speakers are always listening, what they’re really afraid of is the possibility that the smart speaker is always recording them. That’s how humans listen, but that’s not what’s happening with smart speakers. This is an important distinction to make. When you listen to someone talk, you are essentially making a recording of the information in your brain. You remember what the … [Read more...] about Is My Smart Speaker Always Listening to Me?
Signal secures all your conversations with end-to-end encryption, offering more privacy and security than your average chat app. But Signal offers some other useful security options. Here’s how to take advantage of them. Enable Registration Lock to Protect Your Signal Account Your Signal account is tied to your phone number, with no need for a password at all. When you first register for Signal (or re-register a device at a later stage), Signal will verify who you are by sending a code to your number. Enter the code to prove you are who you say you are and you’re good to go. But what happens if someone gets access to your phone number? While this might seem like an unlikely eventuality, it’s within the realm of possibility. Someone could steal your smartphone’s SIM card or fool your phone service provider into transferring your number to a new SIM using social engineering techniques . With access to your phone number, someone could gain access to your entire Signal … [Read more...] about How to Make Your Signal Chats as Secure as Possible