What to do with those mysterious links in text messages. A closer look at a new protocol that may help reduce spam and scam. The new protocol is called STIR/SHAKEN.
Category: Technology
This section focuses on technology. The writer had a long career in IT. Here you will find articles on security, social media, documentation and how technology has affected our lives.
Can GoDaddy Be Trusted?
As business owners and managers or IT consultants, you have to seriously evaluate the nature of content being communicated over the Internet. If there is any possibility of risk of censorship, the effects could be catastrophic
Tracking Scams in Phone Messages
Ever wonder how to respond to a suspicious message? Here are a few tips on how to learn more about the scammers.
Ransomware and the Mechanical Pencil
Review of the WannaCry ransomware attack of 2017 and what is fundamentally wrong with how we utilize operating systems.
Disaster Recovery — The Case of Parler
The day has now arrived where you will need to have alternative cloud and DNS registry platforms, as well as other redundancies.



