John L. Jones

Change

Hello Everyone, The name (URL) of the blog has changed. All new posts will be from technologyjones.com. I hope you like the new look and greater variety of article topics. Thank you . John L. Jones Advertisements

New Home On The Web

Hello Everyone, First, thank you very, very much for subscribing to my blog.  This will be the last post at this blog. My new blog is thinkaboutsecurity.com. The blog will focus on computer security information, news and tips for the home and SOHO PC user. There will also be some posts about technology in general […]

DO YOU TRUST AMAZON, TOO MUCH?

  I know many people use and trust Amazon WITHOUT QUESTION. There is a new scam that is relying on that trust (and Amazon’s good name) and trying to use it against you. Beware online shoppers! The latest email phishing scam looks just like an order cancellation notice from Amazon.com. As always, be sure to […]

TOO MANY SOCIAL-NETWORK EMAILS?

  If you are like me, you get more than enough emails every day. If you subscribe to any of the social networking sites, I am sure you have learned that social-networks can be an additional source of unwanted emails. Depending on your settings, you may get an email every time someone mentions you or […]

A DEAD USB FLASH DRIVE…BUT I DON’T CARE

You can ask 10 people and probably get 10 different answers to the question: What is the best USB flash drive to buy? Take a look at the screen shot below.   This week a USB flash drive a friend gave me 6 weeks ago stopped working. I had only used the flash drive nine […]

Digital Stalking. Are You Sharing Too Much?

                    Think about every social media site that you use. Now think about the information you are sharing on these sites. There is a new mobile geo-location app called Girls Around Me. The app makes use of the public information that is shared in Facebook profiles […]

HOW TO AVOID MALWARE

Malware is a term used to describe a broad category of software that could damage your computer or steal your information that includes viruses, worms, Trojan horses, spyware, and rootkits. If you are not sure what these terms mean, go to Google and type in the word define and the term you want to look […]