Month: October 2022

IT Consultancy & Repairs, located in Crewe, servicing Cheshire and surrounding areas.

What is: Linux

Linux is an operating system and it comes in many flavours. From the web: Linux is an open-source Unix-like operating system based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution. The fact that you are reading this shows…
Read more

the grub-efi-amd64-signed package failed to install

I came across this error whilst installing Elementary OS 5.1 onto a 2011 MacBook. After checking out why, it became obvious. The MacBook boots in UEFI mode and not MBR. Normally I create my Linux USB drives with Balena Etcher and trust it to get the drive right. A quick switch to RUFUS and create…
Read more

What is: Social Engineering

In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. This differs from social engineering within the social sciences, which does not concern the divulging of confidential information. This, in many ways is similar to phishing. Criminals will use your own social media to…
Read more

What is: Phishing

I am starting off my series of “What is” with Phishing. Probably the easiest way for a hacker to gain control of your accounts. A definition of the term Phishing: Phishing is a type of online fraud that involves tricking people into providing sensitive information, such as passwords or credit card numbers, by masquerading as…
Read more

Copying Photos from your phone

Transfer photos from an iPhone or Android phone to your PC First, connect your phone to a PC with a USB cable that can transfer files. Turn your phone on and unlock it. Your PC can’t find the device if the device is locked. On your PC, select the Start  button and then select Photos to open the Photos…
Read more

Using Google Mail securely.

Did you know that hackers share details of accounts that they have compromised? Well this can lead to you having your e-mail account taken over by hackers, this means they can pretend to be YOU with all the sites that you visit, such as Amazon, E-Bay, Facebook, and sometimes your banks. You can secure your…
Read more