Welcome!
If you have an account, please:
Log in
Stay Informed
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

How can I help you?
Contact Jeremy

Sony will let you Play the EU version of a game, but won’t tell you it’s incompatible until it’s too late

Horizon Zero Dawn - Easily one of the greatest games I've ever played.
(Learn more)

I first became interested in this game when I heard of the concept: bows and spears versus big robot dinosaurs. There's clearly much more to it than that, but I never regretted it playing it. Besides beautiful graphics, and exceptional gameplay, it has one of the best stories I've ever seen. .... [Click here to read the rest of this post]

Tags: , , , , , , , , ,

Why buying USPS insurance on your packages is probably a really bad idea

Do you really know the terms? Can you actually collect?
(Image copyright Jeremy Duffy)

As with most insurance deals, the odds are greatly stacked against you. I know this. You probably knew it. And yet, we've probably both agreed to buy insurance on shipped items at least once or twice… and why not? The insurance prices are fairly cheap are presented as being so straightforward: "Would you .... [Click here to read the rest of this post]

Tags: , ,

How to Get Easter Egg Dye off Your Hands

Easter Eggs
(Image is in the Public Domain)

Why are there so many top ranked answers for how to get the dye out of your or your kids' hands that just don't help? Dishsoap? Baking soda or toothpaste plus lots of scrubbing? Feh. Well, consider that baking soda does provide great cleaning power and abasion, but vinegar is what they use to disolve the dye packs in .... [Click here to read the rest of this post]

Tags: , , , , ,

Add context option to open file in administrator level Notepad

It works in Win 10 too!
(Image used under: Creative Commons 3.0 [SRC])

One of the more irritating oversights in Windows 7 is that when you open configuration files from Windows Explorer (txt, ini, etc), they open in Notepad as expected, but when you go to save, only then do you realize that you didn't have admin rights and your work is wasted.

Sick of .... [Click here to read the rest of this post]

Tags: , , , , ,

What Does Lexis Nexis Know About Me?

Lexis Nexis - The bottomless pit of user data
(Image used under: Creative Commons 3.0 [SRC] [Mod])

LexisNexis (which acquired ChoicePoint) is the largest data-broker in the world. They create vast profiles on people and use that information to create various reports that they sell to companies of all kinds. These reports are used to make decisions about renting, insurance and more. In the past these .... [Click here to read the rest of this post]

Tags: , , , ,

Sequoia Voting Machines Hacked to Play Pac-Man

Sequoia, Diebold... e-voting has a long way to go.
(Image is in the Public Domain)
This is your Sequoia touch-screen voting machine with Pac-Man hacked onto it without disturbing any of the "tamper-evident" seals supposedly meant to protect it from hackers...

Apparently, they put tamper seals on the ports and plugins, but NOT the case itself. Therefore, the university was able to just .... [Click here to read the rest of this post]

Tags: , , ,

Man Hunts and Beats Teen for Mocking Him Online

Stalking
(Image is in the Public Domain)

For anyone who's participated in forums, online games, or any other system where you can communicate with random strangers, you've probably encountered people who make you angry. Some are just people who you don't get along with legitimately, and some are "trolls"; people who toy with others for their amusement.

What makes people trolls is generally the anonymous nature of .... [Click here to read the rest of this post]

Tags: , , , , ,

Facebook Tracks You Even When Logged Out

Facebook
(Image used under: Creative Commons 2.0 [SRC])

So yesterday, we learned that OnStar tracks you even if you're not a customer and today, we learn that Facebook will track and monitor your web usage without your knowledge or permission… even if you're not logged in.

The social network is quietly retracting a cookie that continued to report your Facebook user ID even after .... [Click here to read the rest of this post]

Tags: ,

OnStar To Spy On People

Onstar
(Image used under: Creative Commons 2.0 [SRC] [Mod] [Comp])

OnStar was recently admonished by several senators for its plan to spy on people (even non-customers).

OnStar is apparently hoping to create a new revenue stream by collecting data about the movements of OnStar-equipped cars. Obviously, this data set will be more comprehensive—and, therefore, more lucrative—if it includes data from former OnStar subscribers as .... [Click here to read the rest of this post]

Tags: ,

4th Amendment Summary by the EFF

Can you refuse search or not? It would be good to know your rights.
(Image is in the Public Domain)

You can't use rights you don't know about or don't understand. The Electronic Frontier Foundation has posted a summary of your 4th amendment rights to deny the government permission to search you or your belongings (digital or otherwise).

It's good to know what you can and can't .... [Click here to read the rest of this post]

Tags: , , , , , ,

If you want to learn more about my professional background, click here to learn more. Otherwise, let’s get started - how can I help?

Online learning
On-site learning
Read my blog

DLC

DLC or "Downloadable Content" generally refers to addons you can purchase for games on computers or game systems. Sometimes this can be fair in terms of price vs value, but they can also be predatory.

Data Abuse

Data brokering is the practice of collecting as much data as possible about customers or visitors into profiles. Then the data is sold, shared, or lost in data breaches to be used in targeted marketing or ID Theft.

[Click for full description]

How to Steal Identities - Why It's So Easy

Just why is it so easy to steal identities? Where is all this information coming from!?

[Click for full description]