Posts

Featured Post

How I added streaming to my audio system: My experience with the Arylic A50 streaming amplifier

Image
  This bird’s-eye view on the Arylic A50 streaming amplifier is for audio enthusiasts who may be in one or more of the following situations: -           Looking for an audio streaming solution -           Needing a small (40- to 50-watt per channel) high-fidelity stereo amplifier for their loudspeakers -           Planning for a multi-zone (multi-room) audio system installation -           Have a tight budget (less than US$200)     -           Are curious about the A50 or about anything related to audio  Disclosure: This is a sponsored post. I received compensation from Arylic by way of a partial refund on the purchase price of their product. Regardless, I only recommend products or services that I truly believe in. What I needed The last time I upgraded my audio system was ten years ago, when I purchased a pair of Paradigm Mini Monitor v.6 speakers and a NAD C 356BEE 80-watt per channel stereo integrated amplifier. A 120-watt Dynaquest DQ-120 subwoofer (purchased in 2002

Safe browsing tips

Image
How to protect your sensitive information when browsing the Internet The web browser is your window to the Internet. Unfortunately, it is also the Internet's window to you! Learn how to put a curtain on that window through these safe browsing tips.  A safe browsing strategy Your web browser keeps a record of the information that you type into it as you interact with various websites.  It also keeps track of your browsing history. As it accumulates more and more information about you, your browser is turning into a  treasure trove that is a tempting target for thieves.   Cyber criminals can steal your information in several ways: (a) by copying it from your computer, smartphone or tablet, (b) by intercepting it as it travels through the Internet, and (c) by copying it from the websites that you interact with. Here is a safe browsing strategy that covers those points of attack: Reduce the information kept by your browser Keep your computer, smartphone and tablet malware-fr

How to safely charge your smartphone and other electronic gadgets

Image
Charge your smartphones and other electronic gadgets with care, or else they might break prematurely or even catch fire. Here’s how: (1) Use the right charger, (2) Prevent heat buildup, and (3) Replace worn-out parts. Use the right charger Charge your gadget with the charger that was supplied with it, or with another charger of the same current rating (such as 1.0 amps, 2.1 amps, etc.). The current rating of a charger is printed on its body, as can be seen in the example below. Use a fast charger only if absolutely necessary. Fast charging shortens the life of the battery. Prevent heat buildup When charging your gadget, allow heat to escape freely by (1) Removing your gadget from its case, and (2) laying it on a well-ventilated, heat-resistant surface such as a bare tabletop. Prepare a spot where you can safely charge your gadget. For example, turn a small table into a charging station. If you need to charge several gadgets simultaneously, install an electrical power st

How to Use Baking Soda as a Deodorant

Image
I don't like commercial underarm deodorants for several reasons. They make my armpits sticky. They cause unsightly stains on my clothes. And while a scented deodorant smells fresh and clean right off the bottle, it doesn't smell so good anymore when the proverbial rubber meets the road. Moreover, in my experience, a commercial deodorant becomes less and less effective as time goes on. Finally, the microscopic particles of silver, aluminum and other chemicals used in deodorants are reportedly harmful to the body and the environment. My search for a safe, no-frills deodorant has led me to plain old baking soda (sodium bicarbonate). I have been using it for several months and I am quite satisfied with it. While you can put baking soda powder directly on your underarms, I must caution you against it because the baking soda crystals will scratch your skin. A better way is to apply it in liquid form. How to prepare a no-frills baking soda deodorant First, find a roll-on deodo

How to Keep Your Computer and Smartphone Free from Malware

Image
A Brief Guide for Keeping Your Computer and Smartphone Malware-Free An infected computer or smartphone is unsafe to use, especially for shopping, banking and other important online transactions. Some malware can even cause a computer to become part of a "botnet" that is used by criminals to perpetrate certain types of attacks on the Internet. To keep your device malware-free, take these essential precautions. General Precautions Keep the operating system (Windows, Android, iOS, etc.) updated. If your device is no longer receiving security updates, replace it with a new one. Uninstall or deactivate apps that you don’t use. Install an app only if you need it. Don’t let children and other people who are not security-aware tinker with the device, because they might change an important setting, connect to an open network, or use it to visit a malware-infected site or download an infected file or app. Lock the device before leaving it. Also, set your device to lock i

How to Safeguard Your Passwords

Image
Need help with your passwords? Here are two good ways to generate and protect strong passwords. Method 1: Use a Password Manager App A password manager app offers security, convenience and accessibility. Download a password manager app into your computer or smartphone, sign up for an account, and start using the app to store your usernames and passwords. When it’s time to change a password, it can generate a strong password for you. Now, you only need to memorize one password, which is the password or PIN of your password manager app. As a bonus, your password manager can also automate the sign-in process for you. A password manager is clearly better than a plain old password list, but it does have some drawbacks. Let’s have a look at them: A password manager is not immune to security risks. First, if a thief manages to steal your password manager and its password, he gains control of all the passwords you stored in it. Second, if you forget the password of your password man

Here's an Easy and Effective Way to Lose Weight

Image
I was able to lose almost ten pounds in about three months. All it took was a modest and gradual change in my eating habits.  Here's how I did it. With a little patience, you will achieve a similar result. A surprisingly simple and sustainable weight-loss strategy  This weight-loss technique is like judo: gentle but effective.  Crash dieting and strenuous exercise are not necessary. In fact, they may be counterproductive because you may end up fighting a more intense level of hunger every day. Also, a drastic change in diet and physical activity can be downright harmful to your health. The body responds better to gentle taps than to hammer blows.  Shed your excess pounds by gently nudging your body towards your target weight. All you have to do is to gradually work these habits into your daily routine: Around five minutes before meal time, drink a full glass of water. The water will take some of the edge off your appetite. Fill your plate with one or two spoonfuls less

How to Fine-Tune Your Facebook Privacy Settings

Image
For those of you who are on Facebook, I created a short video that explains how you can fine-tune your Facebook account's privacy settings. "Why bother changing something that already works?," you may be wondering. Well, it’s to suit the way you use Facebook. If you are among the great majority of users who just want to reconnect and share with people who already know you, then you probably need to change some of the default settings in Facebook from “Public” or “Everyone” to “Friends” or Only me.” For you, it’s important to lock down the privacy settings to protect yourself and your loved ones from information thieves who have no qualms about faking your account, harvesting information about you and your friends, and using this information for nefarious purposes. Conversely, if you are using Facebook as a marketing tool, then you might want to open up the privacy settings even more. What sort of privacy information can you control in Facebook? Here are some exampl

Keep Facebook Hackers at Bay with Two-Factor Authentication

Image
Consider all of the sensitive personal information about yourself that Facebook has. It may include your name, street address, email address, phone number, credit card information, and birthday. In addition, your profession, lifestyle, social status, political opinions and circle of friends are also evident through the pictures and stories that you and your friends have posted on your Facebook timeline. All of that can be used by criminals to hijack your identity, steal your property, ruin your credit and smear your reputation. But that’s not all. If your Facebook account gets hacked, your friends will also be vulnerable to attack. Clearly, with so much at stake, you should take every possible measure to prevent criminals from hacking into your account. Fortunately, a security technique called Two-Factor Authentication is available in Facebook. With Two Factor Authentication, logging on to your Facebook account will require you to enter your username and password, as usual, plus a s

How to transfer the ownership of a privately owned vehicle in the Philippines

Image
Transferring the ownership of a motor vehicle was a frustrating experience for me. This was because I was not thoroughly familiar with the requirements and the process. I would like to share how I should have done it so that other first-timers will have a more streamlined and pleasant experience. The procedure described below applies to the case where a privately owned motor vehicle is sold by its owner to a buyer. If your case is different, please look for the applicable procedure on web site of the Land Transportation Office: http://www.lto.gov.ph/motor-vehicle-registration/307-transactions-requiring-change-of-certificate-of-registration.html If the seller has just completed all of his mortgage payments, the car needs to be released from its chattel mortgage before it can be sold. Please read this article: What to Do Next After Paying Off Your Car Loan . Let’s begin with some preliminary notes: a) The seller should take the lead in this process. He should see to it that