Links - Sound Bytes Sound Bytes Logo
Nick Francesco
Dave Enright
Steve Rea
Rob Linton
Dennis Wurster
Chris Horn
Your Computer User Group of the Air!

 

All the Links (in handy 25-at-a-time pages)

arrow Video shows dog chewing on a lithium-ion battery and sparking house fire in Oklahoma
     heard on Sat 17 Aug 24
TULSA, Okla. (AP) — A dog chomping on a lithium-ion battery sparked a serious house fire in Oklahoma, and video of the moment the sparks began to fly has been enlisted by a fire department to show the potential dangers of those batteries.


arrow Lightning Maps
     heard on Sat 17 Aug 24
LightningMaps.org is an additional service to the main project Blitzortung.org. For general questions about this project and for ordering the necessary hardware have a look at the appropriate documentation, FAQs and instructions before contacting us. Also, the discussion board is a good place for all questions and they will be quickly answered there by us and the participants on most times. Our email address is: mail at lightningmaps.org.
arrow Amazon Unlimited photo storage
     heard on Sat 10 Aug 24
Prime members get unlimited full-resolution photo storage and 5 GB for video Unlimited full-resolution photo storage with Prime Secure automatic backup of photos and videos Easily access across all your devices Turn your memories into personalized photo gifts
arrow Baen Free Library
     heard on Sat 10 Aug 24
Baen Books is now making available — for free — a number of its titles in electronic format. We're calling it the Baen Free Library. Anyone who wishes can read these titles online — no conditions, no strings attached. (Later we may ask for an extremely simple, name & email only, registration. ) Or, if you prefer, you can download the books in one of several formats. Again, with no conditions or strings attached. (URLs to sites which offer the readers for these format are also listed. )
arrow Total Recorder
     heard on Sat 10 Aug 24
Capture any sound played by a computer (including streaming audio, Internet telephony, and PC games), and use the included time shift-feature for off-hours recording.
arrow Real-time problem & outage monitoring
     heard on Sat 10 Aug 24
We tell you when your favorite services are down or having problems.
arrow What to do if you can't sign in to your Microsoft account | Account recovery
     heard on Sat 10 Aug 24
Can't sign in to your Microsoft account or reset your password? If you haven't set up two-step verification, here's how you can recover it.
arrow Auto date and time not working
     heard on Sat 10 Aug 24
Automatic date and time not updating to daylight time after time switchover. Galaxy s20 FE5G
arrow DuckDuckGo Email Protection Beta Now Open to All!
     heard on Sat 3 Aug 24
DuckDuckGo Email Protection is a free email forwarding service that removes multiple types of hidden email trackers and lets you create unlimited unique private email addresses on the fly – without switching email providers or apps. We’ve also added new features like Link Tracking Protection that helps prevent tracking in email links, Smarter Encryption that helps with unencrypted email links, and the ability to reply directly from your Duck Addresses.
arrow How to See Blocked Numbers on iPhone
     heard on Sat 3 Aug 24
Check your blocked number list on your iPhone by going to the Settings > Phone, Messages, or FaceTime. The list of blocked numbers is the same across all three apps. You can also use these settings to prevent people from seeing your number when you call and easily unblock numbers if needed.
arrow LG Contacts app is not working
     heard on Sat 3 Aug 24
I had the same issue and found this. I disabled the Verizon Cloud (Cloud in apps manager) and then mine started working again.
arrow Uninstall and remove programs with Revo Uninstaller Pro
     heard on Sat 3 Aug 24
Video tutorial on uninstalling programs with Revo Uninstaller
arrow Tailscale overlay VPN network
     heard on Sat 3 Aug 24
Tailscale makes creating software-defined networks easy: securely connecting users, services, and devices.
arrow Proton VPN
     heard on Sat 3 Aug 24
The best VPN for speed and security. Stay safe. Play fast. Try Proton VPN today.
arrow Duck Email Protection
     heard on Sat 3 Aug 24
Email privacy, simplified. Block email trackers and hide your address without switching your email provider. Learn more.
arrow VeraCrypt
     heard on Sat 3 Aug 24
VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Brought to you by IDRIX (https://www.idrix.fr) and based on TrueCrypt 7.1a.
arrow How two-factor authentication works on Facebook
     heard on Sat 3 Aug 24
Two-factor authentication is a security feature that helps protect your Facebook account and your password. If you set up two-factor authentication, you'll be asked to enter a special login code or confirm your login attempt each time someone tries accessing Facebook from a browser or mobile device we don't recognize. You can also get alerts when someone tries logging in from a browser or mobile device we don't recognize.
arrow Change notification settings in Windows
     heard on Sat 3 Aug 24
Action Center in Windows 10 is where you'll find your notifications and quick actions. Change your settings at any time to adjust how and when you see notifications and which apps and settings are your top quick actions.
arrow Setup Facebook login recovery codes
     heard on Sat 3 Aug 24
If you've turned on two-factor authentication, you can get 10 recovery login codes to use when you're unable to use your phone. Once you have your recovery codes, you can use one in place of your authenticator code when logging in.
arrow Recover Your Facebook Account if You Can’t Log In
     heard on Sat 3 Aug 24
Recover your Facebook account using the Find Your Account page 1) Go to the Find Your Account page at facebook.com/login/identify and follow the instructions. Make sure to use a computer or mobile phone that you have previously used to log into your Facebook account. 2) Search for the account you want to recover. You can search for your account by name, email address, or phone number.
arrow 10 Incredible Open-Source Hypervisor Technologies
     heard on Sat 27 Jul 24
There comes a time when you are working on something, and a need arises where you want to use another computing instance, but it is tough to work on many machines at the same time. Hence, there is a necessity to create virtual machines that allow you to work on many computing instances simultaneously. The challenge is to be able to run many computing instances, and that is where hypervisors come into the picture. Having the capability to configure the virtual environment is also an added advantage that many developers and software professionals yearn for. Here, the hypervisor fills the void.
arrow Turn off Defender antivirus protection in Windows Security
     heard on Sat 27 Jul 24
Follow these steps to temporarily turn off real-time Microsoft Defender antivirus protection in Windows Security. However, keep in mind that if you do, your device may be vulnerable to threats unless you're running another antivirus.
arrow Winaero Tweaker
     heard on Sat 27 Jul 24
The ultimate all-in-one app for tuning Windows 11, Windows 10, Windows 8, and Windows 7
arrow Avoid and report phishing emails - Google
     heard on Sat 20 Jul 24
Phishing is an attempt to steal personal information or break in to online accounts using deceptive emails, messages, ads, or sites that look similar to sites you already use. For example, a phishing email might look like it's from your bank and request private information about your bank account.
arrow Ransomware 101
     heard on Sat 20 Jul 24
Ransomware is an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption. Ransomware actors often target and threaten to sell or leak exfiltrated data or authentication information if the ransom is not paid. In recent years, ransomware incidents have become increasingly prevalent among the Nation’s state, local, tribal, and territorial (SLTT) government entities and critical infrastructure organizations.
The next set of links


Back to the Sound Bytes home page

Disclaimer: We are not responsible for the content or availability of non-Sound Bytes sites. If you do not recognize or trust the website in any post, do not click on the link.