Breaking a few Eggs

photo of white eggs on tray

Hopefully will have an omelet and not a mess. I am reworking the entire site over the next few days – please be patient and Contact Me if there are any major issues … Update 14-August-2023: So … The update completely corrupted my gallery sections. While that may seem like an “ungood” outcome, in the […]

Lithophane of the Moon

A lithophane print of the Moon globe lit from inside

I’ve had the Bambu Lab X1C for about a week now. Since even before I purchased it, one of the things I really wanted to print was this Lithophane of the Moon by Frank Deschner over on Printables.Com. It is a damn huge print, taking up most of the print area of the device. Maybe […]

BambuLab X1C – First Video

BambuLab 3D Printer internal image

Last week I purchased a BambuLab X1C 3D Printer, something I have been wanting to do for a long time. A good friend of mine has been 3D printing for years, and strongly recommended the BambuLab X1 Carbon, so it was an easy decision. I got the “combo package” which included the AMS unit (holds […]

New Zealand: Through the Lens

Mossy figure

Through the Lens: “Through the Lens” is a series of posts I am writing about my favorite locations around the world to visit and photograph. Intermixing location information with my photos and links for more information on the locations for a travel photographer. New Zealand, a land of unparalleled natural beauty, is a dream destination for […]

Budapest: Through the Lens

Budapest, the enchanting capital of Hungary, is a must-visit destination for travel photographers seeking to capture the perfect blend of historical charm and modern elegance. The city is often referred to as the “Pearl of the Danube” for its stunning architecture, picturesque riverfront, and vibrant culture. In this comprehensive guide, we’ll take you through the […]

Mobile Device Security – Tips and Tricks for General Users

How Secure Is Your Phone? Image created with DALL-E of a hand holding a cellphone with a lock icon on the screen

Mobile Device Security – Tips and Tricks for General Users: a post in a series of articles for general endusers to better protect themselves online. In today’s world, our mobile devices have become an integral part of our daily lives. They store our personal information, allow us access to our finances and healthcare information, help […]

Backup & Encrypt: Secure your Digital Life

Encryption of local device to protect your data

In today’s world, safeguarding your personal data is more important than ever. Cyber threats and data loss are a growing concern, and taking the necessary steps to protect your valuable information is crucial. In this post, I will guide you through the process of encrypting your data using BitLocker for Windows devices and FileVault for […]

Online Identity – Protecting yourself from Theft

Identity Protection - Protecting yourself online

In this digital age, protecting your online identity is essential. Cyber criminals are constantly on the lookout for ways to hack into your accounts and steal your sensitive information. One of the best ways to enhance your cybersecurity is to use strong, unique passwords for each of your online accounts and enable two-factor authentication (2FA) […]

Protecting yourself Online: A Beginner’s Guide for Information Security

Information Security - Tips and Tricks

In today’s digital age, information security is more important than ever. With cyber threats on the rise, it is crucial for everyday users to understand the basics of protecting their personal data. In this article, we will discuss key principles, strategies, and best practices to help you strengthen your online security. By the end of […]

Ransomware Detection & Response

Ransomware terms tag cloud

Ransomware attacks have been on the rise in recent years, causing significant financial and operational disruptions for organizations across various sectors. This brief guide covers essential ransomware defense strategies, including understanding what ransomware is, implementing technology solutions and process controls, and preparing your organization to respond effectively to a ransomware attack. Ultimately, some of these […]