Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Which Browser is Best for Your Needs?

Which Browser is Best for Your Needs?

There are a variety of web browsers out there, and that variety is much larger than most people think. While most can list off the main ones: Chrome, Safari, Edge, and Firefox, there are many more to consider. However, the real question remains: which one is best for you?

0 Comments
Continue reading

Know Your Tech: Breadcrumbs

Know Your Tech: Breadcrumbs

A trail of breadcrumbs can be a useful thing, whether you’re using it like Hansel and Gretel to find their way back home, or you’re using it in computing to find your way back to a page you were previously on. Today’s tech term is dedicated to the latter.

0 Comments
Continue reading

Tech Term: Cookies Defined

Tech Term: Cookies Defined

Chances are, if you’ve spent any amount of time around a computer, you’ve heard of browser cookies. What you may not have heard, is what these cookies do. For today’s Tech Term, we’ll explore what cookies are, and what they do.

0 Comments
Continue reading

Tip of the Week: Browser Security 2018

Tip of the Week: Browser Security 2018

The Internet browser is one of the most utilized applications on most computers. With so many complex and aggressive issues popping up on the Internet it would be useful to know which of today’s most utilized browsers are best at keeping your computing network free from threats. Today we will take a look at each of the five most utilized web browsers to find out which is the most reliable and secure for your business to use.

0 Comments
Continue reading

Tip of the Week: Closed A Tab On Accident? Here’s How To Restore It

Tip of the Week: Closed A Tab On Accident? Here’s How To Restore It

Have you ever accidentally closed a tab before you were done with it? It’s a classic case of clicking just a little too close to the X. We’ll walk you through how you can open up Google Chrome tabs, not just on your ordinary desktop web browser, but your Android device as well. It’s a lot easier than searching for the same web pages as before!

0 Comments
Continue reading

Tip of the Week: How to Use Tabs to Their Full Potential

Tip of the Week: How to Use Tabs to Their Full Potential

Tabbed browsing--it’s so commonplace that some might not even think about what it was like to use the Internet before tabs became a thing. Believe it or not, even this seemingly simple feature has a lot of depth to it. There are all sorts of tips and tricks that you can use to better use the tabbing features of your favorite web browser.

0 Comments
Continue reading

Tip of the Week: Browse Incognito Mode Better By Enabling Your Extensions

Tip of the Week: Browse Incognito Mode Better By Enabling Your Extensions

Fans of Google Chrome are familiar with using Incognito mode to cover their tracks and keep their Internet browsing private. Although, one downside of Incognito mode is that it disables your browser’s extensions by default. If this has been an annoyance for you, then you’ll be pleased to learn that switching on your extensions for Incognito Mode is easy to do.

0 Comments
Continue reading

Tip of the Week: Stuck Using a Public PC? Be Sure to Follow These 2 Privacy Tips

Tip of the Week: Stuck Using a Public PC? Be Sure to Follow These 2 Privacy Tips

Full disclosure: we don’t recommend doing anything important, or really anything at all, on a public computer. However, we understand that sometimes life works out in an unideal fashion, and sometimes you can be stuck doing something you shouldn’t, and otherwise wouldn’t. Even in these cases, there are steps you can take to preserve your security.

0 Comments
Continue reading

The “S” in HTTPS is More Important Than You May Think

The “S” in HTTPS is More Important Than You May Think

It would be an understatement to say that security, particularly encryption, is important while browsing the web. Though it was only recently that encryption became a major pain point for government regulation, encryption has been around for a very long time. The average user can get a taste of online encryption through the average website security certificate.

0 Comments
Continue reading

How Downloading Free Adware Can Lead to Malicious Crapware

How Downloading Free Adware Can Lead to Malicious Crapware

One benefit of the Internet is that, if you search hard enough, you’ll likely find a free tool or app for virtually any common computing task. While certainly advantageous, freeware often comes with a hidden price, like having to also download additional, unwanted software, aka, “crapware.” If this freeware isn’t properly managed, it can wreak havoc on your system.

0 Comments
Continue reading

Tip of the Week: How to Set Your Browser to Automatically Refresh Itself

b2ap3_thumbnail_autorefresh_your_browser_400.jpgHave you ever been in a situation where you have to continuously hit the refresh button in your browser? Maybe you’re waiting for an online sale to go live, or you’re waiting on an online forum for a critical response. Or, maybe you’re just waiting for an important email. Either way, manually refreshing your browser multiple times can be both annoying and inefficient. We’ll show you how you can refresh it automatically.

0 Comments
Continue reading

Tip of the Week: How to Let a Friend Use Your PC Without Compromising Your Data

b2ap3_thumbnail_guest_account_400.jpgWe’ve all been in a situation where you’re asked by someone if they can use your personal computer for whatever reason; checking their social media, email, or just browsing the Internet. Some people, however, also want to protect their privacy, and allowing relatives to use your own account can become problematic. A quality solution to this issue is to create a guest account.

0 Comments
Continue reading

3 Easy Ways to Go Incognito In Google Chrome

b2ap3_thumbnail_incognito_mode_400.jpgThe Internet can be a dangerous place. Sometimes you want to keep your identity a secret on the web. Now, your reasons for doing so aren’t any of our business, but you should know that there are several ways to access this secretive function in Google Chrome. Here are three ways you can take advantage of Google Chrome's Incognito mode to browse the web in an anonymous fashion.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Hackers Google Hosted Solutions Malware Backup Microsoft Network Security Software Windows 10 Innovation User Tips Data Mobile Devices Internet Smartphones Email Browser Business Hardware Efficiency Tech Term Business Continuity Smartphone Productivity VoIP Computer Disaster Recovery IT Services Workplace Tips Data Backup Miscellaneous Ransomware communications Productivity Android Cybercrime Business Management Network Automation Chrome Alert Data Recovery Windows Outsourced IT Office Cloud Computing Save Money Internet of Things Managed IT Services Upgrade Server Artificial Intelligence Communication Computers Telephone Systems Managed IT Services Router Social Media Small Business Money Law Enforcement Quick Tips Virtualization Facebook Collaboration Windows 10 IT Support Spam Office Tips How To Office 365 Passwords Applications Wi-Fi App Health Cybersecurity Password Social Engineering Holiday Mobile Device Work/Life Balance Mobile Device Management Settings Information Two-factor Authentication BDR Word Google Drive Bandwidth Gadgets History Bring Your Own Device Gmail Remote Computing Operating System Private Cloud Networking HaaS Hacking Scam Microsoft Office Entertainment Marketing Application Managed Service Recovery Data Protection Flexibility Connectivity Encryption Sports Data Security Safety Keyboard Mobility Data Management Data Breach Apps VPN Mouse Managed Service Provider Vulnerability Phishing Voice over Internet Protocol Patch Management eWaste Human Resources Update USB Servers OneNote Botnet The Internet of Things Social Government Internet Exlporer Public Cloud Training Redundancy Budget IT Support Best Practice CES DDoS Identity Theft Downtime Infrastructure Paperless Office BYOD Physical Security Software as a Service User Error Virtual Assistant Data Storage Data storage Big Data Content Management Saving Money Avoiding Downtime End of Support Machine Learning Electronic Medical Records Comparison Spam Blocking Wearable Technology Cleaning Telephone System IT Management Google Docs PDF Charger Blockchain Fraud Access Control Telephony Firewall Employer-Employee Relationship IT Plan Website Legal Meetings Mobile Computing Remote Monitoring Windows 7 Robot Managed IT Battery Hiring/Firing YouTube Retail Business Intelligence Black Market Unsupported Software Customers Network Congestion Bing Cryptocurrency Screen Mirroring Worker Commute Rootkit Streaming Media Amazon Web Services Flash IBM Warranty Criminal Files Education Employer Employee Relationship Netflix Remote Work Nanotechnology Frequently Asked Questions Millennials Document Management Solid State Drive Start Menu Search Two Factor Authentication webinar Security Cameras Practices Software Tips Multi-Factor Security Laptop Wireless Risk Management Assessment Remote Worker Lithium-ion battery Workers Video Games IT Consultant Help Desk Environment Staff Safe Mode Programming Cast Biometrics Computer Care Online Shopping Addiction Troubleshooting Supercomputer Printer HVAC Customer Relationship Management Travel Computing Infrastructure Computer Accessories NarrowBand Smart Tech Excel Workforce Audit Tools How to Conferencing Hacker Hosted Computing Trending Touchpad Politics Television Wiring Sync Scalability Transportation Samsung Uninterrupted Power Supply WiFi Hybrid Cloud Vendor Management Evernote Cache Administrator People Enterprise Content Management Root Cause Analysis Customer Service Bluetooth Distributed Denial of Service Wireless Technology Credit Cards Tip of the week Telecommuting Password Manager Computer Fan Social Networking Apple Emails Smartwatch Inventory Shortcut Public Computer Unified Threat Management Instant Messaging Benefits Leadership Shortcuts Digital Signature Content MSP Wireless Charging Wireless Internet Monitor Books Current Events Microchip Mobile Office Password Management Fax Server Internet exploMicrosoft Users Chromecast Devices Windows Server 2008 IT solutions Camera Notifications Business Mangement FENG Value iPhone Save Time HBO Specifications Experience Windows 10s Relocation Vendor Tech Support Accountants Information Technology Audiobook SaaS File Sharing Cortana Wire Reputation Emergency Knowledge Search Engine HIPAA NIST Data loss Advertising Virtual Reality Worker Amazon Thought Leadership Music Automobile Recycling Authentication Outlook Techology Skype Humor Smart Technology Display Running Cable Shadow IT Maintenance Going Green Augmented Reality Google Apps Smart Office Twitter Congratulations CrashOverride Company Culture Webinar Compliance Printers Managing Stress Thank You IT solutions Regulation
QR-Code