Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Which Browser is Best for Your Needs?

Which Browser is Best for Your Needs?

There are a variety of web browsers out there, and that variety is much larger than most people think. While most can list off the main ones: Chrome, Safari, Edge, and Firefox, there are many more to consider. However, the real question remains: which one is best for you?

0 Comments
Continue reading

Know Your Tech: Breadcrumbs

Know Your Tech: Breadcrumbs

A trail of breadcrumbs can be a useful thing, whether you’re using it like Hansel and Gretel to find their way back home, or you’re using it in computing to find your way back to a page you were previously on. Today’s tech term is dedicated to the latter.

0 Comments
Continue reading

Tech Term: Cookies Defined

Tech Term: Cookies Defined

Chances are, if you’ve spent any amount of time around a computer, you’ve heard of browser cookies. What you may not have heard, is what these cookies do. For today’s Tech Term, we’ll explore what cookies are, and what they do.

0 Comments
Continue reading

Tip of the Week: Browser Security 2018

Tip of the Week: Browser Security 2018

The Internet browser is one of the most utilized applications on most computers. With so many complex and aggressive issues popping up on the Internet it would be useful to know which of today’s most utilized browsers are best at keeping your computing network free from threats. Today we will take a look at each of the five most utilized web browsers to find out which is the most reliable and secure for your business to use.

0 Comments
Continue reading

Tip of the Week: Closed A Tab On Accident? Here’s How To Restore It

Tip of the Week: Closed A Tab On Accident? Here’s How To Restore It

Have you ever accidentally closed a tab before you were done with it? It’s a classic case of clicking just a little too close to the X. We’ll walk you through how you can open up Google Chrome tabs, not just on your ordinary desktop web browser, but your Android device as well. It’s a lot easier than searching for the same web pages as before!

0 Comments
Continue reading

Tip of the Week: How to Use Tabs to Their Full Potential

Tip of the Week: How to Use Tabs to Their Full Potential

Tabbed browsing--it’s so commonplace that some might not even think about what it was like to use the Internet before tabs became a thing. Believe it or not, even this seemingly simple feature has a lot of depth to it. There are all sorts of tips and tricks that you can use to better use the tabbing features of your favorite web browser.

0 Comments
Continue reading

Tip of the Week: Browse Incognito Mode Better By Enabling Your Extensions

Tip of the Week: Browse Incognito Mode Better By Enabling Your Extensions

Fans of Google Chrome are familiar with using Incognito mode to cover their tracks and keep their Internet browsing private. Although, one downside of Incognito mode is that it disables your browser’s extensions by default. If this has been an annoyance for you, then you’ll be pleased to learn that switching on your extensions for Incognito Mode is easy to do.

0 Comments
Continue reading

Tip of the Week: Stuck Using a Public PC? Be Sure to Follow These 2 Privacy Tips

Tip of the Week: Stuck Using a Public PC? Be Sure to Follow These 2 Privacy Tips

Full disclosure: we don’t recommend doing anything important, or really anything at all, on a public computer. However, we understand that sometimes life works out in an unideal fashion, and sometimes you can be stuck doing something you shouldn’t, and otherwise wouldn’t. Even in these cases, there are steps you can take to preserve your security.

0 Comments
Continue reading

The “S” in HTTPS is More Important Than You May Think

The “S” in HTTPS is More Important Than You May Think

It would be an understatement to say that security, particularly encryption, is important while browsing the web. Though it was only recently that encryption became a major pain point for government regulation, encryption has been around for a very long time. The average user can get a taste of online encryption through the average website security certificate.

0 Comments
Continue reading

How Downloading Free Adware Can Lead to Malicious Crapware

How Downloading Free Adware Can Lead to Malicious Crapware

One benefit of the Internet is that, if you search hard enough, you’ll likely find a free tool or app for virtually any common computing task. While certainly advantageous, freeware often comes with a hidden price, like having to also download additional, unwanted software, aka, “crapware.” If this freeware isn’t properly managed, it can wreak havoc on your system.

0 Comments
Continue reading

Tip of the Week: How to Set Your Browser to Automatically Refresh Itself

b2ap3_thumbnail_autorefresh_your_browser_400.jpgHave you ever been in a situation where you have to continuously hit the refresh button in your browser? Maybe you’re waiting for an online sale to go live, or you’re waiting on an online forum for a critical response. Or, maybe you’re just waiting for an important email. Either way, manually refreshing your browser multiple times can be both annoying and inefficient. We’ll show you how you can refresh it automatically.

0 Comments
Continue reading

Tip of the Week: How to Let a Friend Use Your PC Without Compromising Your Data

b2ap3_thumbnail_guest_account_400.jpgWe’ve all been in a situation where you’re asked by someone if they can use your personal computer for whatever reason; checking their social media, email, or just browsing the Internet. Some people, however, also want to protect their privacy, and allowing relatives to use your own account can become problematic. A quality solution to this issue is to create a guest account.

0 Comments
Continue reading

3 Easy Ways to Go Incognito In Google Chrome

b2ap3_thumbnail_incognito_mode_400.jpgThe Internet can be a dangerous place. Sometimes you want to keep your identity a secret on the web. Now, your reasons for doing so aren’t any of our business, but you should know that there are several ways to access this secretive function in Google Chrome. Here are three ways you can take advantage of Google Chrome's Incognito mode to browse the web in an anonymous fashion.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Google Hosted Solutions Hackers Malware Backup Internet Innovation User Tips Network Security Mobile Devices Microsoft Software Windows 10 Data Efficiency Productivity Email Smartphones Hardware Workplace Tips Business Browser VoIP Tech Term Productivity Computer Business Continuity communications Disaster Recovery Smartphone IT Services Data Backup Ransomware Miscellaneous Business Management Android Cloud Computing Cybercrime Windows Data Recovery Server Alert Network Outsourced IT Office Chrome Automation Quick Tips Telephone Systems Windows 10 Artificial Intelligence Managed IT Services Computers Save Money Router Managed IT Services Internet of Things Upgrade Communication Facebook Money Collaboration Law Enforcement Health IT Support Cybersecurity Social Media Virtualization Small Business Spam Holiday Gadgets Social Engineering Operating System Applications Wi-Fi Office 365 Password Office Tips Passwords How To Mobile Device App Work/Life Balance Bandwidth Two-factor Authentication Bring Your Own Device Information Gmail Mobile Device Management Settings Google Drive History BDR Remote Computing Private Cloud Encryption Word Hacking Recovery Phishing VPN Meetings Microsoft Office Flexibility Scam Vulnerability Safety Paperless Office Voice over Internet Protocol Managed Service Data Protection Connectivity Mobility Entertainment Apps Mouse Managed Service Provider Keyboard Marketing Data Breach Networking Sports HaaS Data Security Data Management Application Public Cloud Human Resources Cryptocurrency Downtime IT Support Servers Patch Management Telephony Saving Money USB IT Plan Website Windows 7 Remote Monitoring Physical Security YouTube Identity Theft Training Managed IT Data storage CES Business Intelligence End of Support Infrastructure eWaste Unsupported Software PDF Software as a Service Update Virtual Assistant The Internet of Things OneNote Botnet Content Management Internet Exlporer Mobile Computing Machine Learning Big Data Redundancy Robot Best Practice Retail Telephone System Electronic Medical Records DDoS Fraud Charger Legal Blockchain Access Control Black Market User Error BYOD Battery Data Storage Save Time Social Avoiding Downtime Firewall Employer-Employee Relationship Budget Wearable Technology Cleaning Comparison Augmented Reality Spam Blocking IT Management Google Docs Government Hiring/Firing Windows Server 2008 Amazon Web Services Notifications Bing Video Games Smart Technology Database Remote Work Nanotechnology Rootkit Warranty FENG Value Criminal Network Congestion Tech Support Google Search HBO Specifications Computing Infrastructure Employer Employee Relationship Netflix Remote Worker Windows 10s Touchpad Customer Service Workers Document Management IBM Security Cameras How to Practices Hybrid Cloud Social Networking Online Shopping Addiction Risk Management Assessment Help Desk Data loss Scalability Shortcut Staff Safe Mode Two Factor Authentication webinar Business Technology Smart Tech Printer HVAC IT Consultant Running Cable Shadow IT Proactive IT Outlook Computer Accessories Streaming Media Wiring Skype Fax Server Troubleshooting Supercomputer Hacker Apple IT solutions Hosted Computing Biometric Security Flash Evernote Cache Politics Television Screen Mirroring Instant Messaging Conferencing Internet exploMicrosoft Users Credit Cards Vendor Management Lithium-ion battery Administrator Monitor Enterprise Content Management Transportation Samsung Net Neutrality Frequently Asked Questions Millennials Bluetooth Unified Threat Management Solid State Drive Start Menu Password Manager Environment Smartwatch Software Tips Multi-Factor Security iPhone Inventory NarrowBand MSP Information Technology Wireless Charging Wireless Internet Public Computer Shortcuts Cast Computer Care Relocation Digital Signature Emails Advertising Virtual Reality Devices Content Microchip Travel Reputation Maintenance Password Management Benefits Leadership ISP Excel Workforce Camera Audit Tools Techology Business Mangement Books Current Events Uninterrupted Power Supply Employee Trending Distributed Denial of Service Wireless Technology File Sharing Sync Going Green Cortana Wire Experience People Vendor WiFi Humor Accountants Telecommuting Worker Commute Amazon Thought Leadership Audiobook SaaS Search Engine Root Cause Analysis Customers HIPAA NIST Cryptomining Tip of the week Authentication Worker Computer Fan Programming Biometrics Recycling Emergency Knowledge Digital Signage Files Education Chromecast Laptop Wireless Customer Relationship Management Google Apps Smart Office Music Automobile Mobile Office Display Search Twitter Thank You CrashOverride Company Culture Congratulations Compliance Webinar Printers Managing Stress Regulation IT solutions
QR-Code