Google search bar with magnifying glass logo missing from the search button

FIXED: Google custom search magnifying glass icon missing

I’ve recently re-added Google custom search (also known as “Google Programmable Search Engine”) as an option from Adsense to this website to make searching for articles easier. Having added the basic Google search code, I was surprised to see that the magnifying glass icon in the search button was missing. So for others suffering with […]

Random batteries laid out on a surface

How to store lithium batteries safely

Storing lithium cells and batteries carefully is crucial as improper storage of lithium cells can lead to significant safety hazards such as fire and health issues, as well as degrading battery life. Those working with lithium must bear these hazards in-mind, both during the lifetime of the associated device (e.g. laptop or smartphone), and in […]

Simple Linux backups using 7-zip (7z) and tar

In this post I want to look at the use of Linux terminal commands for a simple and effective backup routine on Linux. We all know we should backup regularly, but it always feels like a pain to perform backups. As a result, most of us have been burnt by the loss of data from […]

Blue shield surrounded by a globe of joined-together network nodes

Cybersecurity best practices for small businesses

In an era dominated by digital advancements, small businesses increasingly rely on technology to drive growth and efficiency. However, this increased reliance on digital platforms also exposes them to cyber threats. I’ve worked in technology implementation and maintenance for 20 years now, and cybersecurity has increasingly become a critical concern for small businesses. Gone are […]

Tux the penguin (the official brand character of the Linux kernel) sat in-front of a box representing a terminal window

Linux commands everyone should know

If you’ve just switched to Linux, or find yourself needing to do work in Linux shell, then this list of core Linux commands along with a brief description of their functionality is for you. Linux shell is similar to Command Prompt/PowerShell in Windows, it uses text-based commands to conduct both basic and powerful actions. It’s […]

A faceless hoodie dark green hoodie character sounded by binary digits (1s and 0s)

eMail hacked? 9 things to do now

Taking you through the steps to recover from a hacked eMail account, and to minimise the chance of a future hack. If your eMail is hacked, you need to do more than just change your password. This article answers the question of “what next?”for those who have suffered from an account hack.

Cyber security awareness training: Protecting yourself and your organisation

I’ve spent my career advising on, and implementing, information technology at everything from multi-national corporations to small businesses. I’m regularly confronted with the need to step up the knowledge of an organisation (not just the IT department) to protect against cyber attacks. I know it’s difficult for small businesses in-particular to find cost-effective ways to […]

An iPhone being held in our hand

When is the right time to replace your smartphone?

In today’s fast-paced technological landscape, smartphones have become an integral part of our lives. They are our communication hubs, personal assistants, entertainment centers, and more. However, with the rapid advancement of technology, it can be challenging to determine when it’s time to bid farewell to your trusty old device and welcome a new smartphone into […]

How to securely wipe a computer (when selling or disposing)

When it comes to selling or disposing of an old computer (desktop or laptop), it isn’t always easy to be sure that your data cannot be recovered by the new owner. I’ve spent my career working in the IT industry, so this is my guide on how to securely wipe a computer that is running […]