Camera on tripod capturing photography of sunset in natural hill scenery.

Removing light flicker in time lapse – in Linux

If you’ve tried creating a time lapse videos from pictures accidentally shot with automatic settings for exposure etc.. you’ve probably noticed some flickering in the final video. Don’t worry, all is not lost. This post shows you how I have managed to remove flicker from a time-lapse video in just such a situation. I do […]

Google search bar with magnifying glass logo missing from the search button

FIXED: Google custom search magnifying glass icon missing

I’ve recently re-added Google custom search (also known as “Google Programmable Search Engine”) as an option from Adsense to this website to make searching for articles easier. Having added the basic Google search code, I was surprised to see that the magnifying glass icon in the search button was missing. So for others suffering with […]

Random batteries laid out on a surface

How to store lithium batteries safely

Storing lithium cells and batteries carefully is crucial as improper storage of lithium cells can lead to significant safety hazards such as fire and health issues, as well as degrading battery life. Those working with lithium must bear these hazards in-mind, both during the lifetime of the associated device (e.g. laptop or smartphone), and in […]

The inside of a hard disk drive, showing the head sat over the disc

Simple Linux backups using 7-zip (7z) and tar

In this post I want to look at the use of Linux terminal commands for a simple and effective backup routine on Linux. We all know we should backup regularly, but it always feels like a pain to perform backups. As a result, most of us have been burnt by the loss of data from […]

Blue shield surrounded by a globe of joined-together network nodes

Cybersecurity best practices for small businesses

In an era dominated by digital advancements, small businesses increasingly rely on technology to drive growth and efficiency. However, this increased reliance on digital platforms also exposes them to cyber threats. I’ve worked in technology implementation and maintenance for 20 years now, and cybersecurity has increasingly become a critical concern for small businesses. Gone are […]

Blurred development code to resemble hacked data

Create a secure login area using PHP

If you’re looking to have anyone log into your website, PHP is a great way to code this yourself securely. In this post, I’ll take you through creating a basic user authentication system using PHP. To keep things simple initially, I’ll store the user information (username and password) in the script. Once you’ve got this […]

Tux the penguin (the official brand character of the Linux kernel) sat in-front of a box representing a terminal window

Linux commands everyone should know

If you’ve just switched to Linux, or find yourself needing to do work in Linux shell, then this list of core Linux commands along with a brief description of their functionality is for you. Linux shell is similar to Command Prompt/PowerShell in Windows, it uses text-based commands to conduct both basic and powerful actions. It’s […]

A faceless hoodie dark green hoodie character sounded by binary digits (1s and 0s)

eMail hacked? 9 things to do now

Taking you through the steps to recover from a hacked eMail account, and to minimise the chance of a future hack. If your eMail is hacked, you need to do more than just change your password. This article answers the question of “what next?”for those who have suffered from an account hack.

Activities to perform a PC healthcheck

Recommended steps to quickly and easily perform a healthcheck of a Windows PC for improved security and performance.

A caravan in a field with other caravans

The best place to sell a caravan in the UK

Struggling to sell your caravan? This is THE place to get the best results!