LTech Solutions Blog

LTech Solutions has been serving the Hudson area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Load Cached Pages in Google Chrome for Offline Browsing

b2ap3_thumbnail_google_chrome_400.jpgYou might have experienced the frustration of reading an article online and having the Internet connection cut out on you. This is one of the most common problems while working with a shoddy WiFi connection. If this happens to you, you can view your browser’s cached pages in order to finish up what you were reading; so long as you’re not trying to view pages like Facebook, which update periodically throughout the day.

Continue reading

What Really Happens when Websites Collect Your Personal Data

b2ap3_thumbnail_entering_personal_data_online_400.jpgYou might be aware that some websites collect personal data from you depending on your mobile device’s location, your browsing history, and several other factors. This information is generally used for marketing, but it could have unforeseen effects on the way you browse the Internet. It can be fairly revealing about your personality, or possibly even incriminating. Therefore, you should be aware of how this personal information is gathered from you without you even knowing it.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Privacy Technology Productivity Google Hackers Miscellaneous Cloud Workplace Tips Business Internet Efficiency Microsoft Mobile Devices Email Backup Hosted Solutions Malware Windows 10 Browser User Tips Marketing Holiday Android Employer-Employee Relationship Office Windows Save Money Innovation Small Business Business Computing Social Media Remote Computing Automation Business Continuity Disaster Recovery Chrome Software Computer Upgrade Smartphone VoIP Hardware Data Server Communication Mobile Computing WiFi Microsoft Office Application IT Services Hacking Lithium-ion battery Health Managed Service Provider Mobile Device Management Passwords Retail Mouse Business Management Going Green Network IT Solutions Big Data Gmail IT Support Gadgets Bandwidth Fax Server Biometrics Networking DDoS Entertainment App Spam The Internet of Things Recovery Memory Mobility Smartphones Virtualization Saving Money communications History Website Environment Office Tips Budget Operating System Social Engineering Quick Tips Apple Telephone Systems Computers Mobile Office Tablets YouTube Two-factor Authentication Twitter PowerPoint Meetings Hard Drives Consultant Privacey NarrowBand Distributed Denial of Service Maintenance BYOD Human Resources Humor Avoiding Downtime Office 365 Programming Best Available Wireless Technology Collaboration Shortcut Search Data Management Risk Management Chromecast Streaming Media Unified Threat Management Remote Monitoring Save Time Uninterrupted Power Supply Wireless Analyitcs Bring Your Own Device Encryption Ransomware Vendor Management Cleaning SharePoint Social User Laptop Notifications Virus Excel Tech Support eWaste Network Security Social Networking Phone System Bluetooth Touchpad Facebook Hacker Compliance WIndows 7 Shadow IT User Error Best Practice Robot USB Safety Analytics Science Virtual Reality Worker Commute Managing Stress Internet Exlporer Wearable Technology Customer Relationship Management Settings Windows 8 Bloatware Sports Running Cable Customer Service Windows Media Player Online Currency People Tablet Entrepreneur iPhone VPN

Blog Archive