Category: Blog

“She Who Would Be King” Episode 2: “Sasha”

Please Check out my new podcast “She Who Would Be King!”

In this second episode of “She Who Would Be King”, Annakah of Bananakah sails her mighty ships into the ocean, only to run into danger! Thunderstorms in the endless sea leave her and her crew lost. But, don’t worry. We know Annakah always defeats her fears, bad luck and trouble! Annakah never gives up! In “Sasha” she discovers mysteries, magic and maybe even meets some new friends and scary enemies! I think you’ll enjoy Episode 2: “Sasha”.

If your child, niece, little or big sister has a story of their own, I’d love to read it! Each month I would like to be able to make a listeners story into a full live podcast. Please email any stories to Until the website is up, that is my  contact email. I will read all submitted stories. I’d love to feature young listeners work as much as possible! I may take some liberties in grammar, etc. to get the work online.

Please review this podcast. It really helps it get off the ground. If you enjoy “She Who Would Be King” or your kids do, please share it as much as possible. On digital channels or just by telling other parents, people who like kids and believe in strong, empowered girls.

“She Who Would Be King” Podcast

Check out my new podcast featuring the adventures about powerful girls for all ages!

Only Secure As Our Weakest Link

A common topic among digital communications and the IT professionals lately has been the dangers we all face if our digital identity security is compromised. Today we all have our own individual digital identity. Our digital profile is created over time from everything we have ever done using digital channels.

It’s concerning that some people really don’t realize that they are only as safe as their weakest online account. Whether it’s a business or an individual, our security is only as strong as the weakest link. This “weakest link” in our least secure data access point on the Internet.

Most of us forget about some of our old accounts or emails we created. These are vulnerable access points into more valuable personal data. These insecure points can be old email accounts, unused online memberships, eBay or other old digital commerce accounts, emails left over from previous employers, etc.

These weak points can be weak links into our digital profile. Information from these weaker accounts can give hackers easier access to info needed to get at our valuable accounts.

These access points and accounts that may contain: Personal information, reused passwords, phone numbers, family members names, etc. All are potential ways into our existing digital channels.

The danger is far greater than just people using our credit cards. Many people think the problem isn’t that serious because it’s just “Visa replacing my money and sending me a new card”.

Some of these other concerns: Using your identity to access to your other accounts, opening new credit card accounts, gaining access to your social security number to work under your identity, approve major property purchases, open false loans, open online selling accounts for money laundering and reselling stolen goods, etc.

Some Recommendations to Protect Yourself

  1. Use an antivirus and malware application and leave it on at all times.
  2. Never use your debit card online. This gives out your bank account details and direct access to your money.
  3. Delete old social media and email accounts.
  4. Use a separate password for each website and complex passwords that contain numbers, symbols, capitals and lowercase characters.
  5. Keep a digital record of your passwords in an Excel or other spreadsheet. Be sure the spreadsheet has a master password to protect it.
  6. Turn on and use your computer’s firewall. Only allow access for software and sites you are sure you can trust.
  7. Consider adding security extensions to your browser such as: Ghostery to monitor and easily control the way websites track you. Click&Clean to delete your tracks online to minimize private info about you in your browser history.
  8. Use two-factor authentication. This is the service that sends you a text or a call when you log-in to your accounts as a secondary security check. This results in a huge increase in security, but many people skip it since it’s a bit annoying.
  9. Check and verify old employers have removed your profile and email from their systems. If they need to stay open, periodically check them to be sure they are still secure.
  10. Create and use only new and individual passwords on all websites. Retire old and reused passwords.
  11. Use passwords that don’t include info related to your personal information such as birth dates, children’s or spouses names, your address, phone numbers, your age or date of birth.
  12. Use a password manager such as LastPass, Dash Lane, Keeper or another with positive reviews. Many password managers are free or very inexpensive.
  13. Consider using a VPN (virtual private network) when accessing your financial accounts, paying bills or other sensitive business tasks online. Private Internet Access and TorGuard are a couple VPN developers that are proven to be secure. These mask your IP address, so anyone tracking you cannot reach your digital access point.

Hope this has some value to it’s readers. Approach the Internet in general with skepticism to be safer online.


Grandmasters Wing Chun Kung Fu

Grandmasters Wing Chun went live today!

Thank you to Mike Selner of for his web hosting, knowledge and technical expertise!

Be sure to check it out if you want to become like Bruce Lee and Ip Man!


Hotz Law Website Launched!

We just launched a new website for our fantastic client, Darrel Hotz Law Offices in Toronto, Canada at:


Long Hours = Casual

Well, not the most professional I’ve ever looked, but with this much going on, who has time to dress up just to do work?
Now my great customers can now see I am working on your projects by day and by night!

The Dark Web

Peeking Into The Dark

A brief glimpse into the Dark Web shows are level of vulnerability. People looking for digital information and tools to commit crimes go to covert websites like we might go to Amazon. Instead of everyday items, they are their shopping carts, and they do look and act like ecommerce shopping carts, to buy credit card information, personal identification data and Paypal information. They also sell software designed for all levels of intrusion and control of computers and networks connected to the internet. The better the stolen information or the intrusion software, the higher the price.

Digital Money & Invisible People

Transactions can go on through anonymous, encrypted data transfers and online accounts many, many users deep. People can hide who they really are creating a user or business name or email, etc. to create an account, then that one to create another account, etc. The end result is a twisted and tangled web of email addresses and scrambled ide

ntification. This is part of how digital criminals hide online. Another popular way to carry on this illegal and unethical business is through using the digital and anonymous currency of Bitcoin.

Improving Security

I plan to learn more to better protect myself and my clients and take the complete course on ethical hacker information and cyber security. I will post more as I learn things that may be of use. Watch your digital backs my friends.

Mac’s Not Immune Anymore

Mac’s Not Immune Anymore

Hello fellow Mac users. We are moving into the PC world more every day. If you have antivirus, spyware and malware removal tools and use them regularly, you’re a smart person. Mac’s are no longer immune from these things just because they are Apple computers. Those days of being safe because you’re on a Macintosh are long gone.

Dark Web

Since the web and Internet are my business, I feel it’s my responsibility to know as much as possible about the Internet. The more I know the better. I recently spent a little time learning about the Dark Web. I feel if I don’t know something, I’m more likely to fall prey to it.

Staying Safe

I thought my Mac based system was secure. I use a VPN, regularly run malware detection software, delete suspicious cookies, use an Ad Blocker, etc. Reading about the Dark Web was disturbing. I decided to run a deep scan of my whole system with Mac versions of Bitdefender’s Antivirus and cross check with AVG Antivirus, as well as running MalwareBytes malware removal tool, CCleaner and PrivacyScan. I checked all my drives and compressed archives from my years in business. That meant deep scanning nine drives and partitions. The process took about 24 hours in total!

Was I Protected?

Well, I wish I could say it was 100% clean, but despite my efforts I located and removed adware, malware and a few viruses engineered for the Mac. Without running complete and deep scans with excellent software, not all these threats showed up. It shows how diligent we need to be to protect our data and privacy.


New Updates at Dynamic Family Chiropractic

Check out the new website changes at our customer’s website at Dynamic Family Chiropractic!


Left Brain & Right Brain People a Myth

No Right Brain & Left Brain

My son Adam had mentioned that new studies had shown that they have debunked the theory of dominant right and left brain hemispheres. I had to do some research and see what the facts were on this.

Well, I guess I can’t claim my artistic side comes from my right brain anymore. I feel silly now looking back on recommending the book “Drawing from the Right Side of the Brain” to my design students. I guess we should all stop saying we are “left or right brained” people.

Scientific research has now shown that everyone actively uses both sides of their brains for creative and analytic tasks. All the techniques to develop the separate hemispheres of the brain, if they do anything, are not because we have dominant hemispheres of the brain.

Science progresses and we often find “truth” becomes myth. The science that was based on personality linked to bumps on one’s head and the idea of falling off the flat earth now seem ridiculous. Now the right and left brain belief has been shown to be untrue. All of us, like myself, who believed this “fact” now seem pretty stupid. From now on I won’t be claiming that the right or left brain was a cause of this or that phenomenon. Sorry if this blew your creative right or mathematical left hemisphere!

There is a link to the science behind this discovery here.