About Steve Bell

Steve has a background in IT and business journalism and in the past has written extensively for both the UK national and trade press including The Guardian, Independent-on-Sunday, The Times, The Register, MicroScope and Computer Weekly. He's also worked for most of the world's largest IT companies in a copy and content producing capacity. He has a particular focus on IT security and has been involved in writing about the industry at various levels ranging from magazine launches to producing newsletters. He also runs a small copy writing business called Art of Words. When not bashing away at a keyboard he can sometimes be found in a boxing gym making futile efforts to keep fit or marveling at the works of Sufi poets such as Jalaluddin Rumi and Hafiz of Shiraz.

How to recover lost data from USB flash drives and SD cards

USB stick informationsWith portable flash drives now as ubiquitous as fresh air we store all sorts of important information on them from important and sensitive documents to family and holiday snaps on digital SD cards. Never mind the heartache data loss that these devices can cause, it can also cause practical problems especially if these devices store the fruit of labours or sensitive information. However, the good news is that most of the time data can be recovered from flash drives and SD cards. And here’s how.

Read more

Hi-tech Movie Myths

hack.movieTraffic lights that are hacked, hotel doors prised open with ease and port security systems infiltrated to move millions of dollars of illicit goods are just some of the themes that crop up in the movies. These scenes were often set up in films years ago but today they’re not just fictional elements in a ripping good yarn, they are reality.

Read more

Tips to help identify and safeguard against hacks in the gaming world

computer gameGaming has gone from a niche activity back in the day, when only the devoted and fanatical applied themselves to games like Doom, to an explosive pastime enjoyed by over one billion people. Today’s games are clever, sophisticated and challenging. They’re also a target for hackers. If you’re a gaming fan, read on to discover how to protect yourself and how to identify potential attacks.

Read more

Ugly Mail – Gmail extension to identify e-mail tracking pixels

email With spyware and adware already tracking our movements across the web who needs another form of intrusive monitoring? It seems like some people can’t get enough of tracking others and emails that tell the senders whether you’ve opened an email and where you were if you did are becoming more common. However, help is at hand. Ugly Mail is the simplest of tools and it lets you know if an email that has dropped into your inbox is designed to track you.

Read more

How to recover data from broken hard disk drive

HDDA hard drive failure can feel calamitous but it doesn’t have to be. Data on hard drives can be recovered and below we show you how, along with a description of signs that might indicate your drive is stuttering. We also added a bit of info on how to recover deleted files from recycle bins because it’s something we all need, isn’t it?

Read more

Online pranks and viruses on April Fools’ Day

april fools dayApril Fools’ Day is a time of mirth. Funny stories do the rounds in the press such as chickens laying square eggs complete with pictures and the Queen setting up a fracking rig in the grounds of Buckingham Place. But a word to the wise, as a ‘calendar day’ April Fools’ Day is also used by online tricksters. Discover some of the funny, or not so funny viruses, that have tricked people in the past and arm yourself with some simple information to keep you safe.

Read more

Biggest online hacks of all time [INFOGRAPHIC]

data breachThe number of organizations that have been hit by hackers reads like a ‘who’s who’ of just about every major operation on the planet. The list includes retail giants, the US military and one of the world’s largest employers, the UK’s National Health Service. That said hacks have become so common we’ve almost become accustomed to the implications – identity theft, financial loss and the sale of our personal details.

Read more

Have you lost your Microsoft Office product key? Here’s how to retrieve it

key productYour Windows or Office software usually comes bundled on your computer, along with discs that contain the product license key. But losing these discs is easy and once lost you no longer have access to the product key. So should you want to reinstall the software you could, on the surface, have a problem. However, you can recover your product license keys from the Windows Registry and it’s a lot simpler than you might think with third-party utilities. Here’s how.  

Read more

Plugin by Social Author Bio