What are you looking for?

TQA Weekly Show Notes for Season 5

Digital Rights Management
Copy Protection that Angers Legitimate Purchasers

Steve Smith, talks about DRM, the technology that angers legit purchasers, and gets laughed at by pirates.

Read more

Windows 10: Disliked Features
Windows 10 Features that users hate from Privacy issues to Anti-Piracy mechanisms

Steve Smith talks about a few features in Windows 10 that break people's trust, and kills illicit software and hardware.

Read more

Memory Leaking
Unexpected Flaw Crashing Applications Seemingly Randomly

Steve Smith, talks about how a specific type of programming flaw, a memory leak, can cause applications to crash seemingly randomly, and unexpectedly.

Read more

Siri versus Cortana
Pinning Apple's personal assistant versus Microsoft's

Steve Smith pins Siri against Cortana to show which has the most functionality.

Read more

What is Secure Boot?
Windows 10, and Older Hardware Support

Steve Smith talks about how Windows 10, for many users will include the possibility to run this latest operating system on non-UEFI mainboards at the cost of Secure Boot functionality.

Read more

Live Streaming
What does one need to stream live game play or podcasts?

Steve Smith talks about live streaming for podcasts, and game play, and the cost of entry into the latest craze of content creation online.

Read more

Adapter or Converter?
When can you use an adapter, or when is it appropriate to use a converter?

Steve Smith clarifies the question, adapter or converter, by explaining why we need converters, and when using an adapter is just fine.

Read more

Over-Heated and Throttled
How-to protect your computer in summer

Steve Smith explains why the hottest period of the year can pose a risk to your computer.

Read more

How does one remain private online?
An Interesting Thought Experiment on Privacy

Steve Smith creates a thought experiment for you to think about, one that would render all data collection methods against metadata useful, and protect communications of everyone online by making the process of decoding all messages harder by protecting past and future communications.

Read more

PCI-E Slot Accessories Available to Consumers
What is meant to go into each PCI-E slot type available on your mainboard?

Steve Smith answers the question from fellow YouTuber, Randy Hos, asking what the PCI-E slots are made for, which accessories are meant to be used per slot type.

Read more

10 Ways Other People Can Hack Your Accounts
The many ways social engineering allows others to hack into your accounts online

Steve Smith talks about some of the many social engineering tactics some people may use to gain access to your accounts online.

Read more

Is Your Computer Infected?
Warning to users about online and phone scams

Steve Smith explains why you should be wary of anyone telling you, your computer is infected.

Read more

Warning: fopen(): Filename cannot be empty in /home/content/89/8628489/html/includes/cacher.php on line 7

Warning: fwrite() expects parameter 1 to be resource, boolean given in /home/content/89/8628489/html/includes/cacher.php on line 7

Warning: fclose() expects parameter 1 to be resource, boolean given in /home/content/89/8628489/html/includes/cacher.php on line 7