Home Blog Page 4

Stuck for Elf on the Shelf ideas? Try our FREE AI-powered Elf Prank Generator

0

It’s that most dreaded time of the year for parents who unwittingly allowed the Elf on the Shelf into their home once upon a Christmas Past! The holiday season is almost upon us again, meaning it’s time to come up with almost a month’s worth of elf pranks.

We’ve had so many parents share their dread at suffering prankers’ block leading up to Christmas. So, we thought we’d help you out.

This year, we’re introducing our brand new AI Elf Prank Generator. Get ready to automate your Elf-on-the-Shelf pranks and spread some much-needed laughter and mischief!

Get Ready for Hilarious Holiday Shenanigans!

The holiday season is all about spending time with loved ones and making memories. But let’s be honest, sometimes those memories can get a little dull. That’s where our AI-powered Elf Prank Generator comes in. This unique tool is designed to help you pull off the most hilarious and memorable pranks this holiday season. And the best part? Our AI Elf has an unlimited supply of free ideas, so you’ll never run out of shenanigans to pull.

With our AI Elf Prank Generator, you can crank up the humor and spread joy to everyone around you. Spice up your family gatherings by getting your relatives in on the fun. Or prank your coworkers and turn your office into a merry prankster’s paradise. With a simple click, our AI Elf will generate a prank tailored to your specific situation. From silly pranks to elaborate schemes, our AI Elf has got you covered.

Spread Laughter and Mischief with Our AI Elf Pranks!

Our AI Elf Prank Generator is not your average prank generator. It’s equipped with the latest technology to ensure that your pranks are top-notch and full of laughter. Our AI Elf has been programmed to understand human behavior and come up with pranks that are sure to have everyone in stitches. So say goodbye to boring holiday gatherings, and hello to hilarious shenanigans.

This holiday season, spread laughter and mischief with our AI Elf Prank Generator. Whether you want to play a harmless prank on your friends or pull off an epic prank on your family, our AI Elf has got you covered. And the best part? Our pranks are customizable, so you can add your own personal touch. So what are you waiting for? Elf-inate your holiday fun with our AI Elf Prank Generator and make this a holiday season to remember.

The holidays are all about having a good time, and our AI Elf Prank Generator is here to help you do just that. With its unlimited supply of hilarious pranks, you can spread joy and laughter wherever you go. So don’t wait any longer, visit our website and start planning your holiday shenanigans with our AI Elf today! Remember, the more pranks, the merrier! Happy holiday and happy pranking!

The AI-powered GoodGeeky Elf-on-the-Shelf Prankinator

To start generating ideas for this season’s elf pranks, just let us know a little bit about your childr… ahem… discerning target audience! Just keep in mind that AI does eat the occasional magic Christmas mushroom now and then, so hallucinations and errors may occur. Please don’t yell at us if some of the suggestions our prankinator comes up with are not physically possible or potentially a bit inappropriate.

Also, we’re recording queries and responses for the time being in order to help with testing. Please don’t share personally identifiable details with us.

Google Maps updates color scheme for desktop users: What you need to know

0

Google Maps feels a bit different for some users of the desktop browser version: The map colour scheme has changed!

Back in August, 9to5Google reported Google was trialling out a new colour scheme in its smartphone app, which looked a lot like Apple Maps.

Now, it looks like the same colour scheme is making its way to the desktop version, with at least some Windows 11 users on Google’s Chrome browser seeing the new colour scheme.

In terms of the terrain, most colours are a bit lighter both on land and at sea. But, the bigger change is road colours, which used to be white for smaller roads and yellow for larger roads and motorways.

Useability-wise, this was a problem because the yellow roads blended in with live traffic conditions, making it harder to see where the holdups were on the network.

In the new colour scheme, all roads seem to be varying shades of grey (or possibly bluish grey), making live traffic conditions all that much more glanceable.

Produce more with this fantastic keyboard and mouse combination – Logitech MK850

0

The Logitech MK850 Keyboard and Mouse combo has been around for a while, and it still represents a significant step up for most of us when it comes to computer periferals. We’ve used this keyboard and mouse combo here at GoodGeeky for years now, and we love it!

Combining the fantastic K850 Keyboard with the super-comfortable M720 Triathlon mouse, this set offers advanced features for smoother, more efficient computer work.

Heads up! We may earn a commission for any products or services purchased via links in this post. The money we make through these links helps keep the lights on and the wheels turning. Thanks for supporting us!

Although this combo carries a higher price point, the return on investment in terms of productivity, comfort, and ease of use is substantial. And the best part? You can switch between controlling three different computers (and even your iPhone or iPad)!

The K850 Keyboard is designed with user comfort and convenience in mind. Its ergonomic and cushioned construction aims to reduce fatigue during extended typing sessions. The keys respond swiftly to touch and operate quietly, ensuring a smooth typing experience.

The M720 Triathlon mouse takes traditional mouse functionality to new heights. It is designed to pair with three devices, similar to its keyboard counterpart. Users can scroll on a laptop one minute, and edit a presentation on a desktop the next, all at the click of a button.

The scroll wheel of the M720 mouse provides precision when needed and speed when desired. With a hyper-fast mode for quick navigation and a click-to-click mode for precision tasks, it suits various needs and boosts productivity across tasks.

The Logitech MK850 combo also comes with an impressive battery life. The K850 keyboard operates up to 24 months on a single set of batteries, and the M720 mouse lasts up to 12 months. This means less interruption and more focus on what matters – the work at hand.

Setting up the Logitech MK850 combo is straightforward. It involves connecting the devices to the preferred systems using Bluetooth or the included Unifying receiver. Once connected, you can further customize your experience using the Logi Options+ app.

The Logi Options+ app unlocks a host of functionalities, allowing users to tailor the keyboard and mouse settings to their individual needs. The app enables custom button and gesture mapping, meaning you can set specific functions or shortcuts to individual keyboard and mouse buttons. Done right, this can really enhance your workflows with – for example – editing videos in Davinci Resolve or Adobe Premiere Pro.

The Logitech MK850 Keyboard and Mouse combo is a comprehensive solution for anyone seeking to enhance their productivity when on the computer. Despite its higher price point, the value provided by this combo in terms of multi-device compatibility, long battery life, ergonomic design, and customizable settings positions it as an outstanding choice in its category.

These 2 simple commands will speed up Windows 11

0
close up of electric lamp against black background
Photo by Pixabay on Pexels.com

Windows users often face the challenge of system slowdowns and sluggishness over time. This can be caused by a myriad of issues, but quite frequently it can be traced back to corrupted files or inconsistencies in the operating system.

sfc /scannow and dism /online /cleanup-image /restorehealth are two simple, yet powerful commands for maintaining system health and enhancing performance. By following this guide, while taking appropriate precautions, you can take full advantage of these utilities to help keep your Windows 11 computers running smoothly.

What do sfc /scannow and dism /online /cleanup-image /restorehealth actually do?

  1. SFC /scannow

System File Checker (SFC) is a utility in Windows that allows users to scan for corruptions in Windows system files and restore them. When you run sfc /scannow, the command scans all protected system files, and replaces corrupted files with a cached copy located in a compressed folder at %WinDir%\System32\dllcache (usually c:\Windows\System32\dllcache).

This process helps in restoring the health of your system files, subsequently boosting the performance of your computer.

  1. DISM /online /cleanup-image /restorehealth

Deployment Image Servicing and Management (DISM) is another tool built into Windows, primarily used for preparing, modifying, and repairing system images, including Windows Recovery Environment, Windows Setup, and Windows PE. But it also has the ability to fix the system image of your installed operating system.

When you run dism /online /cleanup-image /restorehealth, the DISM tool will connect to Windows Update to download and replace corrupt files. If the Windows Update client is broken, you should try to use a repair source like a Windows side-by-side folder from a network share or from a removable media, such as the Windows DVD or a USB flash drive.

How to Use These Tools?

Please note that these commands must be run in the Command Prompt as an administrator. Running the Command Prompt as an administrator gives the process elevated permissions, which could potentially be harmful if misused. Therefore, always double-check the commands you’re entering to ensure they won’t inadvertently cause harm to your system.

Step-by-step Guide to speed up Windows using SFC and DISM in Command Prompt

  1. Open Command Prompt as an administrator

Press the Windows key or click on the Start button and type cmd. Right-click on the Command Prompt application and select “Run as administrator”. If a User Account Control (UAC) prompt appears, click “Yes” to proceed.

  1. Running the SFC Scan

In the Command Prompt window, type sfc /scannow and press Enter. This process might take some time, so please be patient. Avoid interrupting the scan as it might lead to unintended consequences.

  1. Running the DISM Command

Once the SFC scan has completed, you can proceed to the DISM command. In the same Command Prompt window, type dism /online /cleanup-image /restorehealth and press Enter. This process can also take a while, so patience is key.

After the process is complete, it’s recommended to restart your computer to finalize the changes made to your system.

Still running slow?
More ways to speed up Windows

Is your computer still laggy? Check out our comprehensive guide to speed up Windows.

We earn a commission if you make a purchase, at no additional cost to you.

Potential Issues and Warnings

While these commands can be instrumental in speeding up your Windows computer, they come with a couple of warnings:

  • Always use caution when running CMD as an administrator: Running Command Prompt as an administrator grants the process high-level access to the system. Always ensure the commands you’re entering are correct to prevent potential damage to your system.
  • Avoid Interruptions: Once the process begins, avoid interrupting it. An interruption can lead to file inconsistencies, causing more harm than good.
  • Backup your Data: It’s always a good idea to back up your data before making significant changes to your system. While these tools are generally safe and reliable, there’s always a small risk of data loss when dealing with system files.

This simple back-up strategy will keep your data safe from disaster in 2025

0
woman holding two white-and-orange plastic cases

The importance of regularly backing up data cannot be understated. From family photos and personal documents to important work files, our lives are increasingly stored in digital form.

But, despite its importance, data backup often remains a misunderstood and neglected practice for many.

That being said, a good routine for backing up your data doesn’t have to be hard!

With the 3-2-1 rule, you can protect your data against a wide variety of threats, from hardware failure to natural disasters.

MacBook Pro

Understanding the 3-2-1 rule

The 3-2-1 backup rule is a best practice for data backup.

It’s simple yet effective: keep at least three copies of your data, store two backup copies on different storage media, and keep one of them located offsite.

Three copies of data

Keeping three copies of your data ensures that even if one copy is lost or corrupted, you still have two more to fall back on.

The first copy is the original data stored on your computer or smartphone.

The second is a backup stored on an external device like an external hard drive or network attached storage (NAS).

The third is another backup stored offsite, usually in the cloud.

Two different media types

Different types of storage media have different vulnerabilities.

By keeping your backups on different types of media, you can protect your data from a wider variety of threats.

An external hard drive or a NAS device is an excellent choice for local backup, as it allows for quick recovery.

For the second type of media, cloud storage services like Google Drive, Dropbox, or Apple iCloud, or a dedicated backup service are ideal.

One offsite backup

Storing one backup offsite protects your data from local threats like theft, fire, or flooding.

The easiest way to keep an offsite backup is to use a cloud storage service.

These services store your data in remote servers, which are typically distributed across multiple locations for additional security.

Implementing the 3-2-1 rule

Now that you understand the 3-2-1 rule, let’s look at how you can implement it in your digital life.

Local backup

Start by purchasing an external hard drive or setting up a NAS device.

The device you choose should have enough storage capacity to hold all the data you wish to back up.

Many external hard drives and NAS drives come with backup software, which you can install on your computer to automate the process.

Alternatively, there are tons of free and paid solutions out there, which you can download and install.

Cloud backup

Cloud backup services are an easy and efficient way to store an offsite copy of your data.

Google Drive, Dropbox, and iCloud all offer a certain amount of free storage and have options to increase this for a monthly or yearly fee.

These services are easy to set up and can automatically back up specific data types, such as photos from your smartphone.

Remember to secure your cloud storage accounts with a strong, unique password and enable two-factor authentication.

Stay consistent, and test!

Once you’ve set up your backup system, consistency is key.

Regular backups ensure that you always have the most recent version of your data safe.

Automating this process can make it more efficient, and most backup software and cloud services offer the option to schedule regular backups.

Every so often, it’s also worth testing your backups by restoring a file and making sure it opens correctly.

This can catch potential issues before they become critical.

Furthermore, if your backup includes sensitive information, consider using encryption to add an extra layer of security.

Many backup services offer this as an option.

Wrapping it up

Implementing the 3-2-1 rule might seem like a big chore, but once set up it provides a reliable and robust safety net for your digital life.

Remember, in our digital age, data loss is not a question of ‘if’ but ‘when’.

The 3-2-1 rule is a straightforward and effective way to ensure that when data loss happens, it’s nothing more than a minor inconvenience rather than a significant crisis.

Simply keep your data backed up, automatically, and get on with your life.

Simple cybersecurity guide for non-geeks in 2025

0
closeup photo of eyeglasses

Cybersecurity doesn’t have to be complicated! A few straightforward practices will go a long way to keep your digital life secure. Here’s a condensed, jargon-free guide to help minimise the chances of running afoul of cyber criminals and other online nasties!

Heads up! We may earn a commission for any products or services purchased via links in this post. The money we make through these links helps keep the lights on and the wheels turning. Thanks for supporting us!

Keep software current to stay ahead on cybersecurity

Software updates may seem tedious, arriving at the most inconvenient times and potentially causing disruptions to your device’s performance. But, these updates are not merely for introducing new features or improving user interface. A substantial part of these updates involves enhancing the security of your devices and fixing vulnerabilities that might have been identified since the last update.

Understanding software updates

Software updates, sometimes referred to as ‘patches’, are released by software developers to address issues or enhance functionality within their programs. Among these improvements are often fixes for ‘bugs’ or vulnerabilities in the system, which if left unaddressed, could potentially be exploited by hackers. These security loopholes can range from minor issues, having little impact on the user, to major vulnerabilities, which if leveraged, can lead to massive data breaches.

Why are updates essential?

Cybercriminals are constantly evolving their methods, looking for new vulnerabilities to exploit in widely used software. When these vulnerabilities are identified by the software companies, they develop a fix or patch to eliminate the weak spot and release it as a part of a software update.

If users do not apply these updates, they are effectively leaving the door open for cybercriminals. Running outdated software is akin to leaving your front door unlocked – it makes it easier for an intruder to enter.

Risks of not updating

Outdated software not only makes your devices an easier target but also increases the potential damage if a breach occurs. Cyber attacks can result in loss of personal data, financial damage, and in the case of smart home devices, potential physical security risks. It’s important to consider the updates as your first line of defense against these threats.

Update all your devices

The importance of software updates extends across all devices you use. This includes not just your computer, but also smartphones, tablets, smart home devices, and even seemingly ‘non-smart’ devices that connect to the internet. Remember, cybercriminals can potentially exploit any device connected to the internet.

Keep up with updates

One simple strategy to keep your software up to date is to enable automatic updates. Most devices and software offer this feature in the settings menu, allowing updates to be installed as soon as they’re released, often overnight when the device is not in use.

If automatic updates aren’t an option, consider setting a regular schedule to manually check for and install updates. This habit can greatly enhance the security of your devices.

Strong passwords are essential for good cybersecurity

Use strong, unique passwords

Passwords are your first line of defense against cyber threats. Just as you wouldn’t use a flimsy lock for your front door, you shouldn’t compromise when it comes to your digital passwords. They may seem like just a string of characters, but they form the primary barrier between your personal information and potential cybercriminals. This article highlights the importance of using strong, unique passwords and introduces password managers as a key tool in managing these digital keys.

The strength of your password matters

Consider passwords as the digital equivalent of your home’s lock. The stronger and more complex it is, the harder it will be for a burglar to break in. The same principle applies to your digital security. A strong password, comprising a mix of uppercase and lowercase letters, numbers, and symbols, is not easy to guess and much harder for hacking tools to crack.

Simple and commonly used passwords are incredibly easy for hackers to guess. Passwords like ‘123456’, ‘password’, or ‘admin’ are equivalent to leaving your digital front door wide open. Hence, it’s vital to use complex and unpredictable passwords for every online account.

The risk of password duplication

Using the same password across multiple platforms is another common mistake. While it might be easier to remember, if a cybercriminal cracks that one password, they have the keys to all your online accounts. This is known as a ‘domino effect’ and can lead to a disastrous breach of your digital privacy and security.

The role of password managers

Remembering multiple complex passwords for different accounts can seem like an impossible task. This is where password managers come into play. These are secure applications that store all your passwords in an encrypted format. You only need to remember one master password to access your password vault, and the password manager does the rest.

Password managers can also generate strong, random passwords for you, eliminating the risk of creating predictable or weak passwords. They are designed with strong encryption algorithms to ensure your passwords are stored safely.

We use this!
Bitwarden - a trustworthy password manager

Bitwarden is a slightly less well-known password manager. That doesn't mean it's any less good. With no known major security breaches (at the time of writing this), an excellent free plan (with features that most other password managers charge you for) and great paid updates, we highly recommend checking out Bitwarden if you need a password manager to take care of your passwords.

We earn a commission if you make a purchase, at no additional cost to you.

Double down on cybersecurity: The role of two-factor authentication

While strong and unique passwords provide a solid first line of defense, they aren’t impenetrable. Here is where two-factor authentication (2FA) steps in. This article delves into the importance of enabling 2FA and how it provides an additional layer of security for your digital life.

Understanding two-factor authentication

Two-factor authentication, also known as 2FA, is a cybersecurity protocol that requires two forms of verification before allowing access to an account. It’s akin to a second lock on your door, providing an extra layer of protection even if the first one is broken.

Typically, the first factor in 2FA is something you know (your password), and the second factor is either something you have (like a unique code sent to your mobile device) or something you are (such as a fingerprint or face scan).

Why is two-factor authentication important?

The main purpose of 2FA is to make it harder for potential intruders to gain unauthorized access to your accounts, even if they have managed to crack your password. Without the second factor, they would still be locked out.

Imagine a hacker manages to guess or steal your password. If you’ve enabled 2FA, they’ll be prompted for a second verification step. Unless they have access to your phone to receive a unique code, or to your fingerprint or face scan, they’re still locked out.

Enabling two-factor authentication

Most online platforms today offer 2FA as an option. It’s usually found in the settings under security or privacy. While it may take an extra moment to log in to your accounts, the additional security is worth the time.

The second factor in 2FA varies depending on the platform. Some send a unique code to your email or mobile device. Others might use biometric data, such as a fingerprint scan or face recognition, especially on smartphones. There are also dedicated 2FA apps like Google Authenticator or Authy that generate timed codes.

Two-factor authentication: A small step, a big leap in security

Even with 2FA enabled, it’s crucial to continue practicing other security measures, such as regularly updating your software and using strong, unique passwords. No single security measure is foolproof, and each one adds another layer of protection against potential threats.

Stay safe on public Wi-Fi

From coffee shops to airports and libraries, public Wi-Fi networks have become ubiquitous. They offer a convenient way to stay connected on the go. But while these networks provide a great service, they also come with significant security risks. This article will delve into why public Wi-Fi can be risky and how you can protect your data when using these networks.

Understanding the risks of public Wi-Fi

Public Wi-Fi networks are usually unencrypted, which means that the data you send and receive over the network isn’t secure. Hackers can easily intercept this data, gaining access to sensitive information like passwords, emails, and credit card numbers. This is often done through a method known as “Man-in-the-Middle” attacks, where the attacker positions themselves between the user and the connection point.

Furthermore, cybercriminals often set up rogue Wi-Fi hotspots that mimic legitimate networks. Unsuspecting users might connect to these networks, giving the attacker direct access to their device and data.

How to safeguard your data

Despite these risks, there are steps you can take to protect your data when using public Wi-Fi:

  1. Limit your activity: Avoid accessing sensitive information, such as your bank accounts or any other financial or personal data, while connected to a public network.
  2. Use HTTPS: When browsing, check for ‘https’ at the beginning of the web address. This indicates that the site uses encryption to secure the data transferred between your device and the site.
  3. Turn off sharing: On a public network, disable file sharing options and make sure your firewall is active.

The role of a VPN

One of the most effective ways to ensure your online activities remain private is by using a Virtual Private Network (VPN). A VPN encrypts the data leaving your device until it reaches its destination. Even if someone intercepts your data, all they would see is encrypted information.

VPNs work by creating a secure, encrypted tunnel between your device and the VPN server. They also mask your IP address, adding an extra layer of privacy. Today, there are many VPN services available, with options to fit different needs and budgets.

Smart homes, secure homes: Protect internet-connected devices

Smart home devices, from thermostats to security cameras, bring convenience and efficiency to our lives. But, as with any technology that connects to the internet, they also carry security risks.

Hackers can potentially exploit vulnerabilities in these devices, gaining unauthorized access to your home network and data. This article will guide you through crucial steps to secure your smart home devices.

Risks of smart home devices

Every smart device in your home represents a potential entry point for cybercriminals. By hacking into a weakly protected device, they can infiltrate your home network and compromise your privacy and security. For example, a hacked security camera could provide a live feed of your home to an intruder, while a compromised smart speaker could listen in on your conversations.

Manufacturers often release software updates that patch security vulnerabilities and improve functionality. Regularly updating your devices ensures they have the latest protections against potential threats. Where possible, enable automatic updates to maintain the most up-to-date security.

Beware of phishing

Phishing scams deceive users into voluntarily providing sensitive information, often by masquerading as a trustworthy entity. This article aims to educate readers about phishing scams, their implications, and how you can protect yourself from becoming a victim.

Unpacking phishing scams

Phishing scams typically come in the form of an email, text message, or phone call that appears to be from a legitimate source, such as a bank, social media platform, or reputable company. The scammer tricks the user into divulging sensitive information like usernames, passwords, credit card numbers, or social security numbers, under various pretexts.

For example, a phishing email might alert you to a security breach in your bank account, urging you to confirm your credentials, or warn you about a parcel delivery failure, asking for personal data to resolve the issue.

The dangers of phishing

The consequences of falling victim to a phishing scam can be severe. If scammers gain access to your sensitive data, they could potentially drain your bank account, make fraudulent purchases, steal your identity, or even compromise your entire digital life.

How to protect yourself from phishing scams

There are several ways to arm yourself against phishing attempts:

  1. Scrutinize unsolicited communication: Be wary of unexpected emails, text messages, or calls that ask for personal information. Legitimate organizations usually do not request sensitive data via these channels.
  2. Check for email red flags: Phishing emails often have misspellings, poor grammar, or unofficial email addresses. The tone may be urgent, pressuring you to act quickly.
  3. Hover over links: Without clicking, hover over any hyperlinks in emails. This action will reveal the actual URL. If it doesn’t match the text or seems unrelated to the supposed sender, it’s likely a scam.
  4. Be cautious with attachments: Be wary of unsolicited emails with attachments, as they can contain malware. Only open attachments from trusted sources.
  5. Enable two-factor authentication (2FA): Using 2FA on your accounts provides an extra layer of security, making it more challenging for phishers even if they obtain your username and password.
  6. Report suspicious activity: If you come across a potential phishing scam, report it to your email provider and the supposed sender. This action helps protect others from the same scam.

A safety net for your digital life: Keep regular backups

Data is one of the most valuable assets. From precious photos and personal documents to work files and financial information, losing such data can be devastating. One of the most effective ways to safeguard your digital life is to regularly back up your data. This article will walk you through why data backup is so crucial and how you can do it effectively.

Understanding the value of backups

A backup is essentially a copy of your data stored in a secondary location. In the event of a cyber attack, device loss, or even just accidental deletion, having a backup means you won’t lose everything. It’s the digital equivalent of an insurance policy for your valuable data.

Without regular backups, you risk losing everything stored on your device in an instant. This loss can stem from various incidents such as hardware failure, theft, natural disaster, or a ransomware attack, where cybercriminals encrypt your data and demand payment to unlock it.

How to back up your data

External drives: External hard drives or USB drives can be used to store copies of your files. The benefit of this method is that your data remains physically close to you. However, these drives can also be lost, damaged, or stolen, so they shouldn’t be your only backup.

Cloud services: Cloud backup services like Google Drive, Dropbox, or Apple’s iCloud offer a more robust solution. They automatically sync your files to the cloud, allowing you to access them from any device with an internet connection. They also have high levels of redundancy, meaning your data is stored in multiple locations for added security.

While backing up your data is a crucial step, it’s equally important to ensure your backups are secure. If you’re using a cloud service, this means protecting your account with strong passwords and enabling two-factor authentication (2FA).

Remember, the goal is to keep your data out of the wrong hands, even when it’s backed up.

Check this guide!
How to back up your digital life

The importance of regularly backing up data cannot be understated. From family photos and personal documents to important work files, our lives are increasingly stored in digital form.

But, despite its importance, data backup often remains a misunderstood and neglected practice for many.

With the 3-2-1 rule, you can protect your data against a wide variety of threats, from hardware failure to natural disasters.

We earn a commission if you make a purchase, at no additional cost to you.

Your digital bodyguard: Use antivirus software

woman in black shirt using laptop computer

Cyber threats come in various forms, each with its unique way of compromising your digital safety.

Viruses and worms can corrupt your data or degrade your device’s performance. Spyware can monitor your activities, stealing sensitive information such as passwords or credit card numbers. Ransomware can lock you out of your system, holding your data hostage until a ransom is paid.

Given these threats, it’s clear that some form of protection is necessary. That’s where antivirus software comes in.

The role of antivirus software

Antivirus software acts as a digital bodyguard for your device. It monitors for any malicious activity, scrutinizes suspicious files, and blocks or removes threats before they can cause harm. It’s your first line of defense against many of the threats that lurk in the digital landscape.

Modern antivirus software doesn’t just protect against viruses. It also guards against a range of malware, including spyware, ransomware, and phishing attacks. Some even come with features such as firewalls or parental controls, offering a more comprehensive security solution.

Keeping your antivirus software up to date

However, it’s not enough just to install antivirus software and forget about it. Cyber threats are continually evolving, with new strains of malware appearing regularly. To combat these emerging threats, antivirus software must be kept up to date.

Manufacturers regularly release updates that equip the antivirus software with the tools it needs to tackle the latest threats. These updates can include new virus definitions, improved detection techniques, or fixes for any software vulnerabilities. By ensuring your antivirus software is updated, you can stay one step ahead of cybercriminals.

Guard your digital gates: Understand and manage app permissions

Apps often request access to various data and features on our devices – a concept known as app permissions. While some of these permissions are necessary for the app to function correctly, others might be superfluous, encroaching on your privacy. This article will explore the importance of reviewing and managing app permissions.

The scope of app permissions

From accessing your camera or microphone to reading your contacts or location, apps can request a wide range of permissions. Sometimes these permissions are essential; for instance, a navigation app needs your location to provide directions. However, not all apps require broad access to function, and some might ask for more permissions than necessary.

Unchecked app permissions can lead to privacy risks. For instance, an app with access to your contacts could potentially share this information with advertisers. Similarly, an app that can access your microphone could theoretically listen in on your conversations.

Reviewing and managing app permissions

Here’s how you can maintain control over your app permissions:

  1. Understand before you install: Before downloading an app, understand what permissions it requests and why. If an app asks for access that doesn’t align with its purpose, consider it a red flag.
  2. Regular reviews: Regularly review the permissions for each app on your device. Both Android and iOS offer ways to view and manage app permissions through their settings.
  3. Restrict unnecessary permissions: If you find an app with permissions it doesn’t need, restrict them. You can usually do this through the settings on your device.
  4. Update your apps: App updates often include security patches and might also reduce the permissions the app requires.

The digital vault: Encrypt your data for enhanced security

Encryption provides an added layer of protection for your sensitive data, turning it into an unreadable code that can only be deciphered with the correct key.

What is encryption and why is it important?

Encryption, at its core, is a method of disguising data so that only authorized parties can understand it. It transforms readable data, known as plaintext, into an encoded version, called ciphertext. This process requires a key, and only with this key can the ciphertext be converted back to its original form.

This mechanism is vital for protecting sensitive information from being accessed by cybercriminals or prying eyes. Even if an unauthorized party manages to intercept the data, without the correct key, they will see nothing but gibberish.

Implementing encryption in your digital life

While the concept of encryption may seem complex, applying it to your everyday technology use is surprisingly straightforward:

  1. Device encryption: Most modern smartphones, computers, and tablets have built-in encryption capabilities. For example, iPhones automatically encrypt data when you set a passcode, while Android devices usually have an encryption option in the security settings. For computers, both Windows and Mac provide built-in encryption tools, namely BitLocker and FileVault, respectively.
  2. Encrypted communication: For sensitive conversations, consider using communication apps that offer end-to-end encryption, like Signal or WhatsApp. This encryption ensures that only you and the person you’re communicating with can read the messages.
  3. VPNs: A Virtual Private Network (VPN) encrypts the connection between your device and the internet, protecting your data from potential eavesdroppers, especially on unsecured public Wi-Fi networks.
  4. Encrypted cloud storage: When using cloud storage services, opt for providers that offer encryption, like Google Drive or Dropbox. However, always remember to use strong, unique passwords and enable two-factor authentication for an added layer of security.

Wrap-up!

Navigating the digital world can often feel like walking a tightrope. But, with the right precautions it’s not only manageable… It’s empowering!

Think about it: by staying on top of updates and creating strong, unique passwords, you’re taking active steps to keep your personal information safe. It’s not rocket science, it’s just smart web-surfing.

Enabling two-factor authentication adds another layer of security, while being careful on public Wi-Fi networks is a simple way to protect your data.

Similarly, securing your smart home devices and staying sharp against phishing scams can significantly reduce your vulnerability. Regularly backing up your data is like having a safety net—yes, things can go wrong, but you’ve got a plan.

With updated antivirus software and smart management of your app permissions, you’re staying one step ahead. And through data encryption, you’re putting your information in a virtual safe.

Cybersecurity and keeping your digital information is not about fear, It’s about feeling confident and secure in your digital life! Remember, you’re not just a bystander. Putting in place a few simple cybersecurity habit places you in control.

This FREE AI trick fixes YouTube captions in seconds

0

YouTube doesn’t add punctuation to autogenerated video captions. So, whenever I publish a video, I used to end up spending 15-20 minutes just adding full stops and commas.

This bugs me… With all the advanced tools out there, like ChatGPT, how hard could it be to generate the punctuation in the first place?

Speaking of which: Did you know, you can use ChatGPT to add punctuation to YouTube’s automatic captions? 😅

To see it in action, watch our latest video below, of keep scrolling for a written step-by-step guide.

How to fix up your YouTube captions using ChatGPT

  • In YouTube Studio, go to your video, then hit the Subtitles tab. You’ll see an entry for the automatic subtitles YouTube has made for you.
  • Select Duplicate and Edit to make a copy of the original subtitles.
  • Copy these automatic captions, then switch to ChatGPT.
  • Instruct ChatGPT to proofread your YouTube transcript and to add punctuation. The prompt can be something like, You are a proofreader. Add punctuation to the following text:
  • Paste in the automatic captions and hit enter.
  • Copy the now neatly punctuated text from ChatGPT and head back to YouTube.
  • Paste the improved text into the subtitle track, ensure it updates properly, and then hit ‘Publish’.
  • To save a bit more time, you can also get ChatGPT to generate a video title, description and tags based on the subtitles.

Using ChatGPT to punctuate your captioning is incredibly straightforward, and once again I can’t for the life of me understand why YouTube doesn’t just add punctuation in the first place… Until then, yay for ChatGPT!

Master your SharePoint news feed with category filters

0

Managing a SharePoint site can sometimes get a bit overwhelming, especially when it comes to organizing the influx of news posts. As your site grows, you may want to filter and categorize news posts to ensure that relevant information gets the prominence it deserves and reaches the right audience.

In this post, we will introduce you to a simple, step-by-step process for filtering and displaying SharePoint news posts by category. This way, you can set up news feeds on your site(s) to display specific types of news posts in specific locations.

We’ve included a step-by-step guide below… Or you can just watch this video tutorial on how to categorise SharePoint news posts

Why Use Categories for SharePoint News Posts?

Categorizing news posts in SharePoint offers several benefits for site managers and visitors alike:

  1. Improved organization: By categorizing news posts, you can keep your site clean and well-organized, making it easier for users to find relevant information.
  2. Enhanced user experience: Filtering news posts by category helps users quickly locate the content they are interested in without having to sift through a cluttered news feed.
  3. Efficient communication: By tagging news posts with specific categories, you can ensure that important updates reach their target audience, enhancing the flow of information within your organization.

How to Filter SharePoint News Posts by Category

Follow these steps to filter SharePoint news posts by category. In this example, we are setting up a news feed that will display management updates only.

  1. Access Site Contents:
    • Locate the cogwheel/gear icon in the top right corner and click on it.
    • Click on “Site Contents” and navigate to “Site Pages.”
  2. Create a new column:
    • Click on “Add Column” and choose “Choice” for more flexibility.
    • Name your column “news category” and add your desired choice, such as “management update.”
    • Save the column.
  3. Tag news items with the new category:
    • Choose the news posts you want to tag as “management updates.”
    • Click on “Properties” and add the “management update” category to the selected news posts.
    • Publish the tagged news posts.
  4. Edit the news web part:
    • Return to the site home page and enter edit mode.
    • Update the news feed title to “management updates.”
    • Click the pencil button to configure the news web part.
  5. Filter news posts by category:
    • Change the news source to display only news from the current site.
    • Navigate to “Filters” and choose “Page properties.”
    • Select “news category” as the property.
    • Set the filter to display news posts with the category “management update.”
    • Republish the page to display the filtered news posts.
  6. Add new news posts with the category:
    • Click “+New” and select “news post.”
    • Choose a blank template and create your news post.
    • Click on “Page details” and set the “news category” to “management update.”
    • Publish the news post.
  7. Edit or remove the category from news posts:
    • To change or remove the category, click “Edit” on the news post.
    • Navigate to “Page details” and update or clear the “news category.”
    • Update and publish the news post.

Now your SharePoint news feed will display only news posts tagged with the “management update” category.

Make impressive POV walking videos – a comprehensive guide (2025)

0

Point of view (POV) walking videos are becoming more and more popular as a way for people to explore both famous and unknown places. These videos help connect viewers with new locations and nature experiences from the comfort of their own homes through a first-person perspective of walking or hiking. Done well, POV videos give viewers the sensation of being there themselves.

This guide will give you all the information you need to make great POV walking videos, including how to plan, shoot and edit your videos, as well as tips and techniques to stand out from the crowd.

1. Essential gear and equipment for capturing stunning POV walking videos

In creating impressive POV videos, having the right gear and will make a tremendous difference. But, it doesn’t have to be expensive. In fact, you probably already have the gear you need to get started.

The camera you choose will play a significant role in the quality of your footage. Aside from picture and sound quality, stabilisation is arguably the most important trick to making good POV walking videos.

Mirrorless cameras

Mirrorless camera can produce fantastic POV walking videos thanks to their large sensors. Having this kind of camera will really set your videos apart, especially if you film in low-light conditions or at night. These cameras offer amazing image quality and lots of settings to capture stunning video quality. You can also attach an external microphone to get top-notch audio.

The drawback is that mirrorless DSLR cameras are big and heavy, so they are not very practical for long walks. Plus, you will need additional equipment, including a large and potentially very expensive gimbal to get good stabilisation. So while this kind of gear will give you the best possible quality, it’s worth looking at other options if you don’t want to spend thousands of dollars up front.

If you go with a mirrorless camera, also get a good wide-angle lens. A focal length between 10-24mm is ideal for capturing expansive scenery and landscapes and will give your viewers a more immersive experience.

Action cameras

Action cameras are a great way to film POV walking videos

Action cameras, such as GoPro Hero 11 or DJI Osmo Action 3, are great alternatives for making POV walking videos because of their compact size, wide-angle lenses, and ruggedness. These cameras withstand the elements well and are perfect for capturing ultra-wide-angle shots.

While small, action cameras pack a massively big punch in terms of image stabilisation. You can forget about gimbals… Recent action cameras will capture super-stable footage even if you’re running at full speed with your camera.

Another great thing about using an action camera for POV walks is that you can mount the camera to yourself and free up your hands… All you’ll need is a mount that allows you to secure your camera to your body or backpack. Popular options include:

  • Head mount: Placing the camera on your forehead or temple with a head mount provides an elevated viewpoint and records a fairly accurate reflection of your visual field. But be prepared for eye rolls and “bl**dy influencer” comments as you walk around with your camera stuck to your head.
  • Chest mount: This harness-like device will hold the camera secure to your chest. While arguably the most secure option, chest mounts don’t exactly make you look good.
  • Clips: Far less noticeable, a good action camera clip allows you to attach your camera to the shoulder strap of your backpack. This is a versatile option as it lets you adjust your camera position to suit the situation. And as a bonus, you will be far more inconspicuous while walking around and filming.
Need gear?
Check our review of the GoPro Hero 11 Black for POV walking video

We've tested the GoPro Hero 11 Black to see how this small yet powerful action camera holds up for creating point-of-view (POV) walking videos.

This review is all about seeing if this camera lives up to its promise, and how well it works for filming walking videos. We'll dig deep into its key features, video quality, and even recommend some accessories and settings to make sure your videos come out top-notch.

We earn a commission if you make a purchase, at no additional cost to you.

Smartphones – great for beginners

A smartphone is a great beginner option for filming POV walking videos. Provided you already have one, you can essentially get started for free! And they can produce amazing video quality, especially if lighting conditions are decent.

Personally, I’ve made multiple videos with my trusty iPhone 11 (not even the pro model). I had some minor issues with HDR glitches (apparently a common problem with iPhone 11), but aside from this, I couldn’t really fault the footage it produced.

While newer phones, including the iPhone 14 Pro, have incredible stabilisation, they cost a lot of money. If you have an older smartphone, I’d recommend picking up an inexpensive smartphone gimbal rather than upgrading to the latest and greatest.

2. The importance of planning your POV walking and hiking videos

The first step in planning your POV video is scouting a location or area that will captivate your audience. Look for visually interesting places with a variety of terrains, unique features, or impressive landmarks.

Research popular trails or scenic routes in your region, or venture off the beaten path to explore lesser-known locations for a more exclusive experience. Remember, your location will set the tone for your entire video, so choose wisely.

Plan your route

Once you’ve settled on a location, you’ll need to plan your route. If you’re hiking, consider the length and difficulty of the trail, bearing in mind your physical capabilities and the time required to complete it. And if you’re doing a city walk, consider things like timing to avoid massive crowds of people, which will make it hard for your audience to actually experience the scenery.

Either way, plan your route to include points of interest and scenic viewpoints that will keep your viewers engaged and eager for more. If practicable, consider walking your route twice. That way, can scout out the points of interest and really plan your route before filming.

Mind the weather

The weather can make or break your video, so it’s crucial to monitor the forecast leading up to your shoot. Overcast days offer more consistent lighting, while sunny days provide dynamic shadows and contrast that can enhance your footage. Be prepared to adapt your shooting schedule if the weather takes an unexpected turn, and always have a backup plan in case of rain or other unfavourable conditions.

Timing is everything

The time of day can significantly impact the lighting and overall mood of your video. Consider shooting during the golden hour, the period just after sunrise or before sunset, when the sun casts a warm, inviting glow on the landscape. This time of day can truly elevate your footage and set it apart from the rest. Unless you’re on a fairly high latitude (think more than 45 degrees north or south), try to avoid filming in the middle of the day if the sun is out, as the light will be very harsh and unflattering.

3. POV shooting techniques

Making exceptional POV walking videos is not just about having the right gear and equipment. Good shooting technique is essential to create a captivating and immersive experience for your viewers.

Framing and composition

The way you frame your shots can make a significant impact on the overall aesthetic of your video. If you plan to mount your camera on your body or backpack, aim to recreate the view you get by using your own eyes. Place the camera along the centre line of your body if possible and keep the horizon approximately in the middle of the shot.

If you’re going handheld, you have more freedom to frame and compose your footage depending on the scene. In that case, the most basic concept to keep in mind is the rule of thirds. This fundamental composition technique involves dividing the video frame into an imaginary 3×3 grid and then positioning key elements of your scene along these lines of thirds – or, even better, at their intersections. This creates balance and visual interest in your shots.

Example of a 3×3 grid to help you compose your shots

Also, consider using leading lines and natural frames to draw your viewer’s eye into the scene and guide their gaze through the frame.

Learn more
7 tricks to take better photos with any camera

Composing visually interesting and appealing photos (and video shots!) takes a lot of practice. But keep going and soon it will be second nature.

For a bit of help getting started, check out this article for 7 great tricks to take better photos (many of these tips apply to video too) with any camera.

We earn a commission if you make a purchase, at no additional cost to you.

Camera movements add interest and variety

Incorporating various camera movements can make your videos more dynamic and engaging.

  • Panning: Slowly move your camera horizontally from one side to the other, revealing a new scene or landscape. This movement can create a sense of depth and scale in your footage.
  • Tilting: Gently tilt your camera up or down to showcase the terrain or reveal a point of interest, such as a mountain peak or a river below.
  • Tracking: Move alongside your subject, maintaining a consistent distance and angle. This technique can help to create a connection between your viewer and the subject, whether it’s a fellow hiker or an animal crossing your path.

Key to any camera movement in POV walking videos is to move slow. Tilt or pan too fast and your audience will start feeling disoriented and uncomfortable. Take. It. Slow.

Pacing keeps your viewers engaged

Maintaining a captivating pace in your video is key to keeping your viewer engaged. You can accomplish this by changing up your walking speed and stopping in one place to take in the sights if you find yourself in a place with a lot of eye-catching visuals.

Also, remember to look at small and interesting details. If you spot an interesting object or detail, walk up to it and film it so that your audience can also get an up-close look.

4. Editing tips for POV walking videos

While POV videos rarely require much editing, spending a bit of time on polishing and finessing will help your final product come to life.

Editing

POV videos are normally more or less uncut. But I highly recommend running your footage through an editing software to cut out less interesting parts of your walk, tinker with colours and light, and tweaking your audio to make sure it sounds good.

For bonus points, grab some highlight shots and edit them into a quick intro, showing your viewers all the amazing places they’ll see in your video.

Text and graphics

While editing, include text and graphics in your video when required to provide context and important information. But do it sparingly. I normally try to show the name of a location or trail, and occasionally other information such as distance traveled, weather, time of day and factoids about a particular location or feature. Ensure the font and style of your text align with the overall aesthetic of your video. Graphics, such as maps or icons, can also enhance your video and provide additional information about your journey.

Wrap-up

POV walking and hiking videos are increasingly popular for sharing an experience or location with audiences around the world. I hope this guide has helped you with some useful tips and tricks to get you started making POV videos. Now, grab your gear and hit the great outdoors. And let us know in the comments if you’ve made an awesome POV video that you’d like to share.

Need gear?
Check our review of the GoPro Hero 11 Black for POV walking video

We've tested the GoPro Hero 11 Black to see how this small yet powerful action camera holds up for creating point-of-view (POV) walking videos.

This review is all about seeing if this camera lives up to its promise, and how well it works for filming walking videos. We'll dig deep into its key features, video quality, and even recommend some accessories and settings to make sure your videos come out top-notch.

We earn a commission if you make a purchase, at no additional cost to you.

11 tools every great freelance writing business needs – complete guide (2025)

0

Yours truly (hello, Marius here!) has been a freelance writer for years and right now I’m going to share with you 11 tools that will help you with everything from tracking gigs and clients and getting paid, through to brainstorming, drafting and polishing your texts.

Heads up! We may earn a commission for any products or services purchased via links in this post. The money we make through these links helps keep the lights on and the wheels turning. Thanks for supporting us!

Freelance writing business tools

NOTION – the everything app (Seriously!)

Notion is possibly the ultimate tool to help run your freelance writing business

This is going to sound like I’m fangirling… And I am! Except that I’m male, so I’m probably fanboying actually. Anyways, here goes:

Notion has made such a huge difference to both my professional and personal lives. It’s helped me run my freelance business, manage publishing workflows for my websites and YouTube channels, keep home renovations on track, plan an international move, sell stuff on Ebay, write books… No, seriously! It’s. That. Good!

And it’s free!

Notion lets you build databases from scratch. But it doesn’t feel like you’re building databases. You’re building things like project planners, wikis, shopping lists by typing in a few things like /table or /timeline, and then magic happens.

There’s a learning curve with Notion. A rather steep one, in fact. But if you’ve ever worked with any sort of database, Atlassian tools like Jira and Confluence, or Microsoft Planner, then you’ll be right at home in Notion. And if you haven’t there are tonnes of YouTube tutorials to help you get started.

Did I mention Notion is really good? And free?

Yep, it’s free! Well, at least as long as you’re not after fancy features like 100 guest collaborators (you can work with 10 collaborators on the free plan), unlimited file size uploads (free plan limit is 5 megabytes per file) and syncing with lots of other tools like Jira, GitHub and Asana (you can sync with one external database for free).

If you’re after the fancy features, plans start from US$8 per user per month.

Here’s the portfolio view of my Notion for running my freelance business. Notice the other views across the top, like the kanban (which show me where every article is in the production line), the work in hand view (which shows me how much all the jobs I have lined up are worth) and the timeline (which shows me when I’m supposed to work on what).

CLOCKIFY – keep track of time

I’m horrendous at time management. I’ll spend hours procrastinating before I start working, and I only start working when I have exactly enough time left before a deadline that there’s lots of pressure on me to get this thing done.

So, I’m using Clockify to keep me on track.

Clockify is a timekeeping app that will track every minute of work you do on your projects. Just pop over to Clockify.me to get started.

Using Clockify, you can set up clients, projects and task. Once you’ve done that, just hit the play button to start tracking your time and let Clockify know which task you’re working on. It’s smart enough that you can skip between the Clockify browser app and smartphone app while time tracking. It’s all the same.

All of the time you’ve worked is added to a calendar, and you can compile reports by projects and clients to see how much time you have spent on a particular job and how much time is left in your estimate.

Clockify is almost too good for a freemium service. Unless you’re managing a team of freelancers, most of you will never need to move to a paid plan (which start at US$4 per user per month, by the way).

STRIPE – get paid!

Best known as a payment processor, Stripe lets online (and offline) merchants accept payment from customers in for example online shops. Mostly anyone who has ever run an ecommerce site with the help of WordPress/WooCommerce or Shopify lately will have bumped into Stripe at some point in time.

One less known feature about Stripe – which I only realised a couple of months ago, when I had to change invoicing services again – is that Stripe also does invoices. And estimates! And, unlike most invoicing apps out there, you only pay for what you use.

This is super handy for freelance writers. Especially if you don’t issue way too many invoices per month.

Stripe allows you to send estimates to your customers right out of the system backend. It works pretty much all the same as every other invoicing software out there. The difference is, you can send as many estimates and invoices as you like. But you only ever pay a fee for any invoices that get paid. (Which, you would hope, is every single invoice that you send out.) There is no fixed monthly fee. Which is great for small businesses.

When you invoice customers, Stripe will simply take a very small cut of the money they pay you. On the starter plan, which gives you invoices, analytics and a personalised customer portal, you get charged 0.4% of the invoice amount (this may vary depending on which country you’re in).

The next step up is the plus package, which adds a further 0.1% to your fee – 0.5% in total – which enables quotes and estimates, auto-reconciliation (at least for US customers) and helps automate payment collection with smart retries and email reminders.

Considering most invoicing services start at a US$10 fixed monthly fee, Stripe is a great option for you – especially if you sell for less than US$2000 per month.

Tools to help your creative freelance writing process

WHIMSICAL – mindmapping, whiteboarding and more

This one is just that… Whimsical! A brainstorming, mindmapping, outlining, project management, drawing, flowcharting tool – all in one.

Once I’ve landed a freelance writing gig, this is the first tool I use in my writing process. The mindmapping functionality of Whimsical is fantastic for brainstorming text outlines, make research notes, and reference any sources I need to come back to later in my writing process.

Whimsical is a freemium service. On the free plan, each workspace you set up (and yes, you can set up multiple workspaces) can contain up to 500 items across all files (mindmaps, project plans, flowcharts and so on) contained within that workspace, and you get 100 AI actions per month. If you need more, you can upgrade a workspace for US$10 per month for unlimited items and 2000 monthly AI actions.

Real-life example of a mindmap outline and list of sources that I set up in Whimsical while writing for a recent client. For anyone wondering, this

MICROSOFT WORD – words, words, words

The big kahuna of the word processing scene, Microsoft Word is a staple in writing circles worldwide. Whether you’re a blogger, copywriter, journalist or work in – let’s face it – practically any major company anywhere in the world, Microsoft Word will be your go-to word processing tool.

If blogging is a side hustle for you and you use Microsoft Word in your day job, chances are you’ll be entitled to install a copy of the whole Microsoft 365 (what used to be Office 365) suite on your home computer. Just check in with your employer first, to see if that option is available to you.

If you don’t have access to Microsoft 365 through work, or if you want your own cloud storage along with your Microsoft 365 copy, check out the personal and family plans over at Microsoft.

Recently, Microsoft included the new-ish functionality Editor in most of its Microsoft 365 apps including Word. Editor is Microsoft’s answer to Grammarly and ProWritingAid. We’ll talk more about Editor in the ‘spelling, grammar and style’ section below.

GOOGLE DOCS – google, google… words

For many writers, Google Docs is one of the go-to writing tools for creating and collaborating on documents. With lots of useful writing features and the ability to export your Google Docs to any number of file formats, this is a great option if you’re on a limited budget and you can’t get Microsoft 365 through your employer.

Google Docs is also the tool of choice for many writers when it comes to collaborating on documents.

If you have an account with Google, you already have access to Google Docs along with 15 gigabytes of free storage. If you don’t, you can set up a Google account now, for free.

SCRIVENER – more than words!

This one’s is for writing nerds. Like me! Clocking in at US$49 for a licence (with student discounts available), Scrivener might not be for everyone. But for the amount of word processing power it delivers, this is an insanely good price.

Scrivener can be described as Word meets OneNote meets EndNote meets your filing cabinet with a learning curve to match its complexity.

That learning curve can put aspiring writers off ever getting started, but if you persist you will have one writing app to rule them all. Scrivener lets you write anything from blog posts to novels to movie scripts. It’ll keep all of your research together in one easy to find place. (Seriously, you can store URLs, documents, notes, practically any sort of file in your Scrivener research sections.)

And there’s lots of tools inside of Scrivener that can be useful for writers of all flavours. (Going slightly off the blogging track here, but how does a fictional character name generator sound? Or the ability to compile that novel you’ve been working on into a ready-to-go ebook format or beautifully formatted PDF?)

I’ve been using Scrivener for a couple of years now, and it’s great. If you want to take it out for a spin, get a free Scrivener trial at Literature and Latte.

Freelance editing tools

HEMINGWAY APP – when you use too many words

Ernest Hemingway is a GOAT! One of the greatest authors of all time! Not all of his writing has aged all that well. (Keep in mind, his writing career spanned the 1920s to 1950s, when certain norms and values were a bit different.) But, his writing style is still fantastic!

By style, I’m thinking short sentences, simple word, direct and active language, minimal adverbs (avoiding most words ending in -ly) and so on. Surely, we bloggers could do with writing a bit more like Ernest Hemingway to make life simpler for our readers.

Enter the Hemingway Editor, also known as the Hemingway App. It’s one of the simplest and best free online writing tools I’ve come across, and it’ll have you writing in the style of Hemingway in no time. The Hemingway Editor checks that you’re not overusing adverbs and passive voice, and it tells you which sentences, phrases and even words could be made simpler.

It also does a quick calculation of how readable your content is by giving it a grade level. That grade level corresponds to years of schooling. So a grade level of six means a sixth-grader should be able to read it. Did you get a grade level of 15 on your text? That’s university graduate stuff. As an insider tip, aim for a grade level of no more than seven for general blog content.

Check out the Hemingway Editor to start writing like a GOAT right now.

GRAMMARLY – smarter words

Grammarly is like the Hemingway Editor on AI-powered steroids. It integrates into practically every writing tool you could possibly want (except Scrivener) to keep check of your writing projects.

It’s great for practically all types of writing you would do in daily life, including emails, short-form content, business documents, documentation and much more.

The free Grammarly plan checks for spelling, grammar and punctuation. It also helps you with clarity by pulling you up when youre writing is not concise. And, it’ll assess your text for tone, telling you whether you sound formal, worried, forceful, excited an any other number of things.

Grammarly’s paid premium plan takes it up a few notches, adding suggestions for how to adjust your tone. It also scrutinises your choice of words, fluency, clarity and much more.

A free plagiarism checker will tell you whether your text contains similarities to writing found online or in academic papers. For paying customers, the plagiarism detector will also highlight which passages of text may be considered plagiarism.

The free plan will be more than enough for many writers, and if you think you need more, you can trial Grammarly Premium risk free to improve your blog right now.

There’s one type of writing where Grammarly doesn’t necessarily shine. And that’s for long-form content. As in, very long-form content like novels. For that, we recommend ProWritingAid.

PROWRITINGAID – for the smarter writer

As writing tools go, ProWritingAid is to authors what Grammarly is to copywriters. Just like Grammarly, ProWritingAid is an AI-powered grammar checker and text editor that integrates into more or less every writing tool you could possibly want. Including Scrivener (and Word, Google Docs, Chrome, Firefox, Edge and Safari).

ProWritingAid is my editing software of choice. The reason being said integration with Scrivener. I’m a bit of an aspiring author, you see, so by integrating with Scrivener, ProWritingAid can keep an eye on my book writing.

With ProWritingAid, you will get somewhere in the vicinity of 20 different tools to improve your writing, picking apart everything from your writing style and grammar to pacing, dialogue tags, alliteration and consistency.

A really cool feature, which I love, is that ProWritingAid will compare your writing style to that of world famous authors and copywriters like JK Rowling, Stephen King and Seth Godin and show you how you can write more (or less) like them.

The free version of ProWritingAid is word-count limited and will only work in your browser, while the paid version removes the word count limit, gives you access to integrations for Scrivener, Word and Google Docs, and you get access to the ProWritingAid writers resource library.

As a paying customer, you also get a few credits towards ProWritingAid’s plagiarism tool, which checks for similarities in your writing against online and offline content, including academic papers. But, if you’re a frequent user of that functionality you will need to pay anywhere between US$1 and US$0.20 per check, depending on how many credits you purchase at a time.

Highly recommended!
ProWritingAid

ProWritingAid is my editing software of choice. It gives you more than 20 different tools to improve your writing, picking apart everything from your writing style and grammar to pacing, dialogue tags, alliteration and consistency.

We earn a commission if you make a purchase, at no additional cost to you.

MICROSOFT EDITOR – for stingy writers

Is Microsoft Editor the Grammarly killer? I’m sure Microsoft hopes it is… To be honest, it probably isn’t. But, it’s included with Microsoft 365 products (such as Word and PowerPoint), so if you’re already a card carrying member of that club, then you might not need to join the Grammarly or ProWritingAid crowd as well.

Microsoft Editor runs a bunch of checks on your writing, such as spelling, grammar, clarity, conciseness, formality, punctuation and so on. It will adapt the checks depending on whether you’re putting together a casual, formal or professional piece of text.

There’s even a free similarity checker, which is a plagiarism detector of sorts that checks if your writing is similar to any online sources that Microsoft’s search engine, Bing, can find.

But how do I find clients?

Clients for your freelance writing business are everywhere – you just need to know where to look. One of the best places to find clients quickly is Fiverr.

Check out how I got my first clients on Fiverr by doing everything ‘wrong’.

Fiverr

Are you looking for top-quality freelancers to take on a project?

Definitely check out Fiverr! As both a Fiverr buyer and a certified Fiverr Pro copywriter, I can personally recommend this platform for anything relating to writing, marketing, research, coding, design, graphics, animation, video and much more!

We earn a commission if you make a purchase, at no additional cost to you.