Atlas Shrugged, written by Ayn Rand, is by far the longest book I have ever read. At approximately 645,000 words, it is quite the undertaking. For comparison, it is 2.5X as long as the largest Harry Potter book (“Harry Potter and the Order of the Phoenix”), which sits at 257,045 words. According to Wikipedia, Atlas Shrugged is the 20th largest novel of all-time (9th longest novel written in English).
Continue reading “Atlas Shrugged: 645,000 Words Later (A Book Review)”
You have undoubtedly heard countless horror stories of people using sites like Kijiji to sell their wares – being mugged, buying fake or stolen items, and the like. All of which are risks that can be avoided with due diligence and precaution. Instead, I want to take a moment to outline a very popular Kijiji PayPal scam. I’m sure this scam perpetuates itself on other platforms but it seems to be particularly common on Kijiji.
Continue reading “ Kijiji PayPal Scam – How it Works”
|Based on the DC Comic, the government gives a team of supervillains a chance at redemption. The catch: their mission will probably kill them all.
Have you heard the word on the street yet? If not, you have probably been living under a rock. The disappointing news that Suicide Squad sucks has quickly travelled down the grape vine.
The Avenger‘s success drove expectations for Suicide Squad through the roof. Unfortunately, while The Avenger’s is a full put-together movie, Suicide Squad is not. It just didn’t work.
Continue reading “Suicide Squad Sucks! Movie Review”
You may have heard the term before but if you are not a tech nerd there is just as good a chance that you have not — and that is truly a shame. With hacking on the rise and people’s entire lives residing on the internet, it is more important than ever to think about your digital security.
So what is 2-factor authentication?
Simply put, 2-factor authentication (two-factor autentication or 2FA) is the technology used to gain access to a site/service/app using more than just 1 method of authentication (the most common single method being a username/password). Instead, 2-factor authentication relies on both a username/password combo in conjunction with something that typically cannot be guessed or “hacked” remotely, such as a code sent to a user’s mobile phone or biometrics (fingerprint, iris scan etc.).
Continue reading “What is 2-Factor Authentication & Why is it Important?”