Viruses and their nasty friends can throw a real wrench in the works. Run a full system scan just to be safe.

Exploiting human psychology rather than technical vulnerabilities. Phishing is a prime example.

Loose connections can cause all sorts of quirks. Power down, unplug everything, blow out the dust, then carefully plug it all back in.

A digital fingerprint of some data. Used to verify that files haven’t been tampered with.

Structured Query Language. The programming language most databases use for managing data. Pronounced “sequel”.

A stripped-down Windows environment for troubleshooting issues. Hold Shift while clicking Restart.

Adding random data to a hash to make it harder to crack. A pinch of salt keeps your hash secure!

A newer type of database that’s more flexible than SQL. Great for unstructured data like social posts.

Rolls Windows back to a previous state without affecting your files. A great “oops” button.

A profile for logging into a system. Can be an administrator (full control) or standard user (limited).