Techie WhizKid - A Geek's Blog About Technology & The Web

A Blog About Technology, Gadgets, Gaming, The World Of Computers & The Web.


Finding the ideal ‘pick-up-and-play’ gaming experience on a smartphone

Finding the right smartphone these days can be a tough ask. First of all, you’ve got the likes of Samsung and Apple to choose from, fighting your way through all the claims and all the ads to find out the actual facts about the models on offer, but then you’ve got a broad range of operating systems to untangle as well, like iOS and Android. 

Picking the right smartphone for you is a subjective business, especially if you have various priorities in mind like taking photos, sending work emails, and keeping in touch with friends on social apps like Facebook and Twitter. If one of your main priorities during the purchase process is to find a model that will make playing games on the move a seamless experience though, what sort of smartphone should you opt for, and what sort of games work best with the smartphones on the market today? 

It’s worth saying first of all that there are brands that try to make this challenge an easier one to navigate for gamers.‘s mobile casino app works across the three main operating systems: Android, Apple iOS, and Windows. However, is this democratic approach to mobile gaming the exception or the rule? 

Board games, card games, table games: which can smartphones best handle?

To answer our question, it makes sense to focus on the different types of game a typical gamer might choose to play. 

Mobile board games can fight an uphill battle since they are so vividly and readily compared in our minds to the original version of the respective game. There are some mobile gaming apps like Catan (which can be downloaded on iPhone or Android devices) that stay true to the physical incarnation of the game that many of us remember from our childhoods, but other games can leave players scratching their heads wondering how the shiny mobile features relate to the original version we used to play on a Sunday afternoon! 

In contrast, table games, and particularly card games tend to work very well on smartphones and are perfect for that ‘pick-up and play’ experience. Games like Pokemon TCG Online tend to run smoothly, and can be faster to get to grips with in comparison to mobile board games. Take traditional card games like blackjack as an example. Gamers, both amateur and experienced, tend to be familiar with the basic rules, and these rules are unlikely to differ significantly between physical and mobile versions of the game. 

Blackjack and roulette: different demands from different games

Nostalgia and accessibility aside, what else can make the gaming experience changeable across different smartphones?

Well, a lot of the time it comes down to the quality of the images and the ease of touch screen control.

Some apps offer HD gameplay. For instance, 32Red will enhance the quality of gameplay across a range of smartphones on its mobile casino, so that its top-rated games like Game Of Thrones, Mega Moolah, and Classic Blackjack really stand out. So again, some brands do make it easier to navigate the smartphone market.

iphone” (CC BY 2.0) by hyku

In general, though, while Android is excellent for using multiple applications simultaniosly, the Apple iOS software is significantly easier to use in terms of its touchscreen technology and general user interface.

If you’re playing a card game like blackjack, this sort of thing may not be uppermost in your mind, but switch to a game like roulette and you’ll be changing your mind, choosing different options, zooming in and out all over the place, and very much wanting a smoother and less jumpy in-game play experience from your smartphone. In this instance, perhaps Apple is the way to go. 

Age isn’t just a number: does smartphone age affect your ‘pick-up and play’ experience?

Board games, card games, table games: the number of them on the mobile app market is sizable. One tip when looking at phones is to pick your favourites, check whether there is uniformity in terms of your play experience on different smartphone operating systems, and go from there.

Remember also that age is a big factor when it comes to quick and responsive play. It may be fine to use mobile casinos from operators like Pocketwin, who offer a relatively small, carefully picked selection of games but have the trade-off that the app shouldn’t leave any older operating system you have crashing all the time. More sophisticated apps will, however, work better on newer smartphones. 

So there you have it, hopefully we’ve made the minefield of smartphones slightly easier to navigate if gaming is near the top of your priority list. Whichever brand and whichever model you choose, have some gaming fun this Christmas on the go! 

This Article is written by Dan Vicars


Password Managers and the Ever-Decreasing Need to Memorize Everything

password-manager-windows-topComputer security began even before the construction of the first modern computer system. Passwords and access codes have been used by militaries and governments all over the world for controlling who can get into what, where, and in some instance, even when. Time-lock safes existed before the ENIAC, and remote access passwords existed before the internet. However, never in history has one person been expected to remember as many passwords to so many different locations as people are today. It’s a burden we all have to bear. Or do we?

In the 1970s, 80s, and 90s, telephone numbers where the largest list of information any individual was expected to remember. They were the passwords to contacting your friends, family and businesses. Back then, we had to bear the burden of memorizing all those phone numbers. In the 2000s, something better came along. Contact lists and smartphones eliminated the need to memorize phone numbers and began remembering who your contacts were for you.

Password managers now perform the same function that contact lists perform for phone numbers. You no longer have to remember long strings of miscellaneous numbers, letter, characters and symbols. You can establish them once and let your password manager store and retrieve them as you access the site to which they belong.

Just like your contact list, your password manager is stored on a device that you have control over, be it your home computer, work computer, cell phone or a specialized access card: the hardware is under your control. Your hardware can even share information between multiple password managers. Need to access your personal e-mail at work? No problem. Just transfer that information from your home password manager to your work password manager and navigate to your personal e-mail account.

Security managers will tell you never to use the same password for more than one site, and with a password manager, you can finally heed that advice without having to carry a notebook full of passwords, much like the way you used to keep a rolodex on your desk. Choose one master password for your password manager and unique passwords for all the sites you visit. Your master password secures the password manager, and the password manager stores the passwords for each of the sites that you need to use.

With password managers available today, you can let go of the fear of forgetting the passwords to the hundreds of sites we all visit. These services provide an unprecedented level of security to the codes of value to you.

If you’re considering a password manager, check out They look at 94 different password-saving apps, comparing them and making recommendations for the best password manager for you.


Review of the Internet’s Top Privacy Apps

Review of the Nets Top Privacy Apps

Securing your privacy online can be a daunting task. There are just so many gaps in security that need to be filled in. To help out, we’ve come up with a short three-item list that works as a sort of privacy starter kit. These are the absolute must-have privacy tools to get started:


VPNs allow you to skirt censorship, surveillance, hackers, and ISP activity logging. ExpressVPN is among the fastest and most-trusted VPN services on the market, and it’s also one of the easiest to use. All your internet traffic is encrypted with military-grade SSL encryption. Furthermore, ExpressVPN is completely logless. That means it doesn’t track your session activity or keep logs of your internet traffic. The company is registered in the British Virgin Islands, beyond the jurisdiction of snooping authorities from the US, UK, and the rest of Europe.

To get started using ExpressVPN, just sign up, download, install, input an authentication key, and hit the big green button to connect. You can choose from hundreds of servers across 78 countries to route your traffic through. On top of the privacy perks, you can also use VPNs to access content that’s blocked due to firewalls or geographic restrictions.

ExpressVPN is available on Windows, Mac, Android, and iOS.



Mailvelope is an extension for Firefox and Chrome that encrypts your email and only lets the intended recipient decrypt it. Email lacks a built-in encryption standard, making it vulnerable to hackers and snoops. Mailvelope uses PGP, or “pretty good privacy”, to encrypt emails. Whenever you compose an email, a button will appear in the composer that will open an external text editor. Type whatever information you want encrypted here, encrypt it, and transfer the encrypted text into the original email.

To take advantage of PGP, you’ll need to generate a key pair and upload it to a keyserver. A key pair is a combination of a public and private key, sort of like passwords, that ensures only the person you send an email to can decrypt it. A keyserver is a place where people can find your public key to send you encrypted email. Conversely, you can find other people’s public keys to send them encrypted email using Mailvelope. Mailvelope comes with a built in key generator and key ring to store previously used public keys.



Now your internet connection and email are private, but what about your files? Many of us utilize cloud storage and backup to store files online, but they often sit on unencrypted servers. Even if those servers are encrypted, there’s a good chance you don’t hold the key to decrypt your own files, which means the company itself and government authorities can still gain access. To encrypt files before they’re ever uploaded to the cloud, there’s Cloudfogger.

Cloudfogger is superior to competing products in that others require you to move files into a specified folder to encrypt them. Cloudfogger lets you select existing folders on your local hard drive that you want to encrypt before uploading them to the cloud, so you don’t have to completely reorganize your files and folders. You can still access your files on your local drive just as you always have without manually decrypting. This works great with any cloud storage or backup service, including Google Drive and Dropbox.

Cloudfogger is available for free on Windows, Mac, iOS, and Android.


5 Scary Technological Advances

5 Scary Technological Advances – Modern Technological Advances which could be threatening if used in the wrong way

Technology is awesome. It can let people from across the world talk to each other. It can help assist in life-saving surgeries. It can help safely defuse bombs. However, technology isn’t always so friendly. In fact, it can be downright scary at times. Here are five technological advances that are definitely scary:


Electronic SurveillanceElectronic Surveillance

With the advent of drones, tracking chips in cars, and the rise in electronic payments, privacy is ever-shrinking. Now governments, businesses, and individuals can tell where someone is/has gone, what someone has bought, and even what is said in a “private” conversation. While counter-surveillance measures are always working to thwart these technologies, the threat of a world without privacy looms large.


Genetic Engineered VirusGenetically Engineered Viruses

While these lab-created variations on natural viruses have the potential to aid in fighting/curing diseases, there is a downside. The inherent instability involved in the testing and production of these microbes may do more harm than good. While fictional cases are the fodder for such stories as The Stand or The Masque of the Red Death, the potential for the creation of an accidental modern plague is frighteningly real.


cloud1The Cloud

Touted as virtually unlimited storage for data, clouds take potentially sensitive information and put it in the hands of others. While cloud storage companies claim to have top-notch security protocols in place, hackers always love a challenge. Companies like Google and Microsoft have incurred cloud breaches, but the worst is yet to come. Medium-sized businesses with in house storage are popular targets now, as they tend not to have the security measures of a cloud. As more businesses get hit, more will turn to the cloud and their perceived safety. Hackers will undoubtedly follow suit.


Laser Gun M6 SpartanLaser Weapons

Once strictly the stuff of Buck Rogers and Battlestar Galactica, laser weapons are a reality. Tests have shown them blowing up pickup truck engines and blasting drones. Laser-equipped fighter jets are projected to arrive in 2020. As with almost all technology, the size shrinks. Imagine a handgun that does not need reloading and never leaves behind a tell tale shell. The range of lasers is also worrisome. Even simple, non-lethal lasers can be seen for miles. With idiots taking these to sporting events to shine them in player’s eyes and others shining them in the eyes of airline pilots, it would be devastating if these lasers could kill.


Artificial Intelligence AIArtificial Intelligence

Scientists have been warning that artificial intelligence may not be the boon that proponents claim. With computers passing the “Turing Test”, a benchmark to decide whether a technology represents an intelligence indistinguishable from a human, the age of artificial intelligence has begun. Yes, many movies like The Terminator and The Matrix portray artificial intelligence as inherently evil, but it is simply too new to determine what it would mean for the world. Will it try to solve international disputes, or would it attempt to seize control of the global banking system? It is the danger of inventing something simply because it can be done without considering the consequences that makes scientists and non-scientists worried about AI.


Jessica Kane is a professional blogger who writes about technology and other gadgets and gizmos aplenty. She currently writes for Total Voice Tech, her go to for all professional Dragon products.


What Is Mobile Malware And How Can You Avoid It?

The internet can be a dangerous place, so I am grateful that has allowed me to share my article about mobile malware on their blog. is an awesome blog focused on tips and tricks to make technology work for you instead of the other way around. They also provide handy recommendations as seen in this article: “Best Office Apps For Android.”

What Is Mobile Malware And How Can You Avoid It?

Though many people know that viruses and hackers can attack their computer, they aren’t aware that there are security threats targeted at their mobile devices as well. Just as your computer can acquire malware, so can any other device that connects to the internet. But what exactly is malware?

Malware is the term used to describe software or code that is designed to exploit your device or data without your consent. Some examples of malware are viruses, spyware, key-loggers, and Trojans. Unfortunately, malware can be easy to pick up and can sometimes be present on your device without your knowledge.

So what are you to do about this and how can you avoid it? For starters, you should install security apps, if you haven’t already, but there are some other steps you should take as well. Here’s what you should know when it comes to protecting both your mobile device and your personal information.

Helpful Apps

Since not everyone is aware of which apps they should use to protect their device, it’s important that we go over some of the basics. If you already have a computer, it’s likely that you’re familiar with anti-virus programs. However, due the increase in functionality that smartphones and tablets offer, some people no longer even need to have a desktop computer on hand, and smartphones don’t typically come with security apps already installed.

Though there are many different anti-virus apps to choose from, I would personally recommend Avast Free Mobile Security, mainly because of the amount of features it offers compared to some of the other free anti-virus apps available. With Avast Free Mobile Security, you’ll even have access to anti-theft capabilities that can help you locate your device if it’s stolen. You’ll also be able to wipe the data off of your mobile device if you need.

After you install an anti-virus app, it would be wise to install a Virtual Private Network (VPN). With both security apps on your mobile device, you’ll have much more security than just using one alone. A Virtual Private Network encrypts your internet connection and hides your location by masking your IP address.

With your connection encrypted and your location hidden, your device will be well protected, which is especially important because it’s common for smartphones and tablets to connect to public WiFi. Public WiFi is an unsecured network that is easy for hackers to gain access to, so you’ll want to ensure that you have your device secured any time you use it. Just like anti-virus apps, there are a variety of VPN apps to choose from as well.

I would recommend ExpressVPN, as it’s compatible with every OS and also offers unlimited speed and bandwidth. Another benefit to using ExpressVPN is that their customer service is available around the clock via live chat, so you’re able to easily contact them if you need any help. Check out Secure Thoughts for more information about ExpressVPN and to see how it compares to some of the other VPNs available.

Avoiding Malware

Security apps can do a lot to help you avoid malware, but you’ll still need to do your part, and in order to do so, you’ll need to know ways you can avoid malware without the reliance on security apps. Even with security apps doing their jobs correctly, there’s always a small chance that something could slip through the cracks. One of the main ways you can avoid picking up malware on your mobile device is by avoiding unfamiliar hyperlinks.

Hyperlinks can appear on websites, in emails, text messages, in apps, and even on the app store that you use. For starters, whenever you go to download an app, always read through the reviews and the user permissions first to determine whether or not you should be suspicious of it. If others have encountered a problem with it, it’s likely they will write a negative review about the app.

Be aware that sometimes those reviews can be removed by the app developer, so you should never base your opinion solely on the reviews. Another way you can check to see if you should proceed with caution before you download an app is to do a quick Google search of the name of the app, as sometimes information will show up in the first page of the results about any news associated with the app.

Overall, it’s best to stick to the websites you know to be trustworthy, when possible. When you receive links in emails or texts, always check the URL first to determine whether or not they lead to a familiar page. On some touch-screen devices, you can do this by holding your finger down on the hyperlink until a small box appears that displays the URL.

Be aware that sometimes apps contain links as well that can lead to malicious websites. These will usually appear in the form of ads that use catchy phrases that might persuade you to click on them. Some examples are “Virus detected,” “You’ve won,” “Click here for your free gift card,” and other similar titles.

When To Share And When Not To…

Sometimes you can land into a lot of trouble just by sharing your information. It can be hard to avoid doing so, but the less you share, the better. It’s always possible for companies to have data breaches, so even sharing your information with legitimate companies can sometimes be an issue.

When you do find yourself needing to use your information, maybe for an online purchase for example, always log out of your account afterwards, and don’t store your password on your device. It’s always a good idea to keep an eye on your bank statements as well. Sometimes hackers might actually pose as a legitimate person or company too, so be aware of that whenever you are entering your personal information online.

Most of the time, common internet security mistakes are actually the cause of people acquiring malware on their device, so if you know how to avoid them, you have a much better chance of preventing your information from becoming compromised.

Keeping Your Mobile Device Protected

Any time you use the internet, there’s always a chance that you could acquire malware. The truth is, no one is immune from online security threats and even with the best software installed, you could still end up becoming a victim (though it’s not nearly as likely). When trying to avoid malware, it’s important to understand where malware commonly appears and how you can protect your privacy online.

When you start to learn more about online security, it’s likely that you’ll better understand how to spot an online scam, though it’s never entirely simple, even for the most tech savvy. New security threats on the internet are appearing all the time, especially as new technology comes out. But with preventative measures taken, you’re much better off than those who keep their device unprotected regardless.

About the author: Caroline is a technology enthusiast who writes about internet security and data privacy. She has travelled all over the world and enjoys sharing her experience and knowledge of new technology and smartphone development with readers.