Looking for deprecated technology

Hello All,

I am currently looking for small and medium size business in the Philadelphia\Delaware valley who need to have their technology removed\recycled, but do not want to pay to have it removed\recycled.

I will come remove old computer towers, servers, printers, switches whatever you have to get rid of, working or not.

I also specialize in finding parts, and equipment that is beyond end of life, we all have those legacy systems that still MUST be run, and occasionally something is needed that one cannot just go out and buy

I buy sell and trade WORKING, and not beyond end of life technology, don’t ask me to buy your laptop with windows XP


All of my contact information can be found here:



Tech Tips 101

There are many lessons I try to impart to my friends, family and co-workers about the safety of mobile devices. I think most of it goes in one ear and out the other, and it all sounds like geek speak to most of them. As the world becomes more mobile, and we do more and more online, securing all of your accounts and devices has never been more important. Today I am going to share a few articles about how to keep your home computer, your mobile devices, and your online accounts safe from the prying eyes of the internet.
The first and probably most important lesson I can pass on to you is about security, Always use Anti Virus and Anti-Malware programs on any device you use to connect to the internet! In conjunction with those to protect your device, Always User Two factor authentication anywhere it is available to help secure your online accounts.
The following two articles from Lifehacker explain what two factor authentication is, and how to use it on many of the most popular sites such as Facebook, twitter and even Gmail. Save yourself the headache of being Hacked! It can happen to anyone, even I have even had my Facebook account hacked once, and anyone who knows me can tell you, I am big on security and long mixed symbol passwords.

The first article called “Please turn on two factor authentication”
is a quick explanation and plea to use two factor authentication.

This second article explains how and where to turn on two factor authentication
in Gmail and on numerous other popular sites.


Not mentioned here, but if your bank, and credit card companies offer such a service, and I am sure most do, implement them on those sites to prevent unauthorized logins!


The second area I need to cover, and also touched upon in the above articles is back-up your data! I cannot stress this enough, if your drive fails and you have no back-up you will be screwed and lose everything. This is the second most important lesson I can pass on to you. I too have once been the victim of not backing up my data, and then I lost close to 10,000 pictures. I always back-up now, every night without fail! It’s easy, it’s cheap and it could save your ass!

As you will notice most of these articles are from Lifehacker.com, one of my favorite sites. Below are two links, the first being an article about online backups, comparing the 5 best. Read it, understand it, and decide if it is for you. BTW Dropbox works well to, and is rated as one of the more secure services!


The second is a guide for setting up a home back up plan, and easy steps for doing so. You do not have to use this guide, as there are other options available, but whatever you use, use something and check it occasionally to make sure it actually works!



The last thing I want to share today is about passwords. We all use them, most people hate them and I can crack 80% of them in fewer than 2 minutes.  Passwords should not be simple for anyone but you; it should not be a birthday or pet name, or your husband’s name. Those are easily guessed passwords, and what most people use because they are so easy to remember. The problem is; most people use the same password for everything! Don’t! that is the quickest way to give people access to your private data. They get the password for 1 thing and BAM, they have the password for everything, bank accounts, email etc.

Always use different passwords for different things, and use passwords you will remember easily, but someone else will not. Like a combination of letters and numbers like; B1i9l6l7y, looks complicated but it really isn’t. I took the name Billy, and the year he was born, 1967, and merged them into one word. So I now use 3 different character sets in my password making it harder to crack, or guess!


I hope you take what you have learned here today and use it, because I do want to be the guy you call when your accounts get hacked, or your computer takes a dump and all your pictures of fluffy and flowers, and all the music that was “in your ITunes” is gone. I do not want to be the guy saying to you “do you have a back-up?”

Post #1 Epicurean Technologist

Welcome aboard the Epicurean Technologist Blog. 11/26/2013

This Blog is intended to be a Blog revolving mostly around Technology, Photography, and Food. Through my ramblings I hope to bring to you my world, through my lens I intend to show you my soul, and through your pallet I shall bring to you the flavor of life.

I hope that everyone finds my ramblings to be somewhat entertaining, and occasionally educational(imagine that). Today is a Tuesday, and quite cold and damp in the greater Philadelphia area. So I am currently Unemployed, not a good place to be so close to Christmas. That being said,I am not as worried as I think most people would be. I have spent the last several days contemplating my next moves and working on making this site functional, and usable for myself and my readers. Not quite where I would like it to be yet, but a couple of weeks of tweaking some of the finer aspects of the site and I think it will be where I want it to be.