5955 W Peoria Ave

Unit 6538, Glendale, AZ 85312

+1 623-930-1533

Customer Support

Mon-Fri: 8:00a - 5:00p

Other times, by appointment

Wright Consulting: Tech Wisdom & Updates

Our team shares expert advice, how-tos, and the occasional rant about all things IT. Scroll down to discover something new, or just laugh at our tech jokes. (We try.)

Looking for something specific? Use the search box below or contact us with your questions or content suggestions!

Anonymous hacker mask against a digital blue matrix background representing cybersecurity threats
MrWrightAZ

The True Value of Your Digital Content: What Hackers Really Want From Your Website

The True Value of Your Digital Content: What Hackers Really Want From Your Website Oh, HACK Me! Your first reaction when you get hacked is usually some variation of ‘Oh, HACK Me!’ but why would anyone want MY site? Short Answer: They don’t. And that’s actually worse. The Biggest Misconception About Hackers People assume hackers are targeting them specifically. This couldn’t be further from the truth. You are not a target, you are a resource. In actuality, the bad actors on the internet have no clue who you are, where you are, or even what you do day-to-day. So how do they find you? They don’t — not manually anyway. They use automated tools that scan millions of websites simultaneously looking for common vulnerabilities: weak passwords, outdated software, unpatched plugins, or simply a door that was accidentally left unlocked. Your site just happened to answer when they knocked. What You

Read More »
A wooden desk displaying an open vintage photo album, a tablet showing digital family photos, a smartphone with a "Memory Cloud" icon, a stack of hard drives, and a handwritten note reading "Digital Legacy Notes."
MrWrightAZ

Until Death Do Us Part: Managing Your Digital Legacy

Until Death Do Us Part: Managing Your Digital Legacy I realize any discussion about death, in any form, can be difficult; perhaps even unwanted. However, it is a natural event that must be addressed and managed—especially when it comes to your technology. While you or your loved ones may have a will, trust, or generalized plans for when you pass from this mortal world, most families do not know what to do with your “alter ego”—your digital life. That is what we are going to discuss in this article. Like most of us, you likely have at least one social media account, but probably have 10, 20, or even dozens. The list can include the most popular platforms: Facebook, Instagram, X (Twitter), TikTok, and LinkedIn. For every one of these, there is a different way to handle the dearly departed’s accounts. Some terms you should become familiar with include memorialized,

Read More »
A computer monitor showing the Windows 10 logo with the text '2025 END OF LIFE'. A red EKG heart monitor line is shown going from a heartbeat to a flatline, symbolizing the end of support.
MrWrightAZ

Windows 10 End of Life

Windows 10 End of Life It is with profound sadness that we announce the official end of life for Windows 10. Born July 29, 2015, the child of Windows 8 and 8.1, quietly passed on October 14, 2025. Windows 10 passed away peacefully at home, surrounded by family, after a long and scheduled battle with planned obsolescence, as detailed in Microsoft’s official end-of-support guide. In fact, throughout its 10 years, Windows 10 became known for its unique personality. We will fondly remembered it for: Asking to restart for an update at the most inconvenient times possible. Constantly trying to get us to hang out with its friend, Microsoft Edge. Introducing us to Cortana, who loved to talk, sometimes unexpectedly. Its powerful ability to find any driver for any device, except the one you actually needed. Unifying our desktops and tablets, whether we wanted it to or not. Wearing many different

Read More »
Digital combination lock with the word PASSWORD displayed among rotating number dials.
MrWrightAZ

What’s In A Password

What’s In A Password Passwords, in one form or another, have been around since biblical times. In ancient times, the Roman Army referred to them as Watchwords. Centuries later, Fernando Corbató, a professor at MIT, is credited with developing the first password system for the Compatible Time-Sharing System (CTSS), which allowed multiple users to access the same computer system. Since then, passwords have undergone a metamorphosis, if you will, from being a simple 4 digit number to a process that can be extremely complex and lengthy. Naturally, whenever a new security system is introduced and implemented, it becomes the goal of the deplorables to thwart it. As you can imagine, hacking was born, and it, too, has undergone an evolution, as well. From its humble beginnings, passwords like “1234” and “password”, the two most common passwords ever used, are easily overcome by today’s standards. Fast forward to our modern security

Read More »
Two people in hoodies sitting in front of a computer screen, representing hackers in a dark room.
MrWrightAZ

Don’t Accept A Friend Request From Me…I’ve Been Hacked

Don’t Accept A Friend Request From Me…I’ve Been Hacked I hear it all the time, “Don’t Accept A Friend Request From Me…I’ve Been Hacked!” In reality, they weren’t hacked; they were impersonated. Let’s be clear, if someone had actually hacked your Facebook account (or any account for that matter) they would instantly have access to everything you have access to—including your friends list…either way, it sucks! Here’s a quick distinction between the two: Hacked: someone breaks into your account and changes your password. Impersonated: someone creates a fake profile using your name and photo.   So what can you do as the “victim”? Have I Been Hacked? Whether you’ve been hacked, or impersonated, it’s too late to worry about what you can, or can’t do. You need to focus on getting control back of your account as quickly as possible. In some cases, you may lose access to old messages

Read More »
meme: the most used internet browser to download other browsers
MrWrightAZ

No Thanks, I’m Just Browsing

Browser Wars: No Thanks, I’m Just Browsing Browsers are the gateway to the internet, and nothing proves that more than the epic browser wars that shaped how we surf today. Without them, we would be back to the infancy of the internet and bulletin board chat screens. Perish the thought! Browser Wars Now we enter the Browser Wars. In the early days, we had Netscape, AOL, Prodigy, CompuServ, and, yes, Internet Explorer. At one point Netscape dominated the market with a whopping 86% share while Microsoft maintained a measly 10%. So, where is Netscape now? Great question. Sadly, it suffered the same fate as Novell Netware and WordPerfect at the hands of Microsoft’s sleazy tactics of bait and switch and dark marketing. The standard for Microsoft is simple: if they can’t compete with it, they buy it, and if they can’t buy it, they destroy it. All in favor of

Read More »

Have a topic idea?