Multizone | All our technotes
If we've published it, you can find it here.

Digital security is so important today to your digital well-being today. Transitioning from one two-factor authentication (2FA) application is a royal pain in the ass, but necessary for Microsoft Authentictor users. This article explores why you need to switch from Microsoft Authenticator to Authy, an alternative that offers synchronisation across multiple devices added functionalities and a roadmap not a sunset. We will address the steps for a smooth transition, and discuss both the benefits and potential concerns associated with using Authy.
TL:DR – The switch from Microsoft Authenticator to Authy is straightforward, involving the temporary disabling of 2FA on your accounts, re-enabling it with Authy, and understanding how to manage device synchronisation. You need to move because Microsoft Authenticator is going away. Act now, before its too late and you are in a world of pain. "After August 2025, your saved passwords will no longer be accessible in Authenticator and any generated passwords not saved will be deleted" - Microsoft web site.
- Details
Read more: Why You Should Switch from MS Authenticator to Authy Today

FileCloud is powerful software, delivering a secure, enterprise-grade self-hosted file sharing and content collaboration platform that can be integrated with Amazon Web Services (AWS).
This article outlines the deployment of FileCloud using AWS infrastructure, specifically withn Amazon EC2 and using Amazon S3 for stroage. It discusses typical deployment scenarios, the necessary prerequisites, architecture illustrations, planning recommendations, security protocols, cost analysis, and operational procedures. To successfully implement FileCloud, understanding its architecture and how it interacts with AWS services is essential.
The community edition provides an annual licence for 5 full accounts, with 10 external accounts. Community edition can be self-hosted on your Windows or Linux servers or in your own account in a supported Infrastructure as a Service (IaaS) provider. For our review we installed it in Amazon EC2, using Amazon S3 for storage, using the FileCloud provided Amazon Machine Image (AMI) which is avaliable from AWS Marketplace.
The enterprise edition is the same software with a licence key unlocking more functionality. It has a variety of subscription tiers and hosting options and provides more advanced governance, Single Sign-On, Support for Duo or text based authentication and third party integration support for example for SalesForce.
You need to have a good knowledge of AWS, Linux, virtual machines and web applications to get FileCloud running and need to carefully consider, document and work through the prerequisites, security measures, operational guidance, updates, security and backup procedures.
TL:DR: FileCloud runs in AWS using encrypted Amazon S3. FileCloud Community Edition is free to use with some limitations, but a thorough understanding of AWS, Linux, and the potential cost is vital for a successful implementation.
- Details

Amazon has announced that it will discontinue its Appstore for Android devices effective August 20, 2025. This article investigates the implications of this decision on users, the broader market for digital applications, and offers guidance on transitioning away from the platform. As part of this transition, Amazon’s complementary service, the Amazon Coins program, will also cease to exist. For users seeking further information on this closing phase, the official announcement from Amazon provides more insight.
TL:DR – The Amazon Appstore will be discontinued on August 20, 2025, alongside the Amazon Coins program. Developers and users alike should prepare for this change by transitioning to alternative app stores and managing existing subscriptions and digital currency before the deadline. It is advisable to act promptly to ensure minimal disruption to app usage and purchases.
- Details

AWS Certificate Manager (ACM) is a service provided by Amazon Web Services (AWS) that enables users to efficiently provision and manage SSL/TLS certificates for specific AWS services and applications. The primary goal of ACM is to streamline the certificate acquisition process within AWS, ensuring a secure and seamless experience as organisations interact with web applications and services. This article will examine the key features and benefits of AWS Certificate Manager, integration with other AWS services, automated certificate renewal, and the process of establishing and managing certificates in the cloud environment. For a deeper understanding of ACM, consider reviewing the official documentation on AWS Certificate Manager.
TL: DR – AWS Certificate Manager manages SSL/TLS certificates, the automation of certificate renewals and is supported by the AWS services: Elastic Load Balancing, Amazon CloudFront, Amazon Cognito, AWS Elastic Beanstalk, AWS App Runner, Amazon API Gateway, AWS Nitro Enclaves, AWS CloudFormation, AWS Amplify, Amazon OpenSearch Service and AWS Network Firewall. Certificates are free, of you can import certificates obtained ouside of AWS. It makes sense to use AWS Certificate Manager if you are using these AWS services, otherwise Let's Encrypt would be a better choice, because you cannot install an ACM certificate directly on an AWS based website or application.
- Details
Read more: Automate SSL/TLS Renewals with AWS Certificate Manager

The proliferation of email communication over the past few decades has been an enabler for all kinds of communications for all of use but the technology behind email was designed for academics to talk to each other, not for everyone in the world to talk to anyone. In that simpler time nefarious use of email wasn't really considered and famously one of the authors of the email sending program said 'I just wanted a way to get my email'.
Nowadays phishing, where attackers employ cunning tactics to deceive users into disclosing sensitive information is a real problem for everyone. We can't just get rid of email as it is perhaps the most successful killer app category other than the web browser. This article explores the red flags associated with phishing emails, outlining key indicators that can help identify these malicious communications. We will examine the characteristics of such emails and provide actionable advice to bolster online security.
TL:DR – The primary objective in recognising phishing attempts is to remain vigilant against specific signs, including suspicious email addresses, inconsistent branding, and unusual requests for sensitive information. By familiarising oneself with these markers, one can significantly mitigate the risk of falling victim to such attacks. It is imperative to practice caution when engaging with unsolicited emails and to remain aware of the evolving tactics utilised by cybercriminals.
- Details
Read more: Top red flags in phishing emails that you should never ignore

Bluesky, a decentralised social network protocol project rooted in transparency and user autonomy, allows individuals and organisations to establish verified identities via custom domain names. This process—known as domain-based self-verification—enables users to associate their online presence with a trusted domain they control. As platforms increasingly decentralise, methods like these become critical for maintaining credibility and resisting impersonation. You can read more about the protocol and its technical principles on the official AT Protocol site.
By verifying a domain with Bluesky, you assert control over your digital identity without relying on centralised third parties. Whether you're representing a business, a brand, or yourself, the ability to prove ownership of a domain creates a verifiable link between your Bluesky profile and your real-world presence. In a time when misinformation is easily spread, technical verification provides a tangible layer of trust. For a broader look at decentralised identity concepts, the W3C DID Core specification offers useful technical context.
TL:DR – The article explains how to self-verify your identity on Bluesky using a domain you control. We cover how domain-based verification works, the technical requirements, step-by-step instructions for both DNS and web-based verification, and how to link and maintain your verified handle securely.
- Details

Google Developer Badges offer a modern, accessible way for developers to demonstrate their proficiency across a range of Google technologies. Whether you're just starting out or you're a seasoned engineer looking to validate your skillset, these digital credentials serve as proof of your abilities in a landscape that increasingly values verified expertise. Backed by the Google Developer Profile initiative, each badge represents real-world experience and technical competence.
This article explores a complete list of Google Developer Badges and how to get them, who can earn them, how they’re verified, and why they matter in our tech-driven world. We'll also cover how badges stack up against traditional certifications, what employers think of them, and how to track progress through Google's developer learning ecosystem.
TL:DR – The Google Developer Badge system is an effective, structured way to upskill and showcase your knowledge. Explore the full breakdown below and start planning your badge-earning journey today.
- Details
Read more: How to get Google Developer Badges on your developer profile
- Buyers Guide: Google Pixel 7a, 8a, 9a - best value
- Updates to Standard Google Developer Program Membership
- Last Intel based Mac mini reaches Apple vintage support stage
- The absurd Complexity of Roaming Profiles v OneDrive Folders
- Step-by-Step AWS account setup with free tier access
- What is the best deal on Refurbished iPad Pros in the UK
- AWS Certified Solutions Architect SAP-C02 exam Key Facts
- Pass SAP-C02 - AWS Certified Solutions Architect
- Quality premium Apple photo books from Mimeo/Motif
- Gen Z may prefer Google Workspace to Microsoft 365
- RCS Messaging between iPhone and Android
- Easily Turn Off Mail Categories on iOS and macOS