Friday, November 30, 2012

Tech Dictionary


Here at IT Word we talk about all sorts of tech-related things, and often times we'll use acronyms or terms that even the geekiest out there don't understand. So, we've created a tech dictionary to help you better read the internet as a whole, whether you're a tech noob or an advanced user.
This list by no means encompasses every technology term you'll run into, but it does cover the bulk of what we, and many other tech sites talk about frequently. It's meant as a quick resource to look up terms you run into, or to share with less tech savvy friends and family. It's broken down into six categories:
  • Hardware Terms
  • Internet Terms
  • Network Terms
  • Media Terms
  • Security and Privacy Terms
  • Software Terms
If you're looking for a particular term, use Ctrl+F to find what you're looking for on the page.

Hardware Terms

Arduino: An Arduino is a open-source piece of hardware typically used to prototype DIY projects. It also comes with free software to write your own code. Our guide to getting started with Arduino is a good place to start if you're interested in learning the basics.
CPU (Central Processing Unit): The CPU is the small piece of hardware inside your PC that carries out the instructions your software sends to it. It's essentially the "brain" of your PC. The better it is, the faster it can perform tasks (and the more it can perform at once). If you're building your own PC, check out our guide for more information on finding the perfect CPU.
Display Resolution: Display resolution refers to the number of pixels on your screen. It is usually shown as [width] x [height]. The higher the resolution, the more pixels your display can show. This means sharper, clearer images. On most computers, it also means more "space" for your desktop and applications. In some cases, higher resolution can increase your productivity(to a point).
Hackintosh: A Hackintosh is a computer you build yourself that doesn't use Apple hardware, but that runs Mac OS X. It's usually cheaper than buying a Mac, and our guide makes it very simple.
Microcontroller: A microcontroller is a small computer that includes everything you need (CPU, memory, etc) on a single circuit. They're typically used to complete one single process (like calculators, toys, remotes, appliances), and are popular with DIYers for creating everything ranging from a self watering garden system to your own clapper.
NFC (Near Field Communication): NFC is used for close range wireless communication. NFC can be used for a bunch of different things, but it has become most popular for quick sharing between smartphones—like Android Beam, which lets you share playlists and more just by touching your phone to someone else's.
Overclocking: Overclocking is when you run your CPU at a faster speed than it was intended. This means faster video editing, better gaming, and other benefits. Under the right conditions, most CPUs can run a little faster than their advertised rate, and if you want to do it yourself our beginner's guide to overclocking will help you get started. That said, overclocking can void a warranty on your CPU and there's always a risk you'll damage your processor.
PPI (Pixels Per Inch) : PPI is a measurement of how many pixels are in an image. It's often used to describe computer displays, tablet displays, and digital camera images. Essentially, the higher the PPI, the clearer the image is—like the iPhone's retina display.
RAM (Random Access Memory): RAM (also referred to simply as memory) is a temporary place for your computer to store information while the CPU does its work. Nothing is ever stored in RAM permanently. The more RAM you have, the better your computer is at multitasking, meaning you can run more programs at once and switch between them faster. RAM upgrades are cheap and very easy to do yourselfbut make sure it's really worth it before you drop the cash.
Refurbished: When a piece of hardware—whether it be a laptop, smartphone or other part—has been refurbished, it means that part has been returned to the manufacturer, fixed up, and resold at a lower price. Sometimes the original unit was defective, but an item that's returned is often automatically considered refurbished even if it was never used. Buying refurbished electronics can save you a lot of money, but make sure you choose one from a reputable source with a good warranty.
RFID (Radio-frequency Identification): RFID is a wireless system used to track objects using tags. These tags include a small antenna that responds to radio waves. You'll often find these in clothing to prevent theft at retail stores, in toll booths to register a payment when you drive through, and even on credit cards so you can wave your card over a reader instead of swiping it.
SSD (Solid State Drive): SSD is a hard drive that doesn't have moving components. Because of this, SSD drives are much, much faster than typical hard drives and they're less susceptible to failure because they have no moving parts. SSD's are useful for anyone looking for a speed upgrade for application launching or boot time, provided you're not worried about storage space.
UPnP (Universal Plug and Play) : UPnP is a feature that allows devices on your home network to discover each other and access data or services. These days, it's often used for streaming media across devices on a network without a bunch of complicated set up procedures.
USB (Universal Serial Bus): USB is a cable or connector that allows your computer to communicate with other devices like a mouse or keyboard. They're also found in smartphones, game consoles, portable hard drives, and elsewhere. There are several different types and sizescurrently on the market. Photo by DijutalTim.

Internet Terms

BitTorrent: BitTorrent is a protocol for sharing files between different users online. Unlike regular downloads, it allows you to download a single file or group of files from multiple people at once, making the transfer very fast and efficient. It's often cited as a means for piracy, but it's also used to distribute files without weighing down a server (Linux is often traded this way, for example). However, because of its relation with copyright, many internet service providers slow your internet connection if you're using BitTorrent, but you can anonymize your traffic to keep it from happening.
HTTP/S (Hypertext Transfer Protocol): HTTP is the set of rules that determines how files are transferred on the World Wide Web. Essentially, it's the foundation for the way the web works. HTTPS (HTTP Secure) is the same basic thing as HTTP, but with added security for sites like banks or online shops. HTTPS is incredibly important for keeping your data secure online.
Magnet Links: A magnet link is used on BitTorrent sites to start downloads without you needing to download a .torrent file first. Basically, it's a faster, easier way to start torrent downloads. Here's how to make use of them.
Net Neutrality: As the name implies, net neutrality is about making the internet a free and open platform that everyone gets equal access to. It's a pretty complicated, but important idea that affects how we all use the internet. The main goal of net neutrality is that every web site (whether it's Google, Bing, Amazon, or anyone else) should be treated the same when it comes to access speed.
OAuth: OAuth is an open protocol that allows you to secure your data by only allowing applications to access a limited amount of information. OAuth is what you use to log into other services using your Google, Twitter, or Facebook Account. If a smaller service get hacked, OAuth makes it easier to protect your information.
PHP (Hypertext Preprocessor): PHP is an open source scripting language used on most servers. It allows for web sites to create content that changes frequently (like Wiki's, blogs, etc). PHP is code that happens on the server side, and you see it when you fill out password forms, forums, and plenty more.
POP (Post Office Protocol)/IMAP (Internet Message Access Protocol): POP and IMAP are both methods for accessing your email on a desktop client like Outlook, or the mail client on your smartphone. POP pulls your email to your phone and manages it separately than on the server (say, Gmail). IMAP keeps everything in sync, so if you delete a message on your phone, for example, it'll be deleted in Gmail as well. In general, we recommend using IMAP for all your email needs, since it's less confusing.
RSS (Rich Site Summary): RSS is a service provided by blogs and web sites that creates a feed of always updating information from the site. RSS readers (like Google Reader) collect that information from various sites to create a news stream. Those feeds can be read online, or with a desktop or mobile app. Basically, RSS helps you keep up with all your favorite blogs and sites from one unified place.
SEO (Search Engine Optimization): SEO is the process of pushing a web site up on search engine results so that it's seen by a wider amount of people.
Usenet/Newsgroup: Usenet was originally a bulletin board service, but has since expanded into a place where people share files with one another. The files exist on a newsgroup, and can be downloaded with a Usenet service and client. Getting started with Usenet is incredibly easy, and it's arguably a safer means to transfer files than BitTorrentImage remixed from Kati Neudert(Shutterstock).

Network Terms

802.11a/b/g/n: 802.11 is a set of standards for wireless local area networks that regulates how your computer communicates with your wireless router. Each of the letters (a/b/g/n) denotes different speeds and ranges, with Wireless N being the fastest. If you're not sure what you have check out our guide to knowing your network.
Ad Hoc Network: An ad hoc network is a wireless network that allows two devices to communicate directly with each other without the need for external equipment. It's useful forprivately sharing files between computers as well as for multiplayer gaming.
Bandwidth: Bandwidth is the amount of data that can be transferred at once over a network, often between your computer and your internet provider, in a certain amount of time (e.g. 20 Megabits per second). In recent years, internet providers have put bandwidth caps on how much data you can transfer between your computer and the web, but it's easy to track how much you're using.
DHCP (Dynamic Host Configuration Protocol): DHCP is what assigns an IP addresses to each device on your network, and makes sure that no two computers have the same address (which would cause problems). It's how most computers receive their IP addresses on a network, although you can create a static one with your own computer or reserve addresses for a specific machine. That way, your devices always have the same addresses, which is useful for streaming video and other purposes).
DNS (Domain Name Service): DNS is a database system that translates a server or computer name from a numerical IP address into an easier to remember name (i.e. www.lifehacker.com instead of 407.562.326.28). Every internet service provider has their own DNS system, but you can use different ones for better speed and security.
FTP (File transfer protocol): FTP is a system used to transfer data between computers on a network. FTP can transfer files between computers on a local network, or to transfer files online.
IP Address (Internet Protocol Address): An IP address is what makes it possible for computers to connect to each other. Every device that connects to the internet is assigned a unique IP address. You internet service provider assigns you either a static IP address that remains the same, or a dynamic IP address, which changes every time you log on. That said, you can fake your IP address with a proxy server, which is handy for remaining anonymous online.
ISP (Internet Service Provider): Your ISP is the company (Comcast, Time Warner, CenturyLink, etc.) from whom you receive internet access.
LAN (Local Area Network) : A LAN is the network that connects computers in a limited area, like your home. This is a closed system that outside networks do not have access to unless you let them in (say, by giving them a password).
MAC Address (Media Access Control Address): Your MAC Address is a unique number attached your hardware that identifies it to a network—like an ID card for your hardware. Your MAC address never changes, but you can spoof it to get around restrictions like coffee shop time limits.
NAS (Network Attached Storage): A NAS is a device (like a small computer or hard drive) that stores files that anyone on the network can access. Any computer on your network can access those files from anywhere in the house. It's easy to turn an old computer into a NAS you can use as a networked backup, media streaming, or torrenting machine.
NAT (Network Address Translation): NAT is what translates a web site on the internet to your local network so you can interact with the internet and vice versa. It also makes it so hundreds (or several) computers on a single network can all access the internet through one router without causing confusion.
Proxy Server: A proxy server stands between you and the internet to relay information. Think of it like a game of telephone where you're yelling to someone across the street who's then yelling the same thing across the block. A proxy server has two main purposes: to improve internet speeds by providing recently visited web sites on a local hard drive, and to filter the content you can access. When you use a proxy server, you can fake the internet into thinking you're somewhere you're not, which can enable you to watch region specific content incredibly easily.
SSH (Secure Shell): SSH is used to connect a computer (or other internet connected device) to another computer over a network the internet. It's commonly used to control your computer from afar, but also comes in handy when connecting an Android or iOS device to your computer.
Tethering: Tethering is when you use the internet connection on one device (typically your phone) for another device (typically your computer). This allows you to get internet access on your computer from virtually anywhere, even if you don't have Wi-Fi. Check out our picks for the best tethering apps on Android and the iPhone to try it out.
TLS (Transport Layer Security): TLS and it's predecessor, SSL (Secure Socket Layer) connect your computer to a secure server on the internet. TLS encrypts and protects the data you're sending, which is why it's commonly used for email, IM, banking, and online shopping.
VoIP (Voice Over Internet Protocol): Like the name suggests, VoIP is the system that allows live voice communications like you find on Skype or Google Voice to happen over the internet.
VPN (Virtual Private Network): A VPN is a group of computers networked together over a public network—usually the internet. A VPN encrypts what you're doing online so your data is always secure. It's a good idea to start using one if you're privacy minded or a security advocate.
WAN (Wide Area Network): A WAN is a large network that connects several smaller local networks (LANs). A WAN might refer to something as small as a corporation's network, or as large as the internet itself.
WEP (Wired Equivalent Privacy)/WPA (Wi-Fi Protected Access): Both WEP and WPA are security encryption for your home network. They're both meant to protect your home network from outside hackers, but it turns out both WEP and WPA are easy to hack into. WPA, however, is much more secure than WEP, so you should use it whenever possible.

Media Terms

Tech DictionaryBitrate: Generally, bitrate refers to the number of bits—the amount of data—that are processed over time. We often see bitrate in reference to music files. For instance, the music you download from iTunes is 256 kilobits per second, meaning 256 kilobits of data is stored in every second of the song. See our explanation on bitrate for more information on how it can affect your music's sound quality.
Codec: A codec is a computer program that encodes or decodes video so it can be played. Essentially, a codec shrinks large movie files to make them playable on your device. Nowadays, so many different types of video formats exist that many people use a codec pack or specific program that contains multiple codecs and can play nearly anything.
DRM (Digital Rights Management): DRM is a technology that limits the use of media after its sold. Most often, it locks the media to your personal account so you can't share it with anyone, or use it on any other programs. It's often attached to books, videos, and games as a means to cut down on privacy. Because it's so restrictive, it's often an annoyance, but you can strip DRM away from books and videos pretty easily.
Lossless: Lossless refers to video or music that hasn't been altered from the original version. If you rip a CD or DVD losslessly, the file on your computer is the exact same in both bitrate, size, and quality as the original.
Lossy: Lossy is when you compress a media file so it doesn't take up as much space. This is what an MP3 or AAC file is. When you do this, you're deleting chunks of data, and thus losing some clarity or quality in exchange for space savings.
Media Center (also known as an HTPC or Home Theater PC): As the name suggests, a media center is a computer used exclusively for media. In most cases, this computer is attached to a television locally or over a network so you always have access to your shows, movies, music, and games on its hard drive. Common programs for media centers include the streaming-focused Plex and the extremely customizable XBMC. You can set up a media centerthat does everything for $500 or a more minimalist one for $35. It might sound complicated, but you can set it up for non-geeks very easily, and any annoyances you come across are easily fixed.
Streaming: Streaming is when media content is sent to you at the same time you're watching it. You do not download anything, and instead the content is stored temporarily while you listen or watch it. This is very common in music and video. In fact, it's how you watch videos on YouTube or Netflix—you don't download the file, you just start watching.

Security and Privacy Terms

Cookies: A cookie is a small bit of text stored in your browser that saves data from websites you visit. In some cases, these cookies are used to track the web sites you visit.
"Do Not Track"Do Not Track is a web browser setting and policy proposal that ensures your browsing isn't tracked by advertisers, social networks, or other web sites. However, it's currently just a suggestion your browser makes and not a rule because web sites do not have to obey the request.
Firewall: A firewall is either software or hardware to secure a computer or a network. It controls the traffic going in and out so that unapproved files don't slip in. A firewall is verysimple to turn on (or off) on your home computer.
Phishing: Phishing is usually an email or web site you're directed to that attempts to trick you into giving information such as usernames or passwords by pretending to be a trustworthy site. In most cases, a phishing scam is easy to detect as long as you know what you're looking for.
Privacy Policy: A privacy policy is a legal document that tells you the ways a company can use, gather, disclose, or manage your data.
Sandboxing: Sandboxing is a security measure used by operating systems and programs that restricts software from accessing files they're not supposed to. You or your computer may sandbox a program if you aren't sure it's safe.
Terms of Service/Use: A Terms of Service (also known as Terms of Use) is a legal document that describes how you can use a service, piece of software, or web site. They often include stipulations about community behavior, marketing policies, and copyright. While they're often very long, it's possible to at least skim them quickly for certain keywords that may indicate you're signing up for something you're not comfortable with.

Software Terms

App Launcher: An app launcher is a program that quickly launches applications with a keystoke, but they can also do so much more. The point of an app launcher is to give you quick access to your most commonly used apps and actions.
Boot Disc/Live CD: A boot disc or live CD boots into an operating system without ever actually installing the operating system. Boot discs are commonly used to launch utility programs that troubleshoot software issues or install a new operating system. Live CDs arecommon with Linux because you can launch into an operating system without installing it, but they can also be used for getting rid of viruses and running a totally private and secure operating system on any computer.
Cloud Storage: Cloud storage is a type of service that allows you to store and back up your files to so they're not located solely on your hard drive. This makes them accessible from any computer, and keeps them backed up in case your hard drive dies. Dropbox or Google Drive are two popular versions of this, but you can make your own pretty easily.
Dual Booting: Dual booting is the ability to install and boot into two different operating systems on one computer. It's incredibly handy when you want to test out an operating system before committing to it, like with Windows 7 and Windows 8, or if you need to run programs from a different operating system from time to time, like with Windows and LinuxMac OS and Linux, or even Mac, Windows, and Linux.
GUI (Graphic User Interface): The GUI is essentially what you see and interact with in your operating systems and programs. The GUI includes everything from the scroll bars to the button prompts. It's also one of our favorite things to hack and customize.
ISO Image: An ISO image is an exact duplicate of a physical disc on your hard drive that uses the *.ISO file extension. For example, an ISO of a DVD is identical to a DVD itself and your computer treats it the same way. It's an easy way to burn an exact copy of something, and you'll often encounter ISO images with boot discs or live CDs.
Jailbreak: Jailbreaking is the process that removes software limitations on Apple hardware like the iPhone, iPad, iPod Touch, and Apple TV. Once jailbroken, you have access to deeper parts of the operating system and you can run unapproved software. The jailbreaking process changes with each new version of iOS, but we have an always up-to-date guide to jailbreaking your phone to keep you on top of it.
Kernel: A kernel is the software that communicates between your hardware and your software. Essentially, a kernel makes it so your applications can communicate with your CPU, memory, and any other hardware devices.
Location-based: Location-based typically refers to the use of GPS to track your location and serve you specific information or perform certain functions. Location-based reminders apps likeCheckmark for iOS or Geonote on Android are great for reminding yourself to do something when you're in a certain location. Location-based apps are also good for making your iPhone read your mind or turning your Android into a fully-automated superphone.
Push Notifications: Push notifications are the pop-up messages you get on your mobile device or computer from apps. These come in the form of email messages, Facebook notifications, or even to-do list reminders. We'd argue push notifications aren't as great as they seem, but youcan make them much more useful with a little tweaking.
Rooting: Rooting gives you access to deeper parts of your Android's operating system. Much like jailbreaking on the iPhone, it allows you to do much more with the operating system itself, like add new features, overclock it to boost its speed, and more. Our always-up-to-date guide to rooting the most popular Android phones guides you through the process.
Text Expansion: Text expansion refers to a software utility that monitors what you type, and triggers a phrase when you type in a key combination. For example, you can use text expansion so when you type "omw" the program will replace that with "On my way." We love text expansion because when used properly it can save you hours of typing every day.

Thursday, November 29, 2012

6 tips to keep your emails secret

If David Petraeus couldn't keep his affair from prying eyes as CIA director, then what chance does an average person have? Experts say people underestimate how transparent digital communications have become.

"Hacking and spying went mainstream a decade ago," said Dan Kaminsky, an internet security researcher. "Everyone is reading everyone else'semails — girlfriends are reading boyfriends' , bosses are reading employees' — because it's just so easy to do."

Know adversaryPetraeus and his biographer , Paula Broadwell, may have thought the threat was their spouses. So, they reportedly did not send emails, but saved messages to the draft folder to avoid leaving a digital trail. But neither took steps to hide their computers' IP addresses.

Hide locationThey could have masked IP addresses using Tor, a popular privacy tool, or used a virtual private network , which adds a layer of security to public Wi-Fi networks.

Go off the recordChoose the "off the record" feature on Google Talk, Google's IM client, which ensures that nothing typed is saved or searchable in either person's Gmail account.

Encrypt messagesEmail encryption services , like GPG, help protect digital secrets from eavesdroppers. Without an encryption key, any message stored in an inbox or reached from the cloud will look like gibberish . Wickr, a mobile app, performs a similar service for phones, encrypting video, photos and text, and erasing deleted files for good.

Set self-destruct timerServices like 10 Minute Mail allow users to open an email address and send a message, and the address self-destructs 10 minutes later. Wickr also allows users to set a self-destruct timer so they can control how long a recipient can view a file before it disappears.

Drop draft ideaSaving emails in a shared draft folder is no safer than transmitting them. They are stored in the cloud. Even if they are deleted, email service providers can be compelled to provide copies.

Friday, November 23, 2012

Steps to Determine Email Sender’s IP Address and Location


This is the age of technology and today we use electronic mails more as compared to the old form of physical mails. When we receive an email from someone we can find out who is the sender of the email from the sender’s address but there is no field that can tell us what the location of the email sender is. Sometimes it becomes very important to determine the location of the email to check its validity as a person may be sitting in some country and claiming to be in another.
Thus it sometimes, is important to find out the approximate location (if not accurate) of the email sender. To be able to find out the location of the email sender we first need the IP address of the email sender or the IP route used by the email itself. Determining this is not very difficult and every different email service has its own way of finding this out. It can be like right clicking and checking the properties or the Full Headers.
If you are using Gmail primarily, then here is how to find the IP address of the sender and its location.
How to find the IP address of the Email sender in Gmail:
1. Open the email that you wish to find the IP address of.
2. From the drop down on right side, click the Show Original button

3. This will open a new window with lots of email information.
4. Now search for “Received: from”, you will see some IP address in the same line within square brackets like [XXX.XXX.XXX.XXX]

5. Now see for the last IP address of the page.
This will be the IP address of the sender or the route of the email used for delivery.
How to find the location of the email sender:
1. You can use the IP address noted above to find the location of the sender.
2. Visit this link, paste the IP in the Remote Address Field and click the Host Tracebutton.

3. Within few seconds, you would be able to see the location of the IP address on the Google Maps.
In the testing, I found this address to be more than approximation, if not accurate.
Note: Some email address might not be showing an IP address, this can be because they have protected their IP address from public display.

Tuesday, November 6, 2012

How to Create a Modular “Go Bag” System That Fits Every Need

We all love our go bags, but they don't fit every situation. You'll struggle to take a large backpack everywhere you go and a tiny bag can only fit a limited amount of stuff. While each bag has its own optimal uses, constantly transferring items just makes matters worse. The solution? Create a modular go bag system so you can swap items easily.
I have a ridiculous collection of backpacks, messenger bags, and everything in between. I've accumulated so many over the years—all favorites I can't bear to get rid of—that I don't even know how many I have. This didn't happen because I have a weird sort of bag fetish, but rather that no one go bag works in every situation. While I've reduced myself to three—a large backpack for when I need everything, a small messenger for basic needs, and a field bag for sports and exercise—I found that I kept forgetting what was in which bag when I had to move them around so often.

Choose Your Modules

How to Create a Modular "Go Bag" System That Fits Every NeedWhen you need to move a bunch of stuff around, grouping it together is very important. Before you can create a modular go bag system, you need to know what those modules are going to be. What's a module exactly? It's just a container that holds a variety of items, often in an organized fashion. When you have a few of these, it's easier to transfer everything because there's less to move around. Everybody is going to have a different case, but here are some examples I've encountered:
  • Storage Devices - Take all your portable external disks, whether they're hard drives or flash, and keep them together. Storage comes in wonderfully consistent, thin, rectangular shapes. Grouping it together for your bag takes little effort.
  • Gadgets - The type of gadgets you use will vary. If you're not just carrying around a music player and a point and shoot camera, you might need multiple modules for activity-specific equipment like photography and audio recording. You'll have to decide what goes together and what doesn't, but remember not to split things up too much. The goal here is to reduce the number of items in your bag so you can swap them easily.
  • Cables and Power - No gadget-based bag is complete without a diverse array of cables and charging equipment. Chances are a few USB chargers, or one massive multi-port brick, will handle all your needs on the go. You may also need a laptop charger, and those are notoriously difficult to store. MacBook adapters have a wonderful solution in Quirky's Power Curl, but PC laptops have options in the form of a small electronics travel case, mesh bag (with storage hook), or small packing cube (all of which we'll discuss later).
  • Art Supplies - Group all your pens, pencils, charcoal, blending tools, paint brushes, watercolor set, and whatever else you might need to take with you for your on-the-go artistic needs. If your bags tend to focus on art supplies, you may want to create separate modules for each type.
  • Files and Folders - Files and folders are generally the same size. You can keep them in one larger folder if you don't have too many, or you can simply strap them together with a book band.
  • Books and Notebooks - Books and notebooks can also be bound together easily with just a band.
  • Grab Bag - Some items just don't fit into any category but you still need to take them with you. When you can't figure out what else to do, create a "Grab Bag" module to hold onto your uncategorizable goods. Ideally these items will be small and easily managed. If not, you'll end up transporting a large mass of stuff with you most places and need very little of it. If you have a lot of miscellaneous things, consider what you can leave behind. When you need something for a special occasion, you can always toss it in the grab bag before you leave and remove it next time you remember.
Once you've decided which modules you need, it's time to figure out the best way to organize them.

Plan Your Organization Scheme

There are many ways to make a module compact and organized, but some options work better than others. Let's take a look at ways you can keep things compact and easily portable.

The GRID-IT

How to Create a Modular "Go Bag" System That Fits Every NeedThe Cocoon GRID-IT is one of our long-time favorite organization tools. When creating a modular system for your go-bag, it's almost indispensable. As you can see from the photo to your right, the GRID-IT is a rectangular board with a busy grid of elastic bands. Lift one up, put something under it, and it'll stay in place. Because there are bands everywhere, you can arrange the GRID-IT however you like. This makes for a very versatile storage tool that you can pull out of one bag and stick in another very easily.
The GRID-IT sometimes fails when items become loose and slip off. This happens if elastic bands become loose from being stretched out by a large item, then used to try and hold a smaller one, or if you just don't secure certain things very well. Cocoon does make GRID-ITs that come in cases or have protective neoprene wraps, however, so you can easily solve that problem by purchasing a protected version instead. You really only need this if you're planning on storing small, thin items (e.g. flash drives, pens/pencils).

The Mesh Bag

How to Create a Modular "Go Bag" System That Fits Every NeedMesh bags don't offer a lot of organization in themselves, but if you just need to keep track of a couple of items that won't get tangled up or lost if tosses in a single space they make for a great module. Many storage bags, like these or these, come with hooks on top. You don't necessarily want to just dump your storage bags into your go bag, so these hooks can help you secure them in place so they stay exactly where you want them.
Hooks require something to hook onto, of course, and not every bag offers anything like that out of the box. Often times you can use internal zippers (as the loop inside the zipper pull can usually secure a hook) but you can add places to attach these bags if you make some minor modifications. The easiest method is to use a clothespin to pin the bags on instead. If you want a more permanent adjustment that works with the hook, however, that's pretty simple as well. With a small sewing kit, sew on a small piece of rectangular fabric to the inside of your bag. Sew only the left and right edge, leaving the middle part open so you can hook your storage bags onto it.

The Packing Cube

How to Create a Modular "Go Bag" System That Fits Every NeedPacking cubes are like the mesh bags mentioned above, but they allow room for larger items of greater volume. This tool was primarily designed for packing clothing, but works great for cables, power adapters, hard drives, and various other items you might stuff and stack in your bags. Thanks to handles along the edges, you can pull them out easily. They're really great when you need storage with a little more height and form than a bag can provide.

The Three-Ring Binder

How to Create a Modular "Go Bag" System That Fits Every NeedA three-ring binder is a great way to organize small electronic components and a thin one will fit nicely in most bags. All you really need beyond that are sports card sleeves, as those provide a good amount of room for things like flash drives and cards, membership cards you don't want to keep in your wallet, sticky notes, and many other small things you don't want rolling around just anywhere in your bag.

The Folding Sleeve

Versatile storage is great, but sometimes you need a module that's pretty specific. While we'll discuss some options you can buy later in this section, you can save yourself some cash and get exactly what you need by making a folding sleeve.
What exactly is a folding sleeve? It's a series of simple pockets attached to each that form a long rectangle, and you can fold them up to fit neatly in your bag. (In fact, it's kind of like this mail sorter we featured a couple of years ago.) Making a folding sleeve is very simple. Just follow these steps:
  1. How to Create a Modular "Go Bag" System That Fits Every NeedTake a large piece of canvas (or other thick, sturdy fabric) and measure out the length of the sleeve. (Because it folds, you can make it longer than your bag.) Now measure the height of the largest item you're going to put in it. (Generally speaking, you don't want to include anything larger than a smartphone or portable hard drive.) The height of the canvas should be twice the size of this item, plus a little extra for wiggle room. When you have your measurements, cut the fabric accordingly.
  2. How to Create a Modular "Go Bag" System That Fits Every NeedFold the fabric in half you have one really long sleeve that's half as tall. Take the top end of one side and fold a tiny little bit over to make a ridge, then sew it in place. Do the same for the other side. (You can use staples if you don't have a sewing kit to make a crude version like the one pictured in the examples, but sewing is definitely a better option.)
  3. How to Create a Modular "Go Bag" System That Fits Every NeedSew all the way up on both sides of the canvas, but do not close the top. Clip any excess fabric along the edges (if necessary).
  4. Turn your canvas inside out so that you have nice, smooth edges all over.
  5. How to Create a Modular "Go Bag" System That Fits Every NeedMeasure each item you want to place in the sleeve and make marks vertically along the canvas. (Basically, map out the sleeve's compartments with a pencil.) Be sure to leave a little extra space so nothing fits too snugly or you won't be able to fold.
  6. How to Create a Modular "Go Bag" System That Fits Every NeedSew a straight line up the sleeve in each place you marked. When you're done, you'll have several compartments for all your stuff.
Now you can store that sleeve you made in your bag and fold it to whatever size you need (assuming its contents aren't excessively bulky).

The Module-Specific Organizer

How to Create a Modular "Go Bag" System That Fits Every NeedSome modules may benefit from organizers designed for the items it carries. For example, the Neatnix Readytech Organizer is almost like a GRID-IT, cable sleeve, and packing cube all in one. If you have tons of SD cards, you can get an organizer specifcally for them. Before you decide to use a bunch of versatile solutions, look around for items that may be designed for the specific need you have in mind. Often times, something exists.

Choose the Right Bags

How to Create a Modular "Go Bag" System That Fits Every NeedChances are you have a few bags already if you've made it this far in the guide, but maybe you don't or maybe you don't know which bags will work best. For the most part, sticking to two or three bags is the way to go. A big bag and a small bag should fill two of the slots, and then any third bag should fill a specific need like photography or sports and exercise. Of course, you don't need to consider any luggage one of your bags. Travel is a different situation, although one that still benefits from your modular system.
Once you've chosen your bag types, there are a few things to consider before you start putting everything together. Are there pockets in the bags that you want to use? If you do, consider what might go in each bag that never needs to leave. This is the best use for pockets as they go against the point of your modular system. Also, if you have a lot of gadgets, you may want to consider a bag with solar charging built in (such as this one). Certain bags work better for different situations, too, as hiking and camping packs almost always have a space for a water bottle and tech bags have a padded area for your laptop. Consider your needs and choose appropriately or you'll be swapping bags often, and that's annoying and expensive. If you need some suggestions, the Wirecutter has plenty.

Put It All Together

You're almost done! You have your modular system set up but now you have to put it together. This doesn't require much more than stuffing your items in a bag and calling it a day. That said, since this system is brand new you should practice a little bit. Put each module in each bag and see how they fit together. Certain modules might need to go in first, so one doesn't get in the way of the other (e.g. packing cubes before hooked mesh bags), and you may want to have some modules more easily accessible than others. It should only take a few minutes to figure out, and now you can easily transport all your gear so that any bag can be your go bag.

Google’s Keep note-taking app is getting a new feature courtesy of Android 14 that’s a huge time-saver, even if Samsung got there first

  There’s a certain balance that needs to be achieved with lock screen functionality. You can’t give away too much because of, well, securit...