Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Keep a Facebook Friend From Viewing a Post You Don’t Want Them to See

Tip of the Week: How to Keep a Facebook Friend From Viewing a Post You Don’t Want Them to See

The advantage of Facebook is also its disadvantage: the fact that you’ve likely got a large variety of people on your friends list. While this works out great for networking, it may mean holding back on posting a personal opinion if it isolates or offends someone you’re friends with. To get around this social dilemma, Facebook allows you to hide your status from one or more friends. Here’s how to do it.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Hackers Cloud Email Privacy Malware Tech Term Business Computing Internet Computer Network Security Business Data Hosted Solutions Efficiency Software IT Services Innovation Mobile Devices Android User Tips Data Backup Microsoft Google Smartphone Hardware Communication Browser Windows 10 Business Management Small Business Workplace Tips Productivity Artificial Intelligence Ransomware Productivity Data Recovery Managed Service Provider Backup IT Support Gmail Data Management Internet of Things Facebook Smartphones Social Media Server Microsoft Office Saving Money App Encryption Collaboration Two-factor Authentication Cloud Computing Passwords Windows Office 365 Business Technology Cybersecurity Office Tips Windows 10 Automation Upgrade Bandwidth Disaster Recovery Managed IT Services Miscellaneous Mobile Device Information Spam Applications communications Phishing Managed Service Access Control Website IT Support Infrastructure Tip of the week Mobile Device Management Paperless Office Business Continuity Firewall Government Scam BYOD VoIP The Internet of Things Holiday WiFi Blockchain Big Data Social Going Green Outsourced IT Apps Employer-Employee Relationship Users Computing BDR Printer Data storage LiFi Wireless Technology Saving Time Analytics Chrome Augmented Reality Money Storage Sports Mouse Bring Your Own Device Antivirus Safety Administration Document Management Apple Maintenance Data Security Cost Management Network Settings Printing Vulnerability HIPAA Router Content Filtering Robot Vendor Cybercrime Wi-Fi Modem End of Support Mobile Security Customer Service Hacking Risk Management Presentation Computers Quick Tips Hacker Office Nanotechnology Display Help Desk Avoiding Downtime Evernote Distributed Denial of Service Addiction Windows 8 Network Management Language Laptop IP Address Virtual Reality Travel Management Drones Chatbots Outlook SharePoint Screen Reader Monitors Recovery Healthcare Marketing Managed IT Service Service Level Agreement Computing Infrastructure Halloween Mobile Office Remote Computing Lenovo Identity Unified Threat Management Hard Drives Conferencing Bookmark Humor Downloads Smart Tech Domains Word Alert Tech Break Fix Download Hacks Alerts Scary Stories Superfish Fun Refrigeration Telephone Budget Browsers Multi-Factor Security Connectivity Deep Learning Public Speaking Writing Term Upload Password Server Management Licensing Lithium-ion battery Compliance Education Entrepreneur Social Network Entertainment Google Calendar IoT Managed IT Services Dark Web Retail Mobility Trends Mobile Computing Cooperation Networking Regulations Search Undo Customer Resource management Data Analysis Legislation Star Wars Best Practice Microsoft Excel Social Engineering Google Play Gamification Current Events Staff Buisness Social Networking IT solutions Identity Theft Virtualization Telephone System Legal Fileless Malware Comparison Business Growth Data loss Tech Support Application Security Cameras Content Patch Management Wearable Technology Techology Motherboard Cortana Dark Data Health IT Directions Gadgets Specifications Assessment Alt Codes Permissions IBM How To Websites Wireless SSID Downtime Unified Threat Management Hosted Solution Tablet Operating System Microchip Black Friday Internet Exlporer Typing Remote Monitoring Fraud Customer Relationship Management Save Money Machine Learning Username VPN YouTube User Error Knowledge Competition User Tip Google Drive Processor Cyber Monday Database Cryptocurrency IT Management Vendor Management Error 5G Information Technology Virtual Private Network IT Technicians Cookies Unified Communications Google Maps Experience Network Congestion Proxy Server Google Docs User Navigation Smart Technology Tactics Bitcoin Hotspot Running Cable Electronic Medical Records Monitoring Google Wallet Mirgation Virtual Desktop

Sign Up For Our Newsletter!