Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Keep a Facebook Friend From Viewing a Post You Don’t Want Them to See

Tip of the Week: How to Keep a Facebook Friend From Viewing a Post You Don’t Want Them to See

The advantage of Facebook is also its disadvantage: the fact that you’ve likely got a large variety of people on your friends list. While this works out great for networking, it may mean holding back on posting a personal opinion if it isolates or offends someone you’re friends with. To get around this social dilemma, Facebook allows you to hide your status from one or more friends. Here’s how to do it.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Innovation Business Network Security Cloud IT Support Hardware Internet User Tips Malware Email Phishing Efficiency Privacy Google Workplace Tips Computer Collaboration Hosted Solutions Users IT Services Cybersecurity Quick Tips Ransomware Microsoft Data Backup Communication Small Business Smartphones Mobile Device Workplace Strategy communications Android Business Management Mobile Devices Saving Money Smartphone VoIP Microsoft Office Managed IT Services Managed Service Browser Data Recovery Social Media Passwords Network Upgrade Backup Disaster Recovery Tech Term Internet of Things Automation Cloud Computing Covid-19 Remote Server Managed Service Provider Remote Work Artificial Intelligence Windows Facebook Miscellaneous Encryption Gadgets Spam Information Holiday Windows 10 Employee/Employer Relationship Outsourced IT Government Data Management Business Continuity Productivity Wi-Fi Business Technology Windows 10 Blockchain Two-factor Authentication Bandwidth Virtualization Compliance Apps Data Security Current Events Vendor Office Mobile Device Management Gmail Chrome Budget Networking Apple Employer-Employee Relationship Managed Services App Voice over Internet Protocol Hacker Applications Computing Avoiding Downtime Mobile Office Information Technology Access Control Office 365 Conferencing How To BDR HIPAA Computers Router BYOD Operating System Virtual Private Network Training Website Risk Management Marketing Health Help Desk Analytics Office Tips Augmented Reality Retail WiFi Storage Big Data Password Managed IT Services Bring Your Own Device Customer Service Going Green Remote Monitoring End of Support Vulnerability Healthcare Vendor Management Windows 11 Cybercrime Free Resource Display Project Management Windows 7 Printer Excel Monitoring Paperless Office Microsoft 365 Infrastructure AI Firewall Solutions Tip of the week Document Management IT Support Telephone The Internet of Things Scam Data loss Cooperation Social Patch Management Save Money Remote Workers Hacking Settings iPhone Presentation Printing IT Management Wireless VPN Content Filtering Meetings Modem Vulnerabilities User Tip Wireless Technology Processor 2FA YouTube Mobile Security Supply Chain Computer Repair Images 101 Cryptocurrency Multi-Factor Authentication Mobility Word Smart Technology Virtual Desktop Data storage LiFi Saving Time Machine Learning Outlook Employees Integration Managed IT Service Safety Money Downloads Humor Maintenance Data Privacy Antivirus Licensing Holidays Sports Entertainment Mouse Data Storage Video Conferencing Administration Managed Services Provider Professional Services Telephone System Virtual Machines Customer Relationship Management Cost Management Robot Net Neutrality Assessment SQL Server Permissions Amazon Directions Financial Data History Cortana Unified Threat Management Specifications Outsource IT Smartwatch Alt Codes IT Unified Threat Management Microchip Media Procurement Internet Exlporer User Downtime Azure Fraud Environment Network Congestion Telework Username Hosted Solution Cyber security Tech Black Friday Physical Security Small Businesses CES Typing Communitications User Error IP Address Supply Chain Management Database Displays Google Drive FinTech IT Technicians Knowledge Term Point of Sale Cookies Cyber Monday Outsourcing Proxy Server IT Assessment Flexibility Tactics Recovery Value Network Management Hotspot 5G Tech Support Monitors Workplace Google Docs Organization Hard Drives Unified Communications Mirgation Experience Nanotechnology Running Cable Hiring/Firing Digital Security Cameras Domains Bitcoin Smart Devices Paperless Google Wallet Remote Working Addiction Memory Language Websites Co-managed IT Management Refrigeration Data Breach Chatbots Google Play Screen Reader Laptop Distributed Denial of Service Electronic Medical Records Technology Care Videos Public Speaking Windows 8 Electronic Health Records SharePoint Business Communications Lithium-ion battery Drones Service Level Agreement Wasting Time Computing Infrastructure Writing Scams Trend Micro Lenovo Identity Entrepreneur Security Cameras Smart Tech Halloween Virtual Reality Hybrid Work Bookmark Software as a Service Human Resources Download Managing Costs Server Management Alerts Private Cloud Identity Theft Cables Undo eCommerce Superfish SSID Connectivity Scary Stories Virtual Assistant Break Fix Twitter Browsers Hacks Surveillance Google Apps Upload Virtual Machine Fun Error Multi-Factor Security Social Engineering IT Maintenance Reviews Social Network Deep Learning Medical IT Development IoT Transportation Dark Web Remote Computing Business Intelligence Shortcuts Trends Application Education Hypervisor PowerPoint Tablet Google Calendar Ransmoware Shopping Customer Resource management Optimization Regulations IBM Mobile Computing Star Wars Employer/Employee Relationships Microsoft Excel Alert Vendors Data Analysis Dark Data Be Proactive PCI DSS Gamification Managed IT Staff Search Navigation File Sharing Legislation How To Workforce Gig Economy Best Practice Social Networking Internet Service Provider Buisness Teamwork Notifications Threats Fileless Malware Workplace Strategies Legal Regulations Compliance Content IT solutions Wearable Technology Evernote Travel Google Maps Comparison Meta Health IT Competition Business Growth Memes Techology Motherboard

Blog Archive