Month: May 2014

Why Use Private Browsing?

Last time, I’ve explained how to delete your browser history to protect your important login credentials. This time what I’m going to share to you is a new browsing technique which is widely use now on major browsers such as Firefox, Internet Explorer and Google Chrome called Private Browsing.

To enable private browsing in Mozilla Firefox click the Firefox icon and select start private browsing. While on Internet Explorer Click the gear icon and hover the mouse over safety, then select InPrivate Browsing. Lastly, on Google Chrome click the menu button and choose new incognito window.

What private browsing does is – it prevents your Internet browser from saving your browsing history. This means anyone else who uses your computer will not be able to see your online activity.

How to Remotely Operate a Computer

What’s the use of operating a computer remotely? Well, first thing is when you forgot something in your computer and you need to send it remotely to where you are, second would be if you need some help from an expert and he or she can’t help you personally then controlling your pc remotely will definitely the best option you have.

To do this you can use your Windows built-in function but it is not that user friendly especially if you are just doing it for the first time, that’s why they have created the Team Viewer. It is a third party software that you can install on your pc. You can use team viewer to remotely access your friend’s computer system where in both parties connect to a server which sets up a session between both. Using Team Viewer is safe and secure because no one can access your pc till he or she has your id and password.

What Are Captchas?

I’m sure you have encountered captchas in the internet, you are just not aware with its name or how does it look like. Commonly these are images that are computer generated that display a combination of numbers or letters or mixed. These are used on blogs, or forum registrations in which we have to type to continue or to complete the registration process.

CAPTCHA stands for Completely Automated Public Turing-test to tell Computers and Humans Apart. It will recognize if you are just using a bot or automated software to register or comment with sites that uses captchas because you can’t solve it by any means. If you are a real human being solving captchas is very easy as you just need to copy what is shown or just answer what is being asked. CAPTCHAs test prevent about 90% of hackers attacks.

How to Delete Your Firefox History

Deleting Mozilla Firefox history is a must, especially if you are browsing on a shared computer or public computer like for example internet café, or anywhere else which is not safe and secure. Other users can steal your important login credentials like bank account access, social media passwords, and even spy on what websites that you always visit.

Firefox store all information on its history what you have downloaded, visited, recently closed tabs and etc. To simply clear the history of your browser, just click ctrl + shift + delete and select “everything” and click clear now and voila! You have cleared your Firefox history.

How To Password Protect USB Flash Drives

Flash drives are very useful nowadays, it is very handy and it is available in different capacities ranging from 2GB to 128GB depending on brand. I’ve been using flash drives for my day to day work and as a means of reformatting my client’s computers because I don’t need to burn a DVD disc anymore. Another advantage of having a flash drive is that you can access your files anywhere download/upload and even share your files to your employers remotely.

But in such cases, data security is a persistent problem because as you plug your flash drives on different computers there is a huge risks of being infected by viruses, Trojans, and worms which can harm your important data. Worse case is when your flash drive was lost or compromised, sensitive data could fall in the wrong hands. But there’s a solution to this, password protect your flash drives!

You can simply add a password as security to your USB flash drives so that only you or authorized users can access the data. There’s two types of security measure you can use, a simple password protection wherein data cannot be seen without entering a password and there’s encryption, in which the data is actually encrypted and can be decrypted and accessed only with a password.

How to Detect and Remove key loggers from your PC

If you are regularly visiting an internet café to play online games, or just to check your social media accounts there is a high risks of being key logged by other users of course for several reasons possible. FYI, Key loggers are software specialized in capturing all the information that enters your computer when you type with the keyboard. Many individuals use this kind of technique if they want to hack someone’s game password, or if they want to stalk to a person’s social media account especially to ladies. Others will use this for more serious intent like for hacking your bank account and checking your other personal information.

Not just in the internet cafés keylogger are present but even in your own personal computer as it can be installed remotely or it can be attached to a software that you’ve accidentally installed into your pc.To detect if you are infected with such threat, you can see changes that you have not done or see attempted entries into your social media account or email, or your game account loses some gaming currencies and items.

If you find that it is a key logger then you must uninstall it immediately. You can also perform a full scan of your antivirus and be sure to update it constantly. You can also install an antikeylogger program that allows you to automatically detect any key logger installed.

How to create a folder without name

What I’m about to share is a trick, which I guess not useful enough but I know some of your friends will find this one really cool. It Is how to create a folder without a name. To do this just follow these simple steps. First select a folder or just create a new one then remove the name by pressing the F2 or right clicking on it and selecting rename. While deleting the name of the folder be sure that your keyboard Numlock is On and then press ALT button and type a code 0160 by the help of your number pad and press Enter and voila! Now you will see that there is no name on it. If you find this simple trick cool enough feel free to share it on your Facebook or Twitter account.

Tab Napping – New Phishing Scam

If you are now are of Phishing, it is actually a technique use by hackers to steal your personal information such as usernames and passwords and other important information that will benefit them. Now there is a new phishing scam called Tab napping, where user does notrequireto click on any URL to redirect them to the phishing site instead it will trigger one of your inactive tab to automatically replaced by with a new tab without notice as we all know that opening multi-tabs now in browser is use by many people

To give you a good example, for instance you have opened your bank account in one of your tabs and became inactive for a few minutes with tab napping it will be automatically replaced with the phishing site of your bank and youwill be askedto enter your Usernameand password as regular phishing sites do. You might think youhave been signedout or never logged in but when you will enter the details again itwill be sentto the hacker already.

USB 3.1 Cables and Connectors Revealed

If you are still using USB 2.0 flash drives then you might want to try USB 3.0 external drives and thumb drives to experience how fast to transfer files with this kind of technology. I’ve been using my USB 3.0 external drive a couple of years and it’s still working perfectly, transferring downloaded movies from my pc to the drive in just a short period of time.

The good news is there is already information about the next generation USB 3.1 cables/connector featuring much more user friendly design and much faster transfer rates (up to 10Gbps compared to the 5Gbps on the previous generation USB 3.0. There is information given that there are two types of end connectors in the case of Type C, so you can plug it in without worrying about direction and orientation. Plus, you don’t need to worry about vertical orientation either.

How to extend your laptop battery life

I’ve been using laptop and netbook for almost 6 years and based from my experience it is not hard to extend your laptop battery life as long as you are not abusing the system itself. Here are some helpful tips you can follow to save your battery from retiring early because if you are not aware, Laptops original batteries are really expensive to buy. So try the following steps and save some battery life :)

Step 1: If you’re using Windows OS. Right click on your desktop, click properties and then select screen saver, then select powerand click power scheme and then select maximum battery life.

Step 2: Always turn down the brightness of your laptop, same with your android phone it will save a lot of juice.

Step 3: Always charger your batteries when they completely drained or nearly battery empty.

Step 4: Only use the battery if you are going outside, in a mall, or a picnic. If you are only working at home or in the office run the laptop by removing the battery and then connect the plug to main switch as an AC mode.

Step 5: Avoid heavy multitasking, try to open a single or two applications only at the same time.

If you find these tips useful enough, please share it to your friends.