Why Use Private Browsing?

Last time, I’ve explained how to delete your browser history to protect your important login credentials. This time what I’m going to share to you is a new browsing technique which is widely use now on major browsers such as Firefox, Internet Explorer and Google Chrome called Private Browsing.

To enable private browsing in Mozilla Firefox click the Firefox icon and select start private browsing. While on Internet Explorer Click the gear icon and hover the mouse over safety, then select InPrivate Browsing. Lastly, on Google Chrome click the menu button and choose new incognito window.

What private browsing does is – it prevents your Internet browser from saving your browsing history. This means anyone else who uses your computer will not be able to see your online activity.

What Are Captchas?

I’m sure you have encountered captchas in the internet, you are just not aware with its name or how does it look like. Commonly these are images that are computer generated that display a combination of numbers or letters or mixed. These are used on blogs, or forum registrations in which we have to type to continue or to complete the registration process.

CAPTCHA stands for Completely Automated Public Turing-test to tell Computers and Humans Apart. It will recognize if you are just using a bot or automated software to register or comment with sites that uses captchas because you can’t solve it by any means. If you are a real human being solving captchas is very easy as you just need to copy what is shown or just answer what is being asked. CAPTCHAs test prevent about 90% of hackers attacks.

How to Delete Your Firefox History

Deleting Mozilla Firefox history is a must, especially if you are browsing on a shared computer or public computer like for example internet café, or anywhere else which is not safe and secure. Other users can steal your important login credentials like bank account access, social media passwords, and even spy on what websites that you always visit.

Firefox store all information on its history what you have downloaded, visited, recently closed tabs and etc. To simply clear the history of your browser, just click ctrl + shift + delete and select “everything” and click clear now and voila! You have cleared your Firefox history.

How To Password Protect USB Flash Drives

Flash drives are very useful nowadays, it is very handy and it is available in different capacities ranging from 2GB to 128GB depending on brand. I’ve been using flash drives for my day to day work and as a means of reformatting my client’s computers because I don’t need to burn a DVD disc anymore. Another advantage of having a flash drive is that you can access your files anywhere download/upload and even share your files to your employers remotely.

But in such cases, data security is a persistent problem because as you plug your flash drives on different computers there is a huge risks of being infected by viruses, Trojans, and worms which can harm your important data. Worse case is when your flash drive was lost or compromised, sensitive data could fall in the wrong hands. But there’s a solution to this, password protect your flash drives!

You can simply add a password as security to your USB flash drives so that only you or authorized users can access the data. There’s two types of security measure you can use, a simple password protection wherein data cannot be seen without entering a password and there’s encryption, in which the data is actually encrypted and can be decrypted and accessed only with a password.

How to Detect and Remove key loggers from your PC

If you are regularly visiting an internet café to play online games, or just to check your social media accounts there is a high risks of being key logged by other users of course for several reasons possible. FYI, Key loggers are software specialized in capturing all the information that enters your computer when you type with the keyboard. Many individuals use this kind of technique if they want to hack someone’s game password, or if they want to stalk to a person’s social media account especially to ladies. Others will use this for more serious intent like for hacking your bank account and checking your other personal information.

Not just in the internet cafés keylogger are present but even in your own personal computer as it can be installed remotely or it can be attached to a software that you’ve accidentally installed into your pc.To detect if you are infected with such threat, you can see changes that you have not done or see attempted entries into your social media account or email, or your game account loses some gaming currencies and items.

If you find that it is a key logger then you must uninstall it immediately. You can also perform a full scan of your antivirus and be sure to update it constantly. You can also install an antikeylogger program that allows you to automatically detect any key logger installed.

How to Shop Online Securely

Shopping online is very popular nowadays as it gives the buyer a hassle-free shopping experience and at the same time they don’t need to go out. Just a few clicks from their pc and they can order anything that they want. But the problem with Online shopping, there is a risk of getting scam as many shoppers are unaware of how to ensure that their online transactions are safe, secure and private.

My personal advice is that when you see a product or a gadget that is way too low for its original price think twice already as this kind of offer is just a bait for you to get scam. I was scammed once in my entire life and what I’ve learned is that do not fall for bargain sales unless the user has a positive feedback, always opt for a meet ups but if the person is too far from your place and you don’t have choice select shipping methods provided with a valid i.d as a proof of his/her identity, you can also perform a background check and try to ask for feedbacks for that seller or merchant.