Saturday, May 31, 2014

Spying on You through your Webcam



       
           Sounds creepy ? but it's TRUE. Many still didn't know yet that this is happening. You didn't even know that there is someone who is watching you over your webcam. The truth is thousands of webcam users get hack and if you didn't know " How to protect Yourself  ", maybe the chance of getting hacked is higher. So for in this topic I'll be explaining some of the best precautions and necessary steps to secure your webcam.

How to Protect USB Drive with Password

     

          I still remember when floppy disk is so popular during the time that computing comes out as one of the promising technology. Floppy disk is portable and  light storage device used to transport data between any computers or to any device that support it. But now USB thumb drive  has emerged like floppy disk before, it is use to read and write data between any device that has USB port. A wide variety of USB drive are now in the market and the storage capacity is increasing making it so easy to store any valuable data or files in a single portable device. But one disadvantage of  it is that it can be easily be lost because of its size and portability. So how about if you have important and confidential data that are stored and suddenly you lost it ?

Thursday, May 29, 2014

How to Recover / Restore deleted files

                             
                How about if you accidentally deleted one of your precious  files in your multimedia storage ( a USB drive, in your PC or even in your  memory card and other removable devices ) and you don't have a "backup", that's disgusting isn't it ? It seems that there is no other option and you think it will gone forever. But don't worry we are living in a Digital World where everything problems we encounter pertaining to our technology has a possible solution. Then you try to have a research and found out that there are many free data / files recovery software available that may help you, but you didn't know which one of them, or you may choose one but there are lot of confusion you have in your mind, you didn't know how to use it, or even software installation is a bit puzzle to you. During the rest of this tutorial I will guide you step by step in every possible way.

Wednesday, May 28, 2014

Boost Computer Performance in Easy Ways

               

pc boost , pc optimization
image source : webrifer.com
      Many of us experience slow computers often. Sometimes it's very annoying when we have things to do or projects that needs to complete quickly, or sometimes even a simple task execution is incredibly very slow. There are times that we are thinking a last possible solution of reformatting it to make it good as new again in terms of speed performance. I will show you how to fix this problem even the most agitating problems that occur mostly in our computer. Anyone can do this just follow and be amazed how your computer will come alive again.

Monday, May 26, 2014

Ways to Improve Home WiFi


home wifi
              Slow Internet, Intermittent WiFi Signal or No Signal at all, Full Signal but still WiFi performance is poor. This is sometimes the most common problem I encounter when troubleshooting WiFi at home. Most home today are now equipped with this kind of technology. More and  more households are willing to have this in their home for fast and easy connection to the Internet. But at times there are lot of problems occur that may be solve in a simplest way and stay away from extra expenses for fixing the trouble by a qualified technician. So here are the Ways for Improving WiFi connectivity in your home...

Saturday, May 24, 2014

dSploit - " The most complete and advanced IT security professional toolkit on Android "


" In order for you to know your ENEMY, 
you must become your ENEMY. "
-Sun Tzu ( Art of War )

         
          For every IT Professionals, experts/geeks,  it's one of the handy and probably most handy tools in terms of Network Analysis, Penetration Tools and Network Security Assessments on a mobile device. Since I've been in Computer - Network industry, I've came across at this tools and test some functions of how this tools behave and perform in terms of capabilities to penetrate Network Security. This tool is for educational purpose only , it can be use for further studies of how network security can be exploited and take some necessary measures to secure them. This is for beginners and  experts / geeks who wish to have advance knowledge dealing with Network Analysis and Security, and also notify the readers, Internet-Computer users that there are advance tools that can be use against them for whatever purpose. 

Friday, May 23, 2014

Play your favorite Android Games, Apps in your Computer or Laptop

          
Android is now very popular surpassing other Mobile Operating System and maybe one of the reason why the  giant and very popular NOKIA is now loosing the battle among other Android pioneer companies, like Google NEXUS, SAMSUNG, SONY, HTC - where this companies incorporate it early in their devices. When I first experienced Android Technology, I was amazed how this technology can perform such high-tech functions, the applications are widely distributed and most of all GAMES are easy to find  and with at ease to install, unlike in the previous  years of Mobile Computing.With further research I found out that Android is an open source system, meaning it can be distributed and develop freely, by companies who want to develop or customized it. And is based in the widely distributed Open Source Powerful LINUX Operating System. Even my two year old son can operate Android device, download GAMES, install and uninstall it,  watch Youtube.  How powerful this invention making high-tech device even my 2 year old son can able to operate it.

How will you know if someone is connected to your Wi-Fi illegally

         
        In the latter years of Analog Technology where Cellular is the King, there was a time when "War Driving" has emerged. It is kind of hacking terminology where hackers try to find a hole in security of a Cellular device particularly cellphone users- that black hat hackers tried to exploit  through sniffing,  and tried to stole important data or manipulate data being received or transmitted. But today we are in what we called " Internet Revolution ", where everyone is connected, whether through cellphone, laptop or any other device. War Driving has also emerged to this date, finding vulnerable Wi-fi that a " black hat " hackers may exploit. In my previous post where I elaborate some security measures, that it has a possible way to deter or prevent your connections from being hacked, but sometimes black hat hacker are so clever that despite of the security they were still able to evade them using some advance technique. Today I will show you " How to detect if someone is using your Wi-Fi illegally ".

Tuesday, May 20, 2014

Humanatic - A Legit Money Making Online




             Since I've started searching on
" How to Make Money Online ", I arrived at Humanatic. It was first tried by my wife. Initially, I'm not interested because you need to work at night, United States time zone, coz the company is base in the U.S. It takes hours and graveyard working just to earn a cents of a dollar, in short, it is hard.

Monday, May 19, 2014

Securing Wi-Fi Connections




       Nowadays, Wi-Fi has been significantly increasing in every household.It seems that it has become part of our everyday life.There are many Internet Service Providers (ISP) offering instant Internet with Wi-Fi Ready Connections. But company installer failed to educate the users of the possibility of being hacked.These Wi-Fi ready connections arrived at your home with pre-configured settings leaving the user unaware that this set-up is less secure and vulnerable to hacking.

Sunday, May 4, 2014

How to Check if Someone is using your Facebook account ?

         

     FACEBOOK, the big name in social networking, stands out to be the number 1 among the players, billions of users worldwide. And daily, thousands of new users is subscribing, making Facebook the fast or even incredibly fast growing  social network site in the world. Conceived by Mark Zuckerberg, and his fellows  as a way to connect students, now it's connecting the world and became the official  site ? to connect every families, government, schools, business and other institutions. But being a number 1 is a massive task for Facebook to protect every users specially when it comes to privacy and security. In reality thousands of Facebook account has been put into compromised making Facebook also the number 1 target of blackhat hackers.That's why Facebook is developing new way to strengthen their security in order to protect every subscriber including me. But how well you know about Facebook Security features ?

Friday, May 2, 2014

Facebook - Advance Way to Secure your Account


        In my previous post, I outlined some of Facebook Security in order for you to detect or " Check if someone is using your Facebook ". Like what I've said before, security in our online life is sometimes the most neglected or overlook part, not knowing  that INTERNET is just like our home that needs protection or security measures to stay away from trouble. You can control your protection as you may wish using some of the advance security features of Facebook. First line of defense is important and You have the power to enforce that. Now we're taking advantage of that Facebook Advance Security, I will show you how....

Image Source : iag.me