Computer-Networks


Ways to Improve Home WiFi


home wifi
       Slow Internet, Intermittent WiFi Signal or No Signal at all, Full Signal but still WiFi performance is poor. This is sometimes the most common problem I encounter when troubleshooting WiFi at home. Most home today are now equipped with this kind of technology. More and  more households are willing to have this in their home for fast and easy connection to the Internet. But at times there are lot of problems occur that may be solve in a simplest way and stay away from extra expenses for fixing the trouble by a qualified technician. So here are the Ways for Improving WiFi connectivity in your home...


_________________________________________________________________________________

Securing WiFi Connections



          Nowadays, Wi-Fi has been significantly increasing in every household.It seems that it has become part of our everyday life.There are many Internet Service Providers (ISP) offering instant Internet with Wi-Fi Ready Connections. But company installer failed to educate the users of the possibility of being hacked.These Wi-Fi ready connections arrived at your home with pre-configured settings leaving the user unaware that this set-up is less secure and vulnerable to hacking.




________________________________________________________________________________

Boost Computer in Easy Ways
                            
                
pc boost , pc optimization
image source : webrifer.com
             Many of us experience slow computers often. Sometimes it's very annoying when we have things to do or projects that needs to complete quickly, or sometimes even a simple task execution is incredibly very slow. There are times that we are thinking a last possible solution of reformatting it to make it good as new again in terms of speed performance. I will show you how to fix this problem even the most agitating problems that occur mostly in our computer. Anyone can do this just follow and be amazed how your computer will come alive again.  

Read More

_________________________________________________________________________________

How will you know if someone is  connected to your WiFi Illegally

          In the latter years of Analog Technology where Cellular is the King, there was a time when "War Driving" has emerged. It is kind of hacking terminology where hackers try to find a hole in security of a Cellular device particularly cellphone users- that black hat hackers tried to exploit  through sniffing,  and tried to stole important data or manipulate data being received or transmitted. But today we are in what we called " Internet Revolution ", where everyone is connected, whether through cellphone, laptop or any other device. War Driving has also emerged to this date, finding vulnerable Wi-fi that a " black hat " hackers may exploit. In my previous post where I elaborate some security measures, that it has a possible way to deter or prevent your connections from being hacked, but sometimes black hat hacker are so clever that despite of the security they were still able to evade them using some advance technique. Today I will show you " How to detect if someone is using your Wi-Fi illegally ".


_________________________________________________________________________________

How to Recover / Restore Deleted Files

                 How about if you accidentally deleted one of your precious  files in your multimedia storage ( a USB drive, in your PC or even in your  memory card and other removable devices ) and you don't have a "backup", that's disgusting isn't it ? It seems that there is no other option and you think it will gone forever. But don't worry we are living in a Digital World where everything problems we encounter pertaining to our technology has a possible solution. Then you try to have a research and found out that there are many free data / files recovery software available that may help you, but you didn't know which one of them, or you may choose one but there are lot of confusion you have in your mind, you didn't know how to use it, or even software installation is a bit puzzle to you. During the rest of this tutorial I will guide you step by step in every possible way.


_________________________________________________________________________________

dSploit  - " The most complete and advanced IT security professional toolkit on Android "

         For every IT Professionals, experts/geeks,  it's one of the handy and probably most handy tools in terms of Network Analysis, Penetration Tools and Network Security Assessments on a mobile device. Since I've been in Computer - Network industry, I've came across at this tools and test some functions of how this tools behave and perform in terms of capabilities to penetrate Network Security. This tool is for educational purpose only , it can be use for further studies of how network security can be exploited and take some necessary measures to secure them. This is for beginners and  experts / geeks who wish to have advance knowledge dealing with Network Analysis and Security, and also notify the readers, Internet-Computer users that there are advance tools that can be use against them for whatever purpose. 


_________________________________________________________________________________


Play your favorite Android Games, Apps in your Computer or Laptop

           Android is now very popular surpassing other Mobile Operating System and maybe one of the reason why the  giant and very popular NOKIA is now loosing the battle among other Android pioneer companies, like Google NEXUS, SAMSUNG, SONY, HTC - where this companies incorporate it early in their devices. When I first experienced Android Technology, I was amazed how this technology can perform such high-tech functions, the applications are widely distributed and most of all GAMES are easy to find  and with at ease to install, unlike in the previous  years of Mobile Computing.With further research I found out that Android is an open source system, meaning it can be distributed and develop freely, by companies who want to develop or customized it. And is based in the widely distributed Open Source Powerful LINUX Operating System. Even my two year old son can operate Android device, download GAMES, install and uninstall it,  watch Youtube.  How powerful this invention making high-tech device even my 2 year old son can able to operate it.


_________________________________________________________________________________


How to Protect USB Drive with Password

        I still remember when floppy disk is so popular during the time that computing comes out as one of the promising technology. Floppy disk is portable and  light storage device used to transport data between any computers or to any device that support it. But now USB thumb drive  has emerged like floppy disk before, it is use to read and write data between any device that has USB port. A wide variety of USB drive are now in the market and the storage capacity is increasing making it so easy to store any valuable data or files in a single portable device. But one disadvantage of  it is that it can be easily be lost because of its size and portability. So how about if you have important and confidential data that are stored in it and suddenly you lost it?


_________________________________________________________________________________
  
 Spying on You through your Webcam
                         

       Sounds creepy ? but it's TRUE. Many still didn't know yet that this is happening. You didn't even know that there is someone who is watching you over your webcam. The truth is thousands of webcam users get hack and if you didn't know " How to protect Yourself  ", maybe the chance of getting hacked is higher. So for in this topic I'll be explaining some of the best precautions and necessary steps to secure your webcam.


_________________________________________________________________________________


How to protect your " Sensitive Account " Info of getting HACKED- Phishing Method ( Part 1 )

 Online banking, Online Money Processor like Paypal etc., are widely used  now because, you can access it anytime, anywhere and with just a click you'll be able see the status of your valuable account, and even withdraw your money or transfer it to any account, with just simple click. What about if that's easy, simple click also can harm your sensitive account and with a blink of an eye, your hard earned money will be gone. Many are not still aware, Internet is just like our surroundings, there's a good guy and also a bad guy. In our home it's common to secure our house and even install security gadgets in order to protect it from the bad guys. Just like our home we must also educate ourselves and install security measures in order for us to protect our " sensitive account information " when browsing the Internet and dealing with transaction online.   
Image Source : www.searchenginegenie.com 
Read More


_________________________________________________________________________________


 How to protect your " Sensitive Account "   Info of getting HACKED - Phishing Method ( Part 2 )

  In my previous post, How to protect your " Sensitive Account "   Info of getting HACKED - Phishing Method ( Part 1 ), you see how black hat hackers, try to steal your sensitive account information and how they do it in a nice, well crafted, genius way. You also learned one simple idea of how to protect yourself from this fraudulent act. You also learned how phishing is disguise as a official looking copy cat site. Now I'll try to detail out and elaborate more of how this technique come to you as a bait. I'll also try to give you more information of how to fight Phishing and prevent you of being the next victim.          


_________________________________________________________________________________

 How to Check if Someone is using your Facebook account ?

    FACEBOOK, the big name in social networking, stands out to be the number 1 among the players, billions of users worldwide. And daily, thousands of new users is subscribing, making Facebook the fast or even incredibly fast growing  social network site in the world. Conceived by Mark Zuckerberg, and his fellows  as a way to connect students, now it's connecting the world and became the official  site ? to connect every families, government, schools, business and other institutions. But being a number 1 is a massive task for Facebook to protect every users specially when it comes to privacy and security. In reality thousands of Facebook account has been put into compromised making Facebook also the number 1 target of blackhat hackers.That's why Facebook is developing new way to strengthen their security in order to protect every subscriber including me. But how well you know about Facebook Security features ?


_________________________________________________________________________________



No comments:

Post a Comment