Computer Physical Cleaning

Dust may affect the performance of your computer as it accumulates over time. Cleaning it may prevent your computer from slowing down, overheating and damage to your computer’s component especially the motherboard

Things you’ll need before you clean your computer; gloves, mask, canned air, microfiber cloth / any similar substitute, soft brush, screw driver& vacuum

Make sure that your computer is off and the power cord is unplugged.

All wires connected (keyboard wire, vga/hdmi/dvi wire, mouse, speaker, webcam & etc) must be disconnected. Continue reading Computer Physical Cleaning

Your Wi-Fi, how secure

buffalo router

A Wi-Fi allows data exchange or connect to the internet on a local area wireless technology using radio frequencies, 2.4 GHz UHF and 5 GHz SHF to any wireless capable electronic devices.

Devices like video-game consoles, personal computers, tablets, smart phones, digital audio players and some digital cameras connecting through a wireless network access point.

A wireless Access Point (AP) is a device connected to a router (wired network) as a stand alone device or a router with wireless capabilities that allows these wireless devices to connect to resources such as the internet or local computer network (peer to peer).

A wireless router is a device with the same functions of a router but it also has functions of a wireless access point. It is used to provide internet access.  It can function as a Local Are Network (LAN), Wireless-only Local Area Network (WLAN) or mixed wired/wireless network, depending on the brand. Continue reading Your Wi-Fi, how secure

Strong Password Protection

I have met some friends and some people who complained that their online account/s had been hacked.

How did this happen?

While passwords are a vital component of an account or system security, they can be cracked or broken relatively easily. Cyber criminals will try figuring or breaking passwords in order to gain unauthorized entrance to a system or a personal account. Passwords can be cracked in a variety of different ways. The most simple is the use of a word list or dictionary program to break the password by brute force.

For many people like us, the internet is a part of our daily activities. We use the internet in watching news, videos, listen to the music, use as references for homework, maps & commonly use when looking for a job, sharing thoughts and pictures on social media, and more importantly an easy way of doing online financial transactions like banking. Most of these activities require our personal information inputs which make us vulnerable to identity theft if the password being created is weak. When you create a weak password, it will be easy for cyber criminals to steal your passwords and thus may lead to cyber identity theft.

Why is it important to know about identity theft? Identity theft happens when someone steals your personal information and uses it without your permission. It’s a serious crime that can wreak havoc with your finances, credit history, and reputation — and can take time, money, and patience to resolve. Continue reading Strong Password Protection

"A gift of knowledge, a gift we humbly share"