Twitter Facebook Delicious Digg Stumbleupon Favorites More
                      
Showing posts with label Internet Tips. Show all posts
Showing posts with label Internet Tips. Show all posts

Tuesday, August 9, 2016

What are the Reasons for Wi-Fi is slow and how to fix it...

If your WiFi at home is really slow all of a sudden, then there’s a problem somewhere that you can most likely fix yourself. Here’s how to fix slow WiFi.We discussed earlier how you can deal with a slow WiFi connection that you can’t exactly fix, but what if your internet at home is experiencing performance problems? You can usually fix that since you have access to the router.


There are many reasons why your internet connection might be slow. Perhaps another user in the house is streaming Netflix or your router is clogged up a bit and just needs a simple reboot. There’s even the chance that your internet service provider could be experiencing problems of their own, in which case you’re pretty much out of luck. No matter the cause, slow WiFi can be more frustrating than not having WiFi at all.


With slow WiFi, loading websites can take forever, YouTube videos will lag and freeze, and forget about streaming any media. Slow WiFi is something that you never want to come across, especially if you’re working on something important or timely.


1. Internet thieves

One of the best things about Wi-Fi is the easy access it provides to the internet. But, if your network password is too simple, there could be more people tapping into it than you originally bargained for.Obviously, this isn’t something you want. Networks with weak passwords or no passwords can be accessed by almost anyone. Use a free program called Wi-Fi History View to review each device that has connected to your network, and look for IP addresses you don’t recognize.


Prevent this by first changing the password for your router. If you don’t know where to find it, a site called RouterPasswords can help you locate the manufacturer’s default password. From there, create a password that is complex and difficult to guess. Click here to see a simple formula for creating secure passwords you can actually remember.

2. Congestion

This is a problem in crowded neighborhoods or apartments. When too many people try to connect at the same time on the same Wi-Fi channel, connection speed is significantly impacted.
When your connection slows during peak hours, usually in the evening when everyone gets off work or on Sunday night when The Walking Dead is airing, that’s a sure sign of congestion.

Fix this by selecting a different channel for your router. If you have a 2.4 gigahertz frequency router, there are usually 11 channels to choose from. Channels 1, 6 and 11 are recommended but try other channels to find a faster connection. Or buy a new 5 gigahertz router.

3. Outdated equipment

Wi-Fi routers are not all created equal. “AC” routers are a step up from the older “B” and “G” models and even "N" models. They have more features and offer better performance. If you’re shopping for a new router, that’s what you want to look for.
AC routers have a maximum spectral bandwidth of around 8 x 160MHz, compared to the 4 x 40MHz standard of N routers. In other words, the increased bandwidth allows more data to be transmitted without slowing down.

4. Your router’s security settings

Aside from protecting your network from unauthorized bandwidth usage, which could slow down your network without your knowledge, did you know that the type of wireless security you use could impact your overall speeds too?
If your network is Open (no security) or is using WEP, change the security setting immediately! Obviously, an open network will make it easy for someone to steal your Wi-Fi, and the older WEP security is easily hacked, so avoid it at all costs.


Also See: Steps to Maximize your Wireless Network Security


This leaves you with WPA, WPA2 with TKIP or WPA2 with AES.
WPA and TKIP are what you want to avoid. Not only are these protocols older and insecure, they can actually slow down your network.
The best option is WPA2 with AES. AES is a newer and more secure setting that lets you achieve higher speeds. Click here for additional tweaks you can make to get more out of your router.

5. You’re too far out of range

Sometimes the easiest fixes are right there under our noses. Routers are not designed to transmit signals over long distances, so there may be hot spots and dead zones in your home.
To map out your network, use a tool called HeatMapper. It helps you see where Wi-Fi signals are strongest in your home or office. HeatMapper is a free download for Windows users. NetSpot is a good alternative for Mac users.

Once you’ve identified the problem areas in your home, you have a few options available. One option is to purchase a Wi-Fi extender that can boost the range of your router’s transmission. Wi-Fi extenders range in price from around $20-$120, depending on the features included in the model. However, a mid-range extender should work just fine. Click here for a full breakdown of Wi-Fi extender options.

Share:

Avoiding Identity Theft Online and Being Kept Safe

If you often receive e mails or messages that seem like blackmails and the person who sends them seems to know you really well, do not try to find who he is; you have probably been a victim of identity theftonline. If you search on the web, you will definitely find people who are facing the same problem as yours.

The first time when this phenomenon appeared happened pretty sure when Internet came into our lives. In fact, stealing a person’s identity can also be the case in actual life; however, things in this case can be made right much easier than when online theft occurs.
If you take a moment to think, you will find out that keeping your identity in your pocket or inside a wallet or a handbag is a way for you to protect your personal information. But what happens when your online identity is stolen from a third party and when he performs purchases or he even uses your social media profile? Things can turn really bad when something like that happens, but there are many ways that you can use in order to be fully protected against identity theft online.
What to Do with Untrusted Emails and Attachments
Nowadays, everyone (even a small kid) knows that when an email comes from an untrusted source, it is sure that it must never be opened. In fact, most of the times it automatically goes to the spam files. On the other hand, in case you expect an email from someone that is not part of your contacts but you are not sure about it, there is a tested way that you can use.

Also Read:Secure Your Accounts Against Cybercrime


Do not wonder which this way is, because it is nothing else than scanning before you download. If you do not do so, it is sure that if it contains a virus it is possible to enter your personal information and steal all of your data. Apart from this way, you could also spend some time checking the sender’s address.
Surf the Web with Safety
It is not unnecessary to mention that when you decide to surf the web, you should do it wisely and when someone says wisely, he means that you must not enter any web site that you find, because a virus might be hiding there. When a virus hides you know that the end will be awful. So, every time you want to browse yourself to a web site, it is better to type https before the address that you want to visit.
Forms and Strong Passwords
If it happens to perform a purchase on the web or even if you need to fill a form online, you need to be really careful with it. You need to pay special attention to the date that you write and you need to be extra careful to where you give them to.
Sometimes, it is crucial, in order to become a member of a site or if you want to perform a purchase, to register there. In some cases you may find it really boring to come up with a password, but you need to know that the stronger your password is, the more difficult it is for someone to steal any kind of personal information of yours. So, make an effort to create a password that is strong and that is not possible for someone to guess.
CV’s
If you are unemployed and/or you are looking for a job online, you must not give or publish your CV anywhere without giving it the appropriate thought. Before you publish your CV somewhere, be sure that you have read the terms, the conditions and the privacy policies and if they seem trustworthy put your CV there.
About Anti-Virus
Last but not least, it is really crucial for you to use anti-virus for your computer. Download an anti-virus that is trusted or buy one, but be sure that you are going to update it often. It is certainly the safest way to be protected from viruses and of course to protect your personal data, photos, videos or files from anyone who ca
Share:

How To Protect Your Smart TV From Hackers: Here Are Some Tips?

Hackers usually target smartphones and computers, and manufacturers have been vigilant in releasing security patches to prevent unsolicited breaches.


With the advent of the Internet of Things and Smart Home technology however, more and more entry points are opening up to malicious invaders on the Web. One of these is the Smart TV.

According to the Consumer Technology Association (CTA), about 46 percent of U.S. households are using Smart TV sets, and that figure is expected to increase beyond 50 percent by the end of the year. The CTA predicts that about 70 percent of TVs sold this year will have internet connectivity.


Also Read: Steps to Maximize your Wireless Network Security


Attacks are made possible through the device’s ability to run source codes for applications and its unsecured connection to the internet. Moreover, since most attacks have been concentrated around smartphones and computers, most security options are limited to these, leaving other internet-capable devices – like Smart TVs – neglected. This is a welcome invitation that hackers will definitely take advantage of.

Personal information like passwords and credit card information can then be easily stolen, and viewing habits taken advantage of. Apparently, not all hackers have the same malicious intent – some of these can be the companies you’re buying products from who use your personal information for advertising purposes.

In most cases, these data-mining techniques are hidden from the user and are reportedly secluded under the guise of the product’s features. Some examples are Vizio’s Smart Interactivity, LG’s Smart Ad and Samsung’s voice recognition software.

Fortunately, there are preventive measures users can implement to stay on top of their personal security. Here are some of them:

• Keep your device’s firmware updated and install the latest patches from developers as soon as these become available.

• Always check the manual, features and settings for any option that may be another term for data-mining.

• Do not perform bank-related activities on your Smart TV. Use a secure smartphone or computer instead.

• Download Android security apps on your Android-based TV because these can be run by the smart appliance.

• Perform malware scans on a regular basis to keep off harmful threats.

• Set up separate networks for your Smart TV and personal gadgets to keep intruders from easily accessing your devices.

• Cover the camera when not in use to avoid any unwelcome viewing from third parties.

• Do not hastily click on messages that display on screen unless these are from a reliable and trusted source. Better yet, avoid accepting any at all.

• Be as cautious as you would be on a personal computer when visiting sites on the Smart TV.

• Only stick to personal viewing entertainment on the TV while keeping other activities, like social media browsing, on secured gadgets.

• Disconnect from the internet when the Smart TV is not in use.

• When in doubt, ask the manufacturer for clarifications and even helpful ways that can prevent security breaches through the Smart TV.


The steps listed here do not guarantee a full protection 24/7 but should at least be effective in keeping attackers at bay. As always, staying vigilant and on top of your security protocols is the best way to avoid any vulnerabilities. 

Even better, sticking to a traditional offline TV would be safer until companies up their game in terms of providing security support for Smart TVs.
Share:

Monday, August 8, 2016

Gmail Shortcuts To Save Work Time.

Gmail has become the most popular email service provider. It provides 15 GB of storage, controls less spam (having spam filtering capabilities), and is available on the mobile device. Gmail makes working with e-mails an effortless and pleasant experience.
There are many Gmail shortcuts which most of us hardly use, but if we use them, it can make the Google Mail experience better. Here are the ones I find really effective.

1. Keyboard shortcuts

These work on the fundamental rule – “working with the keyboard is always faster than working with mouse”.
For using these shortcuts one has to turn the Keyboard Shortcuts Option ON, available in Gmail settings.
Numerous shortcuts are available. Let’s have a look at a few:
ShortcutsExecution
cComposing a new mail
eArchiving mails
rReplying
fForwarding
shift + uMarking emails as unread
shift + iMarking all the selected mails as read
*nDeselecting all emails
j/kMoving to new or older emails
lLabelling
g aGo to all mail
g dGo to drafts
g iGo to inbox
[enter]Go into the thread pointed to by the cursor
xSelect/deselect the current thread pointed to by the cursor

2. Search operation shortcuts for easy and faster searching

Gmail supports refined searches making search process fast and precise. A few tricks can help you search for almost anything (mails, attachments, drafts etc.)
from : [e-mail of the sender] – will get you a list of all emails from that particular sender.
filename : pdf – it helps to find emails with pdf attachments
has : [attachment] – it gets you an email with a particular attachment
is : unread – it gets a list of all the emails marked as unread
larger : [size of email] – it finds all the emails that are larger than the size stated
“[text]” – it finds the emails with text that match exactly the stated text
after : [date] – it finds the emails sent or received after the particular date.
The above stated search operators, when combined together, works wonderfully to make your search more specific, for instance,
from : [e-mail of the sender] larger : [size of email] – finds all the emails from that particular sender with a size larger than specified.
“[text]” after : [date] – it finds the emails with text that match exactly the stated text sent / received after the particular date.

3. Adding signatures

Gmail provides with the option of adding a signature automatically to all the outgoing mails. It thus helps saving time consumed in adding a signature to each mail individually.
One can add a signature by going to Settings > General and scroll down the Signature section. A formatting window will appear with tools for formatting signature. Signature can be created with images, links, bullets, etc.
Tip – Though HTML codes cannot be used as signature, but one can copy- paste HTML content directly in the Gmail Signature area provided and it will be automatically appended at the end of all the outgoing messages.

4. Right-click menu box

When one right-clicks on a message in the inbox, a drop down menu appears. One can archive, delete, or mark a message as read/unread.

5. Canned responses option

The “canned responses” feature available on Gmail gives the option of saving e-mail templates, thus saving our time of composing the same message again.
One has to go to Settings > Labs and enable “Canned Responses” and the messages can be saved as a template. Gmail provides the option of overwriting these saved templates. The saved template can be inserted into a new compose email window with one-click.

6. Preview Pane option

This feature of Gmail allows you to read all your messages in a new preview pane. One does not have to open message to read its content which helps in saving a lot of time. This feature is extremely useful for the users working on large screen. With small screen available reading space becomes small making it a little difficult to read the text.
One has to go to Settings > Labs and enable “Preview Pane” and a new button will appear to change the layout of the inbox, allowing to split the inbox horizontally / vertically.

7. Quick links

As the name suggests, it helps to get to links in just a few clicks. Quick links add a new widget in the inbox providing one-click access to any Gmail URL.
One has to go to Settings > Labs and enable “Quick links”. A new box will get added to the left sidebar and you can add any Gmail URL (specific message, advanced search result, label, etc.) as quick links.

8. Setting default reply to all

If one has to send a reply to all the e-mail address available, he / she should immediately change setting to “Reply to all”. It prevents you from selecting each recipient manually, one by one. And you do not miss any of them.
One has to go to Settings > General and scroll down to “Default reply behavior” section to enable “Reply all”. Gmail will make it a point that “Reply to all” option is automatically selected when one tries to reply message to multiple recipients.

9. Selecting all email in a label/page

One can select all the emails under a label/page with one click (you do not have to select them one by one manually). Selecting the checkbox at the top will help you select all the emails on that page.

10. Switching multiple Gmail accounts

Often working and switching to multiple accounts is time taking. One has to log out from one account and login to the other. Gmail provides a shortcut to this.
If one has multiple Gmail accounts, switching to another account can be done directly, without logging out of the current account. One has to click profile picture at the top right corner and click “Add Account” button to login to another Gmail account.
The Gmail inbox URLs for your accounts will look like as below:
https://mail.google.com/mail/u/0/#inbox
https://mail.google.com/mail/u/1/#inbox
https://mail.google.com/mail/u/2/#inbox

11. Undo a sent email

It does happen that after clicking the send option, you realize that you need to make some changes in the email / the mail was not to be sent. Gmail provides you with the option of “undo” the mail sent.
One has to go to Settings > General and enable “Undo Send”. An option is available providing the option of up to 30 seconds to undo the last sent mail. One can also adjust the cancellation period from Settings > General.
Share:

Top Ways People End Up Getting Hacked and how to stay safe ?

In this day and age, internet users are under constant threats from hackers and cybercriminals. Additionally, said users know very little of the precautions that need to be taken in order to protect themselves. As difficult as it may sound, it is really entirely impossible and extremely simple for internet users to protect their presence online, and it can be made simpler if one is aware of the most common ways people end up getting hacked. Keeping this in mind, here are the top 5 ways that hackers mostly resort to in order to victimize internet users.

1. Brute Force Attack

It is important to note that cracking a password as simple as '12345' can take no more than a second, so it really does not come as a surprise at all that hackers rely on brute force attacks to get access to confidential information and files. Seeing how people, including Mark Zuckerberg, tend to use simple passwords,hacking becomes a breeze that is unless users start using stronger passwords and avoiding using them over and over again while creating new accounts.

2. Password Reuse Attacks

As mentioned earlier, using simple passwords can put users at great risk – Mark Zuckerberg – co-founder and chairman of Facebook too made the same mistake which resulted in several of his accounts being compromised in the process. If he had used several different passwords, the problem would not have been so difficult to deal with in the first place. Since most users tend to make the very same mistake, hackers find it to be one of the most effective ways to compromise several different accounts of the same user.
To avoid this problem, it is necessary for users to create strong and unique passwords for each account. Additionally, if they find it difficult to remember these passwords, they should utilize a password manager rather than make things incredibly easy for hackers and cybercriminals.

3. Social Engineering

Social engineering includes several techniques like whaling, vishing, phishing, spear phishing and privilege misuse. The method is used to trick users into giving out confidential information. This could be in the form of an email from a service provider or even a colleague, which makes it all the more legitimate for users to let their guard down thus giving hackers and cybercriminals the edge they need to achieve their goals.

4. Malware

Another common way people end up getting hacked is by involuntarily downloading malware programs. These programs are usually transmitted via email attachments, emails that link to other pages and websites that offer free downloads. To prevent this from happening, users need to make sure their emails are originating from a reliable source. Moreover, they should also stay clear from unknown and unreliable sites.

5. Physical Theft

A lot of people tend to make the terrible mistake of noting down their credentials on post-it notes or in their diaries/journals. Even though the method is not necessarily a high-tech hack, it still counts seeing how many people end up losing their information through physical theft.

6.Phishing scams

Lucky you! A Nigerian prince has selected you to help smuggle millions out of his country. For a little bit of effort — a few simple wire transfers — you'll get a substantial cut. What could be easier?
bet you're asking yourself, "Who would fall for that?" Well, tens of thousands of people do every year. That's why Nigerian scams, known as 419 scams, are still very popular.

Also See: How to protect your phone and avoid being hacked


Other versions might say you won a contest or have a job offer. Maybe someone wants to meet you, or you can make money for shipping some goods.

The catch is that you have to send in personal or banking information, or pay a fee. Of course, your information and money is going straight to hackers.
Use common sense before reacting to any e-mail. Scams rely on making you act quickly. If you think about things long enough, you can usually see through them. Just remember the old saying, "If it looks too good to be true … "

7. Trojan horse

Many hackers want to slip a virus on your computer. Once installed, a virus can record everything you type and send it back to the hacker. It can send out spam e-mail or attack other computers.
To do this, the hackers disguise the virus as something harmless. This is called a Trojan horse, or just Trojan.
One of the most popular ways to deliver a Trojan is a variation of the phishing e-mail scams.

For example, the e-mail might say it's from a shipping service, bank or other reputable company. There's been a problem with a transaction! To learn more, you have to open an e-mail attachment.

The attachment might look like a normal file, but it really contains a Trojan. Clicking on the file installs it before you can do anything.


See Also: Steps to Maximize your Wireless Network Security


Similar scams appear on Facebook and Twitter. You think you're going to watch a funny video your friend posted. Instead, a popup tells you to update your video player. The "update" file it provides is really a Trojan.
The key to defeat this tactic, as with phishing e-mails, is common sense. However, up-to-date security software is essential as well. It should detect and stop most Trojans before they can install.

8. Drive-by downloads

Security software is good, but it isn't always enough. Programs on your computer might have weaknesses that hackers can use to bypass security software.
To take advantage of these weaknesses, hackers set up websites embedded with viruses. You might get there by clicking a malicious link in a phishing e-mail or on social media. You can even find these sites in a search for popular programs or topics.

It isn't just malicious sites, though. Hackers can sneak malicious code on to legitimate websites. The code scans your computers for security holes. If it finds one, a virus can download and install without you doing anything.

To stay safe, you have to keep your programs up-to-date. Every month, Microsoft releases updates for Windows and Internet Explorer. These updates close critical security holes that hackers exploit.
Other critical programs to patch are Adobe's Flash and Reader, and Oracle's Java. Using old versions of these programs is like sending hackers an engraved invitation.

You should also be using the latest version of your programs. Anyone using Internet Explorer 6, 7 or 8 needs to update or switch browsers immediately.

9. Bypassing passwords

Hackers are masters of guessing account passwords. In the real world, however, very few hackers bother.
Instead, they go around passwords. They might get your password from a data breach at a company or website you use.

It's important that you use a different password for every account. That way, if a hacker discovers one, they can't get in to every account.
Perhaps the hacker slipped a virus on to your system. It records your passwords and sends them to the hacker; no guessing needed.
As mentioned above, you can stop viruses with up-to-date security software and programs.

A hacker might tackle your account's security question. Most security questions can be answered with information people post publicly.

You should change how you answer security questions. Give a random answer that has nothing to do with the question. That way, no one can guess it.

10. Using open Wi-Fi

sure you have a Wi-Fi network at home. Is it encrypted? If you don't know the answer, then it's probably, "no."
That means hackers, and neighbors, can connect to your network from outside. They can see and record everything you do. They can surf to bad websites and download illegal files on your connection. You might be getting a visit from the police.

You need to take a few minutes and secure your network. Trust me; it's worth it. The instructions will be in your Wi-Fi router's manual.


That being said, now that you know of the top 5 ways people end up getting hacked, you will be able to better protect yourself. Furthermore, you can also ensure you do not end up making similar mistakes. But then again, if you are not sure where to start and how to simplify the process of protecting yourself online, you can start by taking advantage of what PureVPN has to offer. Not only will you be able to enhance your online security and anonymity, but you can make sure nobody monitors or tracks your online traffic.
Share:

Security tips for Web Bloggers to stay protect online

Nowadays, people access blogs for exchanging ideas with others. Bloggers retain their blogs and constantly update them either for financial benefits of just out of passion.

Worldwide Blogging is considered as a serious business by many people as for some it is the main source of income, while other bloggers just get some extra income out of it. Keeping this in mind and also the fact that blogs are considered being the 5th most trustworthy source of information that you can find on the internet, if you own a blog you should definitely consider any available options for protecting it.

Malware infection on blogsMalware infection is a common “harm” that can be caused to your blog, believe it or not, as cyber criminals are very creative in doing their malicious work. Some sources of infection for your blog can be:

  • Your web hosting control panel
  • Infected advertisement banners
  • Breaking the administrator password
  • Code injections in the blog’s HTML
  • Plugins integrating with your blogging platform

Checking whether your blog is infectedWhen you created your blog, you may had thought that marketing and writing skills are all you needed to have. Well that would be wrong. A blog owner needs to know how to keep the blog data protected and which measures to take for staying protected against cyber-attacks. You can define whether your blog is infected by the presence of these symptoms:

  • The appearance of your blog has changed and your content and graphics replaced by others (website defacement).
  • Your blog’s visitors are prompted to download and install apps like Java or Flash player just upon their visit to the blog’s page.
  • You receive an error message when you try to access the blog.
  • You see banners about guns, drugs etc. appearing.
  • Immediately when you try to access the blog you get redirected to another site (URL redirects).
  • You receive notifications from your hosting providers about spam alerts coming from your site.
Here are 7 important tips for keeping your blog secure

1) Set strong passwords
Any accounts that are connected to your blog should have a strong password while you should avoid using the same password (despite its complexity) for all your accounts and apply 2 factor authentication. All the above should be combined with frequent password changes.

2) Control access to the blogYou should create a new administrator account and delete the existing default one as the cyber criminals tend to target these accounts. You also need to define the access rights for all the user accounts and delete those that belong to users to post irrelevant content.

3) Maintain an updated blogging platformBe sure to immediately apply any updates that are released for your platform as these will also close any recently discovered security holes.

4) Regularly backup your blogYour blog’s database needs to be regularly backed-up, so be sure to include this in your schedule. This can be done either with the use of a web hosting package (which includes automatic back-ups) or can be performed manually. At least 2 copies of the blog’s database should be retained.

5) Update your pluginsAlways keep your plugins updated as cyber criminals will use the vulnerabilities that exist for harming your blog and also delete any old plugins that you don’t use anymore.

6) Use only themes from trusted sourcesIf you plan to install a theme that was not obtained from a trusted source, just don’t as you risk of having malicious code installed on your website.

7) Protect your computer from malwareWhile ensuring your blog’s security is important, retaining a clean and safe computer, equipped with a good antivirus and a malware blocking tool is important too and of course always keeping it up to date by installing the latest application and security updates.

Share:

Search This Blog

Popular Posts

Blogger Tutorials

Sample Text

Copyright © Cebause | Powered by Blogger
Design by SimpleWpThemes | Blogger Theme by NewBloggerThemes.com