Tuesday, 20 June 2017

5 vital Android settings that save your apps, data, battery and more



No matter what you do in Android, there are five settings that everyone should know.. These vital features range from one that limits your cellular data use to a cloud backup setting that preserves your data in case bad things happen to your handset.

Note: I tested these tips on a Moto G4 plus running Android version 7.0 The settings on your phone may vary depending on the make and model of your handset.

Friday, 16 June 2017

How to Easily Extend System Partition in Windows 10

Normally while extending partition during Windows installation, we keep the storage space for System Partition at least close to 100GB. But, eventually the storage bar indicator turns red and you feel the need for more storage space on your drive. Well, you probably must be knowing that the inbuilt disk management utility in Windows 10 won’t let you extend your system drive. Even though you have enough unallocated space, the Extend Partition option will be greyed out.
Yes, you can manually extend system partition by backing up the logical drives and deleting them. And, thereafter extending system partition using the available space. But, that’s a tedious task and will take too much time. So, here I’d like to show you how you can easily extend system partition without doing any backup or deletion of logical partitions.

Wednesday, 14 June 2017

Why only passwords can't keep you safe ?

Why only passwords can't keep you safe ?
So many online accounts, so many passwords. No wonder it's tempting to turn to apps and services that promise to keep track of your passwords.But these password managers are like treasure chests for hackers. If your master password is compromised, all your accounts potentially go with it.
One such service, LastPass, says it has detected "suspicious activity." Although it says it found no evidence that individual passwords or user accounts were breached, it's advising users to change their LastPass master password.

Tuesday, 13 June 2017

How to check if Google is tracking you and how to stop it if it is.

To see if you have location history enabled, head to your Google Maps Timeline. In the belt below the map Google will tell you whether location history is on or off and let you enable or pause it. (You can also find this setting in the Personal info and privacy section on your Google account page. Scroll down to the Places you go area click the toggle switch to turn it off.)
Disabling location history, however, does not remove your past history. If you'd like to erase the locations Google has stored for you, click the gear icon in the lower-right corner of your Timeline map and choose Delete all Location History.
You can also delete your whereabouts for a single day or even a single stop of a single day. Choose a day from the menu in the upper-left corner of your Timeline map. You'll then see to the left of the map a list of your stops for that day. Click the trashcan icon at the top of the list to delete the location information for the entire day, or click the triple-dot button next to a stop and select Remove stop from day to delete just that location.

Check your phone's location settings:-

  •  For iOS users who want to disable Google's location reporting from your iPhone, you will need to disable Location Reporting from the Google search app or another Google app on your iPhone, such as Google Maps.
  • For the Google search app, tap on your profile pic in the upper-left corner to open Settings. Next, tap on Privacy, tap Location and Location Reporting and then choose Do not report. You could leave Location Reporting enabled but prevent Google from storing your history by tapping Location History from the Location screen and then choosing Do not store before tapping Done.
  •  On Google Maps, tap the hamburger button in the top left, tap Your timeline, tap the triple-dot button in the top right and tap Settings. Under Location settings, you can see if Location Services and Location History are turned on or off. From this page in settings, you can also delete all or a portion of your location history.
  • There is also a new item on the main Google Maps panel called Share location. It lets you temporarily share your location with specific contacts.
  • You can also see which apps are using location services on your iPhone by going to Settings > Privacy > Location Services.
  • For Android users, the process is streamlined. Go to Settings > Location > Google Location Reporting. For Location Reporting, tap the slider to turn it off. 

Sunday, 21 May 2017

Everything you need to know about 'biggest ransomware' offensive in history


Everything you need to know about 'biggest ransomware' offensive in history
A global cyberattack using hacking tools widely believed by researchers to have been developed by the US National Security Agency crippled the NHS, hit international shipper FedEx and infected computers in 150 countries.

More than 300,000 computers were infected while the countries most affected by WannaCry were Russia, Taiwan, Ukraine and India, according to Czech security firm Avast.

Mikko Hypponen, chief research officer at the Helsinki-based cybersecurity company F-Secure, called the attack "the biggest ransomware outbreak in history."

Friday, 19 May 2017

Windows XP hit by WannaCry ransomware? New tool discover to decrypt your infected files



French security researcher Adrien Guinet has figured out a way to decrypt files locked by the infamous WannaCry ransomware.

Windows XP wasn't vulnerable to the WannaCry worm but still could be infected with the ransomware. Now there's a tool to decrypt Windows XP machines attacked.

Saturday, 6 May 2017

Why your smartphone's fingerprint scanner isn't as secure as you might think ?

Why your smartphone's fingerprint scanner isn't as secure as you might think ?
Smartphone fingerprint scanners are less secure than we are led to believe, according to researchers who have developed “master fingerprints” capable of tricking the sensors.

The researchers were able to bypass fingerprint readers, which are used to unlock phones, log in to apps and make payments, using fake fingerprints created by using patterns found across many real prints.

The findings from New York University and Michigan State University call into question the security of the widely-used technology. The researchers were able to create a set of “master prints that could fool a scanner up to 65 per cent of the time.

Thursday, 20 April 2017

The 7 Types of Computer Viruses & What they do

The 7 Types of Computer Viruses & What they do
Just like human viruses, computer viruses come in many forms and can affect your machine in different ways. Obviously, your computer isn’t going to spend a week in bed and need a course of antibiotics, but a severe infection can wreak havoc on your system. They can delete your files, steal your data, and easily spread to other devices on your network.

In this article, I’m going to introduce you to seven of the most common computer viruses. I’ve excluded Trojan horses and worms; although they might display similar symptoms to a virus, they are technically not the same thing.

Tuesday, 18 April 2017

Don't Sit Idle while you connect to your Wifi ..Use your Precious Moments With the help of 'WAITSUITE'



In today's scenario workload is increasing at a tremendous rate  and patience is decreasing .So in such a time of hurry no one likes to waste their Precious seconds and this app will not let you sit Idle while your connections are being established and thus  productively use our time. Even in this high-speed world of 5G wireless and "instant" messaging, there are countless moments throughout the day when we're waiting for messages, whatsapp ticks,texts and similar things to get delivered from one end to another. But our frustrations and decreasing patience levels  while waiting a few extra seconds for our emails to push through doesn't always mean that we must sit idle.

Sunday, 16 April 2017

Is it safe to use a password manager ?

The common refrain whenever there is a headline data breach involving the theft of personal information is that affected users should change their passwords, making sure they are a "strong" mix of unique numbers, letters and symbols. 

Given the extensive number of online accounts the majority of people have, from social media to online banking to grocery shopping, it would be a herculean task to remember a different password for each one.

For this reason, security experts encourage people to use password managers, which can generate, store and automatically fill out passwords for users across all their online accounts.