Posts

Showing posts with the label How to

Know if your PC is infected with Viruses, Trojans or other Malware

Image
The reason why most computer malware are so deadly is because many users fail to recognize whether they have been infected or not. Had they detected the infection at an earlier stage, the damage caused could have been greatly reduced. As each virus is programmed differently, it becomes difficult to identify a virus outbreak. However, there are some general symptoms that make it easy to detect an infected computer. Here are some of them:- 1) Programs won't start or crash suddenly: If some system programs like the task manager or registry editor have suddenly stopped working or crash randomly without any visible reason, it is more than likely that your computer has got some form of worm that is attaching itself to various programs and thus, corrupting their code. A virus modifying registry entries to prevent these programs from running could also cause this. 2) Unusual Network Traffic: If even after closing your browser and other applications that may use the internet, you see th...

6 Ways To Spot Fake Reviews Online

Image
Seventy-nine percent of purchase decisions are influenced by online reviews – so it’s easy to see why businesses are so concerned about their reviews, and why some companies are willing to pay to get good ones. You don’t want biased reviews clouding your judgment, so here are six ways you can spot (and avoid) fake reviews with ease. 1) Check the Name The reviewer’s name can reveal a lot. If it’s more like a screen name than a real person, like Harvey88 rather than Harvey, consider it suspicious. If you happen to notice that the name is also very similar to the name of an important person in the company or to the name of the product itself, beware. 2) Check the Time If you see several good reviews in a row, check their timestamps. If the reviews were written very close together, especially within minutes of each other or in the same hour, they may have been written by the same person. It may also be a sign of fakeness if you see lot of reviews written at...

How to Deal with Unwanted Phone Calls

Image
Did you know that the most unused feature on a smartphone is the phone itself? We just don’t call each other the way we used to. Instead we text, email, or Facebook to get in touch. This is the reason your phone doesn’t ring very often. When it does, you usually know who is calling you thanks to caller ID. Caller ID allows you to screen every phone call and only answer when you want to talk. If you don’t, you can ignore the call and return it when it’s more convenient to you. But what if just ignoring the call isn’t an option? Or what if you don’t know who is calling and you answer the phone only to find out that it’s someone you really don’t want to talk to? Here are some tips on how you can deal with unwanted phone calls. We all know what it’s like to have a telephone conversation with someone who just won’t shut up. We make polite comments of agreement like, “Mmhmm,” and “I see,” but we aren’t...

How To: Increase A Laptop's Battery Life

Image
When you’re constantly on the move and rely on your laptop to perform when you most need it, you need to be sure that your battery won’t suddenly drain on you, leaving you in the lurch. If this sounds like a situation that you frequently find yourself in, perhaps you should look at upgrading to a laptop battery with a longer life. But if that step sounds a bit drastic, there may be a few things that you can do to prolong your battery’s power, when you don’t have access to a mains supply. Turn down the brightness of your screen Most modern laptops allow you to control the brightness of the screen. As you might expect, the brighter the screen, the more power is required. Dim the screen and you could find that your battery lasts a lot longer. Shut down programs that aren’t being used It’s often the case that you’ll have a number of programs running, yet you’re only using one or two of them. Although you might not see them running, they co...

4 Tricks to Google Analytics You Probably Don’t Use

Image
Google Analytics can be one of your best friends when it comes to managing your website and understanding how well your campaigns perform. Most people don’t look further than the number of visitors, traffic sources and bounce rate, but there’s so much more to it – and these four tips can help you leverage this free tool to learn more about the people visiting your website, and to use those insights to improve its performance. 1) Connecting with Google Webmaster Tools For accessing a set of reports under the tab “Search Engine Optimization”, you need to connect your GA with GWT. To do that, go to Traffic sources->Search Engine Optimization->Queries and click on Edit in Webmaster Tools Settings. The new reports you’ll see (Queries, Landing Pages and Geographical Summary) will help you identify things like keywords that provide a good average position but low CTR (changing meta title and description can improve the CTR), landing pages that have...

Tips to Protect Important Data against Online Attacks

Image
Whether you talk about private individual users or online business owners, both need to pay more attention to the safety and security of their data. The fact of the matter is that in the last few years, more than 350 million users have reported theft of their precious data. In such a scenario, entrepreneurs and corporate managers have to take meticulous precautions to make sure that unauthorized personnel do not access their valuable data. Security of personal and professional data is no longer an issue that can be brushed under the carpet; rather all stakeholders need to take corrective actions to put an end to this problem. Here are some handy tips in this regard: Adopt Skepticism While Assessing Intentions of Strangers The fact of the matter is that in a world where competitors will literally go to any lengths to outwit their professional rivals. So, you need to be more careful while disclosing vital personal or professional information in front of people you cannot trust. Hacking...

How to Choose Foods That Help Maintain Your Beauty

Image
A great smile, radiant hair, skin, and nails, and a slim figure can give you a sense of confidence when going out. The beauty industry sells a wide range of products that promise eternal beauty, yet nothing makes you as beautiful on the outside as feeding your inside with a healthy diet. Choose wholesome, healthy foods to help beautify your outside and make you healthier overall. 1. Drink Green tea :  study of Japanese men was done on the effect of green tea on gums. Drinking at least a cup of green tea once a day was shown to ward off gum disease. It's likely because green tea contains the antioxidant catechin, which can help reduce inflammation. Remember that green tea has caffeine, which can keep you up at night. Drink it earlier in the day if you find that's a problem for you. The more tea you drink, the more the benefits for your gums increase. However, be aware that drinking too much green tea can have side effects, too, such as causing stomach discomfort or even an i...

How to Know if a Person Truly Loves You

Image
There's no guaranteed way to know if a person truly loves you, but there are a few signs to read to figure out what is on the mind of your loved one. You'd like to know if the person you love truly loves you back, then you have to pay attention to how the person acts, what they say, and what they do when you're together. Though love may mean something different to every person, there are many ways to tell if a person truly loves you instead of just having a crush on you, liking you a lot, wanting your money, or just being momentarily infatuated with you. If you want to know if that person truly loves you, just follow these steps. 1. See if the person can truly be himself around you. Part of being love means being completely open to the other person. If you find yourself seeing a whole different side that the person doesn't show the public, then that may be love. If the man you're with is pretty serious or polite in public, but when you're alone, he shows his g...

How to become someone's guardian Angel

Image
Everybody needs a guardian angel to help them through tough times and to let them know that someone cares. Like in the song Your Guardian Angel by The Red Jumpsuit Apparatus, you don't have to have wings and a halo to be someone's guardian angel. You just need to love and care for another person, even for a person you don't really know. Step 1 First of all, you may want to remember what a guardian angel is. Simply put, it's about being someone who watches out for another person and helps them regardless of what's in it for you. It's about caring for another person because that person matters and because they need help. There are also spiritual and mystical interpretations of guardian angels but this article is focused on the practical exercise of adopting the role of someone who is prepared to watch over another person and make sure that things go right for them. If you're into music or movies, listen to the song Your Guardian Angel by The Red Jumpsuit Ap...

How To Detect An Hidden Camera In A Room (Must Read)

Image
A common sense technique When you stay in an hotel, how do you know there is no room pinhole camera? When you travel or take a business trip, and stay in a hotel or a guest house or room you could unknowingly be photographed. You can use this method to check your room: When you enter into the room, turn off the lights, and close the curtains, open your phone camera, do not turn the flash light on.Turn around the room with your cell phone. When a red dot is found, that means that a hidden web camera is installed. If no red dots, the room is ok. Please forward this message to your friends who travels alot or take business trips. Best wishes to you

Facebook Scams and How to Tackle Them

Image
Online scams are ever increasing. Almost in every phase of the online world, you will come across scams. Social networks are no exception for such malicious activity. Recently, millions of accounts from LinkedIn and eHarmony were compromised. Facebook seeing danger has updated its security and is advising its users regarding various scams and how to fight them back ‘Please send money scam’ An unknown account sends a message stating that he/she has been mugged. Descriptions of events seem accurate including real names and places. Finally, the sender requests a certain sum, which will enable him/her to return home safely. Facebook has attributed such scams as ‘Please send money scams’. The sender’s account is either fake or has been taken over by cyber criminals. On receiving ‘please send money scam’ messages, Facebook advices to report/block the account. Phishing Phishing is a common way to to hack account(s). Phishing links are sent within ...

How To Delete Yourself From the Internet: It Can Be Done!

Image
If someone has written an unfavorable comment about you and if the content pops up first when people Google search you, you will want to erase it. You may also wish to remove a post that you yourself posted on a website. As is the case with most websites, their terms and conditions deny you the right to edit your content once you post it! Such content can often come up in Google when people search for you. This can severely damage your reputation. However, a fact that you need to understand is that Google is not the source; it merely lets the content be found more easily. Google does not have the original file; it is with the website that has put up the content. So, contacting Google to remove the content will not do anything. So how to delete content once you post them online? Deleting any of your personal uploads like an article, a picture or video, an account, a website, a blog is not always easy, but it CAN be done. To delete content, you have to talk to the webmaster or whoever...

How to Detect a Phishing Email: An Example

Image
Some of my important emails end up in the Spam folder due to incorrect filtering. So, I occasionally check the Spam folder to see if an email that was not spam ended up there. Today, while checking the Spam folder, I came across an email that was a classic example of a phishing message. Hence, I decided to share it here to point out some common tactics used in such messages. Here is the email (Image at the bottom):- The phishing message. One look at the from address should be enough for anyone to judge that this message is not genuine. Messages from most companies are through a no-reply address. Also, most companies contact you from an  email address that is on their main domain, not some random free email provider. Moreover, almost all email providers use an interstitial page in the situation described in this message. None of them sends an email asking for verification. Another important thing to notice in this message is the Sent to: field. Notice how it mentions undisclosed...

Why a hard drive has less storage space than promised?

Image
It has happened to most of us. We buy a new hard drive (or maybe a flash drive) with mind boggling storage capacity only to find that it has less space than what was mentioned on the box. Angered, we start cursing the manufacturer and our dealer for false marketing thinking that they should be sued for doing this. Hey, but have you ever wondered how they continue to do this again and again without getting into legal trouble? The answer is that they are not marketing it falsely at all. Surprised? I'll explain. A manufacturer considers 1 Megabyte to be 1000 Kilobytes, 1 Gigabyte to be 1000 Megabytes, 1 Terabyte to be 1000 Gigabytes and so on. This is correct considering that kilo means 1000 and mega means 1000000 (10^6). However, computers calculate on base 2 and to them, 1 MB is actually 1024 kilobytes, 1GB is 1024MB and 1 TB is 1024GB. This difference in the method of computation is responsible for this "missing space." Lets take an example of a 500 GB hard disk. From...

Is Antivirus Useful, and How Do You Safeguard Your Device?

Image
Whether you are dealing with people or machines, viruses can seem like a real threat. Because of that, the antivirus industry, for both people and machines, is big business. Concentrating on antivirus for machines and devices, this week we asked our writers if they found antivirus software useful and how they safeguarded their devices. Our Opinions All in all, our writers mostly agree. No one seems to use it very regularly. Miguel sees antivirus software as “something that gives a slightly false sense of security.” He explains that “viruses have grown in sophistication and are often not easily removed by standard antivirus software.” As for safeguarding, he replied that he does so “with my own prudence.” Vamsi doesn’t use any antivirus on his Windows PC other than the default one that is provided by Microsoft. Yet, he does use Comodo Firewall as “it makes it easy to configure different firewall rules and even alerts me when a program is...

7 Ways To Overcome Jealousy In Relationships

Image
Most people feel a little jealous sometimes, especially when they have strong feelings of attraction and love for their partner, and a little jealousy occasionally can add zest to a relationship. But just as a spark can illuminate a room, a blaze can burn it to the ground. So what’s behind jealousy? What does jealousy in a relationship mean? At the root of jealousy lies fear of loss. Like many jealous partners, Kevin feared loss of their relationship, loss of self-respect, even loss of ‘face’ fearing how his friends would see him if he were to be ‘made a fool of’. Fear makes for feelings of insecurity. When fear lessens, so does jealousy. More than feelings of fear, jealousy also leads to a smorgasbord of other emotions such as anger, hate of love ‘rivals’, disgust (sometimes self-disgust), and hopelessness. So why might a person be jealous? Kevin’s ex-wife had cheated on him and he felt he’d never got over this. ‘Once bitt...

All Windows 10 Keyboard Shortcuts You Need To Know

Image
Here are all the Windows 10 shortcuts you need to know – Windows -> Show the Windows 10 Start Menu Windows + Tab -> Launch Windows 10 Task View Windows + Q -> Search the web and Windows with Cortana (speech) Windows + S -> Search the web and Windows with Cortana (keyboard input) Windows + I -> Open Windows 10 settings Windows + A -> Open Windows 10 notifications Windows + L -> Lock your Windows 10 device Windows + Ctrl + D -> Create new virtual desktop Windows + Ctrl + F4 -> Close current virtual desktop Windows + Ctrl + [Left][Right] -> Switch between virtual desktops Windows + [Left][Right][Up][Down] -> Position windows on your screen E.g. Windows + [Left] moves the current window to the left half of your screen. If you use Windows + [Up] afterwards, the current window will be placed in the upper left quarter of your screen. And, what’s very handy in my opinion: If you release the Windows key after positioning a window, Ta...

Quick Solutions to Infinix Hot2 & Hot Note Top Problems

Image
I've been able to deduce lots of problem and solutions from the Infinix hot2 and Infinix hot note complain thread and I discovered that the listed questions are more paramount to a newly or existing Infinix hot 2 users.  It's important to note that Android One interface is different from normal android interface therefore you do not expect the same functionality like coming with a default music player, video play, file manager etc. It's also important to note that if you don't set up your gmail on Infinix hot2, you'll only do less from that device, therefore it is compulsory you set it up. Questions ==> Infinix Hot 2  always show error whenever I try to install OTA upgrade. Sol: It always shows error, because you have rooted your device,  do this; Reload your OS using this link and SP Flashtool. The new OS is more easier and beautiful than than the stock OS. ==> For Hot note & Pro Users Having error installing OTA upgrade , do this; The problem is...

How to change imei of a Stubborn MTK device

Image
As we all know, imei tweaking is not a new thing anymore. Not i discovered that the imei some of the new mtk devices like tecno j7 nd some new lenovo devies and others just to mention few will not change even after showing command sent on yr Mobile uncle tool. So i am gonna share how to change the imei of these phones without any problem. 1. First of all you will need to root yr phone, just get d latest version of kingroot or framaroot, it will do that for you. 2. After doing that get a another mtk device like tecno p5 or m3 that the imei can be easily changed. Should also b rooted. 3. Install Mobile uncle tool in this phone, say tecno p5 den change its imei which i believe everyone viewing this can do because its not new. 4. After changing d imei of d tecno p5, just go back on your Mobile uncle tool and select imei backup restore. Select it and click on backup imei to sd card. It will show you a command that the imei has been backed up. 5. Then go to the root folder in the sd ca...