Posts

Showing posts from September, 2017

Not Getting Hacked Is Simple

Let's keep our precious devices secure! Hackers using stolen iCloud credentials have been able to use Apple’s Find My Device features to remotely lock down Macs and iPhones. They demand Bitcoin ransoms from theusers. NO, it is not Apple getting hacked. It is just a person desperate to earn money trying different combinations (Brute Force Attack) to get into your iCloud. My Advise? Do not reuse passwords. Keep separate passwords for each account. Simply use different passwords for different services. As long as you don’t reuse passwords, and your iCloud login is distinct from any of your username and password combo that may have been affected by a recent hack, you are safe.  Hackers won't have the ability to sign into your iCloud account and impair your Mac or iPhone. The problem: HOW SHOULD I REMEMBER SO MANY PASSWORDS? Well, there are various options.  1. Save them in an Excel file. 2. Use a password manager software. (I per

DIY You Own Amazon Echo

Image
Hello, readers. First of all, a BIG thank you for the tremendous response on my previous post about why you should not pay for an antivirus. If you missed it, click here to read.  I got many requests after reading the How To Make Your Computer Talk Like JARVIS  post to write up a similar DIY project for Raspberry Pi. So here it is! The Amazon Echo is useful to have around the home. It can play podcasts, take reminders and notes, tell you the length of your commute, even control other appliances in your house. But at prices ranging from $50 to $150, it’s an expensive proposition if you’re not sure you’ll use it. Good news though, you can make a fully-functional one using a Raspberry Pi. What exactly is different about this version? First off, the end result is basically the same: you can activate your DIY Echo by saying the wake word “Alexa,” and the device works just like a real Echo. The installation process here is different though. Instead of using A

You Don't Have To Pay To Be Infected

Image
As a general IT consumer having various expensive electronics, you decide to keep them safe from malware and viruses. So, just like everyone else, you decide to look up "the best antivirus" to pay for and be safe. The '90s are gone and you could just be wasting or in simple terms, unnecessarily spending for the "protection". This does not mean there is no need to be worried about the infected and malicious software. They are plenty. For example, September 18, the facts about hackers having piggybacked malware onto one of the widely used tools, that was  designed to optimize system performance on Windows PCs and Android mobile device known as CCleaner —  According to Piriform, around 2.27 million users might have installed the infected version of the CCleaner software, a spokesperson told TechCrunch .  The next thing you know, everybody is rushing out to buy a good (expensive) antivirus. There are various antivirus services that offer genuine tools that can