This section of my blogs examines some of the ways by which you can secure your device from the prying eye of hackers as well as steps to follow in order to ensure that you work safely on the internet.

 

 

How to secure your password with Keypass Portable Security

Keypass portable security is a password manager that manages passwords in a secure way and carries all passwords in one database, which is locked with one master key or a key disk key. That means all passwords that you have on your device are saved in one sign place in …
Read More »

How to raise the User Account Control Slide bar in Windows

The User Account Control setting slide bar is a tool that helps the Windows user to make critical decision while installing software. It helps you to decide on which features will be available for the software that you are trying to install. How to set up User Account Control…. ·       …
Read More »

How to Hide files and folders in Windows

There are many times that you have intruders that come to your system and copy files that you will not want them to copy. As an I.T Instructor, I do that a lot. I have a boss that I always copy videos from his Laptop. I got most of my …
Read More »

How to disable file sharing in Windows

disable file sharingSequel to what I have discussed in my previous article, telling you about how you can hide file and folders in Windows. I now want to talk about how you can disable file sharing in Windows so that no one will be able to sharing any file or folder from …
Read More »

How to discover open ports using Netstat in Windows

Have you ever find out what Hackers are trying to do when they keep on attacking your network? They are trying to open ports so that they can use that as an avenue to attack your device. One of the ways of keeping Hackers at bay is to discover open …
Read More »

How to configure Audit Policy for Windows

I believe many of us have worked in organizations and the meaning of the word Auditor is not that strange to us. I know them as professionals that cross check records in order to be sure that there are no loss. They want to be sure that processes are going …
Read More »

Six common terms to know in device security

device securityThere are some basic terms that you should know if you are really serious about the device security. This has to do with security  of your information and devices. I do not want you to be a novice that is why I will be introducing these terminologies which will serve …
Read More »

How to crack an unknown password for devices

passwordIn this article, I want to talk about the different ways that a Hacker or Intruder can use to crack your password. I want to tell you that there is no security that cannot be breached but it should take some ample time before a Hacker or Cracker can breach …
Read More »

How malicious software can spread itself

malicious software  In this series, which will take about three articles to cover, I will look at the different ways that malicious softwares can use to spread itself. This article becomes necessary so that you will be very careful not to infect your device with softwares that are capable of causing …
Read More »

Five benefits of computer security awareness

In my previous articles, I have talked about four basic things that makes a system secure. In this article, I want to look at the benefits of computer security awareness to any organization. Follow me as we look at this together. #1: MINIMIZING ATTACKS One of the benefits of computer …
Read More »

How malware propagate itself to users systems

malwareIn my previous article, I have talked about some of the ways that malicious software can use to spread itself from one device to another. I have also told you that when you are connected to the internet, you are connected to “Network of networks”. If care is not taken, …
Read More »

Four basic things you need to secure as a system user

system userAccording to Whatis,  a system is a collection of elements or components that are organised for a common purpose. It is a well known fact that a computer system consist of many parts such as hardware and software that are brought together in order to provide a useful customer experience. …
Read More »

What you need to know about a malware

malwareAccording to Kaspersky, Malware, short for “malicious software,” refers to a type of computer program designed to infect a legitimate user’s computer and inflict harm on it in multiple ways. Malware can infect computers and devices in several ways and comes in a number of forms, just a few of which …
Read More »

Five ways of securing your device information

computer informationAccording to Tutorial Point, Data can be defined as a representation of facts, concepts or instructions in a formalized manner which should be suitable for communication, interpretation, or processing by human or electronic machine. Information can be defined by Search SQL Server as stimuli that has meaning in some context for its …
Read More »

Four basic facts you must know about device security

securityAccording to Business Dictionary, System Security can be defined as control of access to computer system’s resources , specifically its data and operating system files among others. Information system also refers to the processes and methodologies involved with keeping information confidential, available and assuring its integrity. In my previous article, …
Read More »

Three categories of threats to system security

threatsAccording to Wikipedia, a threat can be a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm. A threat is also said to be either intentional such as hacking or accidental such the possibility of computer malfunctioning or other circumstances that are capable of …
Read More »

Some keyboard shortcuts that can save time in Excel

Image result for image of a keyboardIn this article, I want to talk about some of the keyboard shortcuts that can save your time in Microsoft Excel. Follow me as we look at this together. To move once cell up, down, left or right from your currently selected cell. Just Press Up, Down, Left or Right …
Read More »

Six best practises for Windows patches updates

Windows patchesIn this article, I want to talk about six vital things that you need to take note of when you need to update your Windows. This will go a long way in preventing you from dark Angels. Follow me as we look at this together. #1: CHOOSE TO BE NOTIFIED …
Read More »

Six facts to know about Apple Software updates

Apple softwareIn this article which was a sequel to my previous article, I want to talk about some of the best practises that you need to follow when you need to get updates for Apple softwares. Follow me as we look at this together. #1: IT IS ESSENTIAL If you want …
Read More »

How to configure Firewalls in Windows 7

Image result for image of firewallIn this article , I want to talk about some of the procedures that you need to follow when you need to set up Firewalls in Windows 7. Follow me as we look at this together. Click on the Start button and look for the Control Panel. If you are …
Read More »

How to add new programs to Windows 7 Firewall

Windows 7 firewallThis article explains some of the procedures  that you need to follow when you need to add a program that will be allowed to run on your device. Follow me as we look at how to add programs to Windows 7 firewall together. Click on Start button. Search for Control …
Read More »

How to carry out Two-Way firewall Protection in Windows 7

two-way firewallIn this article, I want to look at some of the procedures that must be followed when you need to carry out a Two-Way Firewall Protection in Windows 7. When we talk about two way protection, we are talking about both inbound and outbound protection. That means this kind of …
Read More »

Why you should always use NTFS for file storage

 ntfsNTFS system provides better performance and security for data on hard disk and partitions than the FAT system of storage.You can make use of the convert command to convert earlier version of Fat 16 and Fat 23 to NTFS file format. That is exactly what I want to teach you …
Read More »

How to decrypt encrypted file in WIndows

fileIn my previous article, I have talked about how to encrypt file in Windows, now I want to talk about procedures that you need to follow when you need to decrypt files in Windows. Right click on the file to be decrypted and select “Properties”. BE YOUR OWN BOSS WITH …
Read More »

How to Encrypt files in Windows 7 Operating systems

encrypted fileWindows Encrypting File System allows Windows 7 System users to encrypt files and folders in an NTFS formatted disk drive. When we talk of encryption, we are talking of a way that you make a file unreadable to someone that is not the intended reader. In order to encrypt, right …
Read More »

How to use Window Defender to protect your Windows

windows defenderWindows Defender is an anti-spyware software that offers real time protection against spyware and other potentially malicious programs infecting your computer. To turn Windows Defender ON or OFF, click on the Start button, look for all Programs and select Windows Defender or you search for Windows Defender by using the …
Read More »

How to use Bitlocker for Windows Protection

Image result for image of bitlockerA Bitlocker drive encryption provides better data encryption by encrypting an entire Windows Operating system volume. You are making all the information you have on your Operating system unreadable to unauthorized users. You might want to ask me what can be encrypted ? You can encrypt both your hard drive …
Read More »

How to launch event viewer in Windows Operating Systems

event viewerThe Event viewer is a built in Windows utility that allows viewers to view and manage event logs, gather information about hardware and software problems, as well as monitor Windows security events. To start Event viewer in Windows 7, click on the start button. You will see the control panel …
Read More »

How to stop unwanted services in Windows

Image result for image of a man repairing a computerA Service can be defined as a long running executable that performs specific functions without requiring any man intervention. That means it is a program that can run on its own without any man intervention. Service always start when the system boots up. They have the capability of slowing down …
Read More »

Steps you need to follow when updating devices

steps-updating-devicesIMAGE SOURCE: ANIMOCA In my previous article about updates , I have told you some of the reasons why you need to update your devices. I know some are still afraid of going ahead to do that. In this article, I want to talk about the reason why some of us …
Read More »

Older Entries »