Pc Networks

3 critical steps to secure online banking

By Emile Greyling /  Gabriella DiDio

 

People often joke about having "bankers' hours," but really, aside from bankers, who works a standard 9-to-5 anymore? With the hours most of us work, it seems we can never make it into a branch in time, or we discover a banking need on a Sunday and are out of luck.

Now, thanks to online banking, we are able to have more flexibility over transactions. Online banking makes viewing your transactions, paying your bills and managing your finances a breeze.

 

But it's important not to get too comfortable with how easy it is, to the point that you're risking your security. There is no security guard standing watch over your online transactions. Online banking could expose you to hackers and malware that are looking for windows of opportunity to seize your sensitive information. So you need to be your own security guard!

You can use these three tips to protect your accounts…

 

 

Read more

3 ways to free up space on your smartphone

By Emile Greyling /  Kevin Downey

 

How did we live without our smartphones? 

Well, your everyday life wouldn't be nearly as nice without it. You're constantly taking photos and videos that you share with friends and family around the world on social media sites like Facebook and Whatsapp

You make phone calls,  You send thousands of text messages every year and, of course, there's so much more, like getting driving directions, finding out what time a store closes and checking your bank balance.

So, it's understandable that you cringe when you see a message pop up on your smartphone. The worst one is telling you that your battery is low, and you just arrived at a business meeting where you'll need it all day!

Yet, there's a close No. 2 when it comes to dreaded smartphone messages. That's "Your storage space is almost full."

Let's face it, you've deleted just about everything you can't live without, including photos and apps. Yet, you need more space, so you recklessly start deleting the big storage munchers, like Facebook, your bank account app, photos and videos.

 

Here are some of the best things to delete when you need space, and how to do it.

1. Delete apps

The way you delete an app is different depending on whether you're using an Android smartphone or iPhone, and which model you're using. However, the steps will most likely be similar to these.

 

 

Read more

Need faster internet? What are your options?

 

 

Choosing an Internet Connection South Africa

 

What are your options?

In our corner of the world we have 3 main varieties of internet that are commonly used at homes or in a businesses. There are more but should only be considered if none of the options bellow are available to you. 

 

 

 

 

Those options are.

  1. Fibre (The fastest and most stable but not widely available yet)
  2. Fixed Broadband wireless (The competitor its fast and flexible and more readily available)
  3. ADSL/VDSL (Not that fast by today's standard but still valuable if you’re out of coverage)

 

 

Read more

Chrome Remote Desktop

How to access your computer from anywhere using Chrome Remote Desktop

How to access your computer from anywhere using Chrome Remote Desktop 

Chrome Remote DesktopLooking for a quick and easy way to access your Windows, Mac or Linux machine from an Apple device, an Android device or even from another Windows, Mac or Linux machine?

 

If so, then there is one solution that works really, really well: Chrome Remote Desktop.

 

In order to use it, all you need is Google Chrome installed on your device.

 

After setting everything up, which we will explain below, you can access any of your computers from your device. This means you can remotely control your Windows machine from my iPhone, Nexus 6 and Mac laptop without having to worry about port forwarding, dynamic DNS, different operating systems or anything else.

 

The great advantage about using Google Chrome is that it takes about 5 minutes to setup and even  less than that if you already have Chrome installed on your devices.

 

Install Chrome Remote Desktop

 

The first thing we need to do is install Google Chrome itself on your computers. Since Chrome can be installed on Windows, Mac or Linux, it means you can remotely access any of those systems too.

 

Chrome Remote Desktop

 

Once you have Chrome installed, you need to install the free Chrome Remote Desktop add-on. Click the Add To Chrome button at the very top right. A popup will appear with the permissions the app needs in order to work properly. Click Add App to continue if you’re OK with the permissions.

 

At this point, the app should be installed and a new tab should appear where you can see all the apps that have been installed in Chrome. If this tab doesn’t appear, just open a new tab and type in chrome://apps/ in the top address-bar.

 

 

Read more

3 ways to keep sensitive files encrypted on a flash drive or external hard drive

3 ways to keep sensitive files encrypted on a flash drive or external hard drive

By Jeandre de Beer  /  Pc World

screen-encrypt_2868

Flash drives are easy to lose. And anything lost can fall into the wrong hands.

So if you’re carrying around sensitive information in your pocket, you need to make sure those files are encrypted. 

 

Buy an encrypted drive

 

You can buy a flash drive with built-in encryption, such as the DataTraveler Locker+ G3. When you plug the Locker+ in, it comes up as a 13MB, read-only drive.

 

But once you launch the program file on that drive and enter the password that you previously setup, another drive opens up with all the storage space you paid for. That drive, of course, is inaccessible without the password.

The software runs off the drive, and it can be used on multiple computers and operating systems.

 

But I strongly recommend against using this drive’s optional cloud backup feature. It uses Dropbox, OneDrive, or whichever cloud service you pick, which at first glance seems like a nice convenience.

But this feature uploads the files without its own encryption. That means you’re trusting your sensitive files to the encryption capabilities of Dropbox and similar services, and they aren’t all that secure. Find another way to backup these files—preferably one where you can can control the encryption.

 

Install specialized software on your drive

 

Read more

Bloatware: How, Why and Goodbye

Bloatware: How, Why and Goodbye

By Jeandre de Beer / Pc World

BLOATWARE, CRAPWARE: No matter what you call it, the junk  that PC makers dump onto new PCs is nothing short of a mess.

The situation was in the spotlight recently when it was revealed that several Lenovo PCs were preloaded with “Superfish” that actively left users vulnerable to attack.

The software compromised secure HTTPS web connections in a quest to inject ads on the sites you visit… and make Lenovo a few nickels. There’s no doubt about it: Even though the root vulnerability came from Superfish, Lenovo messed up. Hard.

This shouldn’t have happened, period. But Lenovo didn’t toss its users to the wolves out of malice—instead, the Superfish debacle is a natural extension of the entire bloatware epidemic.

Why does Bloatware exist?

 

Bloatware exists because we all like cheap or free software, and rightfully so. Money’s tight, and even the cheapest PCs are a major, multi-hundred dollar investment.

But good news! Prices are plummeting in the wake of dirt-cheap Chromebooks and Microsoft’s resulting counter-attack.

While that sounds good on paper, deep down it’s actually troubling news for the PC industry. Mainstream personal computers are a cutthroat business; prices have been racing to the bottom for years now.

PC vendors make little to no money on such slim margins, which is a core part of the reason HP is splitting off its PC division (again) , Dell took itself private, and Sony and Samsung have bowed out of the PC industry to varying degrees.

 

There’s simply no real money to be made on dirt-cheap hardware. Enter bloatware.

 

PC makers don’t really believe that short-lived antivirus trialware is the best security solution for you, or that adding browser toolbars will make your life easier, or that a “visual discovery tool” like Superfish truly adds to the user experience.

The developers of bloatware pay hardware makers cold, hard cash to pump your PC full of this crap and get in front of your eyeballs.

That extra revenue often makes all the difference for vendors between taking a bath on competitively priced PCs, or eking out a small profit. (There’s a reason pricier premium laptops often contain far less bloatware than budget PCs.)


It’s a symbiotic relationship for bloatware developers, PC makers, and everyday users. Bloatware effectively subsidizes PC prices. If it didn’t, you’d pay more—perhaps much more—for your computer.

 

How to beat Bloatware

 

 

Read more

Part 2 : Top 10 fixes for common PC Problems

Part 2 : Top 10 fixes for common PC Problems

By Jeandre de Beer / Pc World

 

This is part 2 of our blog regarding the top 10 fixes for common pc problems.

In the first blog we discussed the following fixes : Attack of the BlueScreen of Death,  Recover deleted files,  Back up your data files,  Protect your privacy while browsing and  Speed up a slow PC without buying new hardware.

In this blog we will discuss : One antivirus program is better than two,  Securely wipe sensitive files—or your entire hard drive,  A slow Internet connection when you’re paying for a fast one,  Archive files so they’ll stay around for years and You do need to share your passwords.

1. One antivirus program is better than two

 

PROBLEM:  Running two antivirus programs is a bit like mixing a fine, vintage Cabernet with breakfast cereal. Each is good in its own right, but the combination may have unpleasant side effects

 

 

 

 

 

 

 

 

 

 

FIX:    Before I explain why, let’s get some definitions out of the way. The term antivirus has come to mean a program that launches when you boot your PC and stays running in memory, protecting you in real time not just from viruses, but trojans, rootkits, and all other forms of malware.

Two antivirus programs, loaded and running simultaneously, will be, at the very least, redundant. And in this case, you don’t want redundancy. Keep in mind that every program running uses RAM and clock cycles, potentially slowing down every other running program.

A well-made antivirus program has a very small footprint, and doesn’t slow things down significantly. But two such programs running together will slow it down twice as much.

And it could be worse. The two programs may conflict with each other—remember that every time you download a file, both will try to scan it. Conflicts could result in other programs failing to work and Windows becoming less stable.

If you’re worried that one antivirus program isn’t enough, you can augment it with an on-demand malware scanner. Unlike antivirus programs, they don’t hang around. You load one, update its database, scan your hard drive with it, and close it when you’re done.

I use two of these programs—the free versions of SuperAntiSpyware and Malwarebytes Anti-Malware. Once a week, I scan my hard drive with one or the other.

 

2. Securely wipe sensitive files—or your entire hard drive

Read more

Part 1 : Top 10 fixes for common PC Problems

Part 1 : Top 10 fixes for common PC Problems

By Jeandre de Beer / Pc World

 

Some computer related questions pop up over and over again. Others rarely come up, but nevertheless involve important issues that every user needs to know about.

Still, others are unanswerable, and the only advice I can give is to have a professional look at the PC

This blog post will be divided into two posts. In the first blog we will look at the following most common problems that users experience.

They are Attack of the BlueScreen of Death,  Recover deleted files,  Back up your data files,  Protect your privacy while browsing and  Speed up a slow PC without buying new hardware.

1. Attack of the BlueScreen of Death

 

PROBLEM: You’re working on an important project, and suddenly your screen displays nothing but white text against a blue background. If it happens once, you curse, reboot, and hope for the best. But if you’re getting these screens frequently, you've got a problem that needs fixing.

 

FIX:  Microsoft calls these stop errors, but everyone else prefers a more descriptive label: The Blue Screen of Death (BSoD). They’re not as common as they used to be, but BSoDs still happen (I experienced one two days ago). If you get one, curse, reboot, and hope for the best.

But if you’re getting them frequently, you've got a problem that needs fixing. The trick is to find information about your particular BSoD, and  then—since that information usually comes in an obtuse form—search the Internet for more practical advice.

What should you look for when the BSoD is in front of you? You’ll find useful data immediately below the first paragraph, and under the “Technical information” label near the bottom of the screen.

Since you can’t use Windows’ Snipping Tool to capture a BSoD screen, you’ll need to write down the important information on paper. Or you can use a camera or phone to photograph the screen. Just don’t expect a great-looking photo—or even an easily readable one.

You can also get information on the BSoD after you’ve rebooted: If you get a “Windows has recovered from an unexpected shutdown” message, you’re in luck. Click View problem details for information. You can also click Check for solution, but don’t expect much help there.

You can also get information, after rebooting, via the free program BlueScreenView. Whichever way you get the info, intelligent use of a search engine can probably bring up something useful.

If it doesn’t, here are some other tests you might try:

> Check the health of your RAM with Memtest86+ (memtest.org).
> Update your drivers with SlimDrivers (slimwareutilities.com).
> Diagnose your hard drive with HD Tune (hdtune.com).

 

 

2. Recover deleted files

Read more

You’ve fallen for a scam! Now what?

You've fallen for a scam! Now what?

By Jeandre de Beer / Pc World

What’s done is done. Here’s what you need to do to keep your mistake from costing you further.

Cyber Criminals tricked you into giving away some sensitive information. How can you mitigate this situation?

Don’t feel bad. We all make mistakes. 

 

But with these sorts  of mistakes, you have to act fast to avoid disaster.

 

What you need to do depends on how you were tricked.

 

Did you give them your email password? Your bank and/or credit card numbers? Your passwords for Facebook, Twitter, or other social media sites?

Did they remotely access your PC, or trick you into installing software?

If you have reason to believe that criminals can access your financial accounts, call your banks and credit card companies immediately. Explain the situation and follow their instructions.

Next, change any passwords that might have fallen into criminal hands. This includes email, social-media, and other passwords. 

If you’ve been using the same password for multiple accounts, change all of those passwords as well.

And stop using the same password for multiple accounts already!

If you can’t change a password—or even log on to a site—that means the crook got there first. Check the site for instructions on recovering a
hijacked account.

Read more

Why you can trust (some) Free Software

Why you can trust (some) Free Software

By Jeandre de Beer / Pc World

 

Question : Is it safe to use free software? What do the software authors get out of it?

Answer :   It’s good to be skeptical—and careful. Free products often come with strings attached.

But if you pay attention and listen for the right recommendations, you can get some excellent software for free.


There are some perfectly good reasons why an individual programmer, a programming collective, or even a for-profit company would let you use the fruit of its labor without getting paid.


The free version of a program is often a marketing tool for the paid version

 

The company gives away a stripped-down version of its product, which can build word of mouth that helps sell the paid “Pro” version. That Pro version will have features the free one lacks—features that many users can do without but others need.

For instance, only the paid version of EaseUS Todo Backup can password-protect your backups. And the free version generally comes without tech support. Also, many companies offer the free versions only for home use.

Businesses have to buy the Pro version. Free software can also produce income through advertising. However, this “advertising” can cross the line to become more like malware.

The worst such advertising caches itself within the installation routine. If you don’t take care when you walk through the installation wizard, you’ll install two or three programs you don’t want in addition to the one you do.

Many people regard these potentially unwanted programs, or PUPs, as malware.

 

The trick to avoiding PUPs is simple :

Read more