5 Ways To Make Your iOS Devices More Kid-Friendly And Child-Safe

5 Ways To Make Your iOS Devices More Kid-Friendly And Child-Safe

By Sumai de Beer / Sofia AK
 Kids born into the tablet generation are exposed to  more gadgets, devices and Internet tools than any  other generation before theirs.

 

 Toddlers can navigate their way in a mobile device  like a duck takes to water but they have little to no  way of knowing how to be responsible with  what they do to the contents of tablets and  smartphones.

 

 Anyone who has had lent a child his or her device,  would sometimes find apps missing, or files displaced, or even worse new purchases that were made without parental or the owner’s consent.

While it is necessary to talk to them about handling these devices more responsibly, you can always fall back on the options available in iOS devices to better handle these mishaps.

 

Here are 5 tricks on how to turn your iOS devices into kid-friendly devices (applicable for iOS 6 and above).

 

1. Block In-App Purchases

 

If you have a lot of games on your iOS devices you will need this. With your credit card linked to your Apple ID, you really don’t want to make a purchase as easy as tapping a button, especially when the person tapping it does not understand what a ‘purchase’ means.

 

To block in-app purchases:

 

Tap on Settings > General > Restrictions.

If this is your first time using the restrictions feature, tap on Enable Restrictions.

You will be asked to set a 4-digit passcode. Enter the passcode twice for confirmation.

Scroll down until you see the ‘Allowed Content’ section.

Under ‘In-App Purchases’ toggle it OFF.

Future purchases will require the use of the passcode you have just set to proceed.

 

 

2. Disable iTunes, Installing & Deleting Apps

 

Read more

A look at the Windows 10 user experience

A look at the Windows 10 user experience

By Jeandre de Beer  /  Pc World

 

hero_carousel_2in1_mini_start_CortanaMarket_1xNow that Windows 10 is out it's time to evaluate how the OS will work for users, including how they can upgrade and what Cortana brings to the table.

 

The latest, and ostensibly last, operating system (OS) in the venerable Windows line is here: Windows 10 is out, and users can finally see what Microsoft has done to right the wrongs of the past and pave the way for the future.

 

Microsoft has said Windows 10 is the last Windows OS. The company has moved away from its traditional model of releasing a new OS every few years, and instead it will perpetually update Windows 10 the way Google constantly updates its Chrome OS.

 

Ultimately the change should be welcome news; IT administrators won't have to deal with new licensing fees or the problems inherent to migrating to a new OS after Windows 10.

 

In addition, admins can control the updates. Don't need a particular feature or want to wait and see how others shops react to it? Simply skip adding that update. And security updates are a completely separate entity, so admins can keep up with those and still pass on any feature updates they don't want.

 

If it really is the last branch on the Windows family tree, the Windows 10 user experience and features had better deliver. Take a look at how to upgrade to Windows 10, how Cortana fits in, what the Action Center does and more.

 

How can you upgrade to Windows 10?

 

Upgrading to Windows 10 is actually pretty easy, and if a user already has a qualifying version of Windows 7, 8 or 8.1 it's completely free.

 

To see if his version qualifies, the user has to turn on and run Windows Update. Once Update is on, the user must run it until his device downloads all of the latest updates.

 

Once the device is confirmed as qualified for the upgrade, Windows will install the Get Windows 10 app. As the name suggests, it allows the user to get Windows 10. He just has to launch the app, which is represented by a Windows logo located on the task bar in the notification section, and follow the instructions.

 

To start the upgrade, the user selects Reserve your Free Upgrade and his download request enters the upgrade queue. Once the user reaches the front of the line, he will receive a notification that it's his turn to install Windows 10. The user can either upgrade right away or wait until it's a convenient time.

 

Where does Cortana fit in?

Read more

Three warning signs that email is malicious

Three Warning signs that email is malicious

By Jeandre de Beer  /  Pc World

 

e-mail-65928_1280

Email spam filtering is far better than it used to be. There was a time when nearly every scam email would land in your inbox.

Thankfully that's not the case anymore—especially if you're a Gmail user.

But no system is perfect. Every now and then a scam message will manage to slip into your inbox. But how do you know when you're looking at a scam or not?

 

Here are three basic tip-offs you can look for to figure out whether you're looking at an email with dishonest intentions. They're hardly an exhaustive list, but more often than not one of these tips will save you from getting scammed.

 

 

1. Dear customer …

Read more

Making your Android device(s) safe for Kids

Making your Android device(s) safe for Kids

By Jeandre de Beer  /  Pc World
IMG_5956Android Tablets and smartphones are invaluable parenting resources, whether it’s providing new ways of educating and informing kids or simply entertaining them.

 

Learning apps, creative thinking games, and streaming video apps make your Android device an incredibly handy thing to have around (even if you’re trying to limit screen time).

 

But these powerful gadgets can just as easily point kids towards objectionable content, allow them to poke through your personal files and correspondence, or enable them to rack up significant charges on your credit or debit card. Handing a child your smartphone can be a very dangerous proposition if you’re not careful.

 

Thankfully, there are ways to keep both your kids and digital life safe when passing off an Android device, whether it’s limiting app access, setting Play Store restrictions, or pinning an app to the screen for short-term use. And third-party apps are available with even deeper customization and restriction options, particularly if you’re setting up a dedicated device for a child.

 

Don’t worry, mom and dad: you’ve got this. Here’s how.

 

1452870054_Android_with_shadow1452870042_Girl_android

 

Restricted profiles (on tablets)

Read more

Keyboard Shortcuts

Keyboard Shortcuts to improve your Office productivity

Keyboard Shortcuts to improve your Office productivity

By Jeandre de Beer  /  Pc World

 

Word Shortcuts

 

Everyone knows how to use Microsoft Word. These keyboard shortcuts will put you on the path to Word mastery.

 

Word Shortcuts

 

Google Docs is great and all, but Microsoft Word is still the de facto standard when it comes to putting words to digital page. But how well do you know this decades-old program or it's keyboard shortcuts?

 

Familiarity breeds complacency. Most of us just keep on using Microsoft's productivity powerhouse the same way we have for years. If you want to up your Word game, here are 15 extremely useful keyboard shortcuts you'll want to master, ranging from basic to little known.

 

These shortcuts work for both Word for Windows 2013 and 2016.

Keyboard Access to the Ribbon:

Just like Excel, Word has a method that lets you access menu items using only your keyboard. Just press Alt or F10 and letters will appear next to each visible menu item. Press the corresponding letter to activate a particular menu option. To get rid of the labels, press Esc.

 

Ctrl+ F1: Display or hide the Ribbon.
Ctrl+ K: Insert a hyperlink for the selected text.
Ctrl+ F: Open the search box in the navigation pane.
Alt+ Ctrl + S: Split or remove split in the document window.
Ctrl+ Backspace: Delete one word to the left.
Shift+ F3: Change the case of the selected letters.
Alt+ Shift + W: Underline the selected words, but not the spaces included in the selection.
Ctrl+ 1: Set single-line spacing.
Ctrl+ 2: Set double-line spacing.
Ctrl+ 5: Set 1.5-line spacing.
Ctrl+ Y: Re-do the last action.
Ctrl+ Enter: Insert page break.
Ctrl+ W: Close the current document.
Alt+ F4: Close the program

 

Excel Shortcuts

 

These 15 Excel keyboard shortcuts will help you become a spreadsheet master

 

Read more

Ransomware’s latest new threats: CryptoWall & Chimera

Ransomware's latest new threats: CryptoWall & Chimera

By Jeandre de Beer  /  Pc World

Ransom-ware's latest new threatsRansomware thieves have come up with creative new schemes.

 

Current ransomware typically encrypts victims’ data and then threatens to delete the key if payment is not made. The latest variant of the CryptoWall malware, however, now scrambles the file-names on infected computers, making it even more difficult for victims to recover without buying the key from the attackers.

 

Potentially worse, another ransomware operation, known as Chimera, has threatened to publish the data of any non-cooperative victim—whether business or consumer—to the Internet.

 

The operation, which currently aims at German targets, demands the payment of almost 2.5 bitcoins, or more than US $800, according to German cyber-security site Botfrei, which reported the initial attack.

 

To frighten the user even more, the message indicates the threat to publish personal data and pictures somewhere on the internet – if user doesn’t pay the bribe

– Botfrei’s analysis of the attack.

 

An empty threat that may still signal a trend

Read more

Bloatware: How, Why and Goodbye

Bloatware: How, Why and Goodbye

By Jeandre de Beer / Pc World

BLOATWARE, CRAPWARE: No matter what you call it, the junk  that PC makers dump onto new PCs is nothing short of a mess.

The situation was in the spotlight recently when it was revealed that several Lenovo PCs were preloaded with “Superfish” that actively left users vulnerable to attack.

The software compromised secure HTTPS web connections in a quest to inject ads on the sites you visit… and make Lenovo a few nickels. There’s no doubt about it: Even though the root vulnerability came from Superfish, Lenovo messed up. Hard.

This shouldn’t have happened, period. But Lenovo didn’t toss its users to the wolves out of malice—instead, the Superfish debacle is a natural extension of the entire bloatware epidemic.

Why does Bloatware exist?

 

Bloatware exists because we all like cheap or free software, and rightfully so. Money’s tight, and even the cheapest PCs are a major, multi-hundred dollar investment.

But good news! Prices are plummeting in the wake of dirt-cheap Chromebooks and Microsoft’s resulting counter-attack.

While that sounds good on paper, deep down it’s actually troubling news for the PC industry. Mainstream personal computers are a cutthroat business; prices have been racing to the bottom for years now.

PC vendors make little to no money on such slim margins, which is a core part of the reason HP is splitting off its PC division (again) , Dell took itself private, and Sony and Samsung have bowed out of the PC industry to varying degrees.

 

There’s simply no real money to be made on dirt-cheap hardware. Enter bloatware.

 

PC makers don’t really believe that short-lived antivirus trialware is the best security solution for you, or that adding browser toolbars will make your life easier, or that a “visual discovery tool” like Superfish truly adds to the user experience.

The developers of bloatware pay hardware makers cold, hard cash to pump your PC full of this crap and get in front of your eyeballs.

That extra revenue often makes all the difference for vendors between taking a bath on competitively priced PCs, or eking out a small profit. (There’s a reason pricier premium laptops often contain far less bloatware than budget PCs.)


It’s a symbiotic relationship for bloatware developers, PC makers, and everyday users. Bloatware effectively subsidizes PC prices. If it didn’t, you’d pay more—perhaps much more—for your computer.

 

How to beat Bloatware

 

 

Read more

Part 2 : Top 10 fixes for common PC Problems

Part 2 : Top 10 fixes for common PC Problems

By Jeandre de Beer / Pc World

 

This is part 2 of our blog regarding the top 10 fixes for common pc problems.

In the first blog we discussed the following fixes : Attack of the BlueScreen of Death,  Recover deleted files,  Back up your data files,  Protect your privacy while browsing and  Speed up a slow PC without buying new hardware.

In this blog we will discuss : One antivirus program is better than two,  Securely wipe sensitive files—or your entire hard drive,  A slow Internet connection when you’re paying for a fast one,  Archive files so they’ll stay around for years and You do need to share your passwords.

1. One antivirus program is better than two

 

PROBLEM:  Running two antivirus programs is a bit like mixing a fine, vintage Cabernet with breakfast cereal. Each is good in its own right, but the combination may have unpleasant side effects

 

 

 

 

 

 

 

 

 

 

FIX:    Before I explain why, let’s get some definitions out of the way. The term antivirus has come to mean a program that launches when you boot your PC and stays running in memory, protecting you in real time not just from viruses, but trojans, rootkits, and all other forms of malware.

Two antivirus programs, loaded and running simultaneously, will be, at the very least, redundant. And in this case, you don’t want redundancy. Keep in mind that every program running uses RAM and clock cycles, potentially slowing down every other running program.

A well-made antivirus program has a very small footprint, and doesn’t slow things down significantly. But two such programs running together will slow it down twice as much.

And it could be worse. The two programs may conflict with each other—remember that every time you download a file, both will try to scan it. Conflicts could result in other programs failing to work and Windows becoming less stable.

If you’re worried that one antivirus program isn’t enough, you can augment it with an on-demand malware scanner. Unlike antivirus programs, they don’t hang around. You load one, update its database, scan your hard drive with it, and close it when you’re done.

I use two of these programs—the free versions of SuperAntiSpyware and Malwarebytes Anti-Malware. Once a week, I scan my hard drive with one or the other.

 

2. Securely wipe sensitive files—or your entire hard drive

Read more

Part 1 : Top 10 fixes for common PC Problems

Part 1 : Top 10 fixes for common PC Problems

By Jeandre de Beer / Pc World

 

Some computer related questions pop up over and over again. Others rarely come up, but nevertheless involve important issues that every user needs to know about.

Still, others are unanswerable, and the only advice I can give is to have a professional look at the PC

This blog post will be divided into two posts. In the first blog we will look at the following most common problems that users experience.

They are Attack of the BlueScreen of Death,  Recover deleted files,  Back up your data files,  Protect your privacy while browsing and  Speed up a slow PC without buying new hardware.

1. Attack of the BlueScreen of Death

 

PROBLEM: You’re working on an important project, and suddenly your screen displays nothing but white text against a blue background. If it happens once, you curse, reboot, and hope for the best. But if you’re getting these screens frequently, you've got a problem that needs fixing.

 

FIX:  Microsoft calls these stop errors, but everyone else prefers a more descriptive label: The Blue Screen of Death (BSoD). They’re not as common as they used to be, but BSoDs still happen (I experienced one two days ago). If you get one, curse, reboot, and hope for the best.

But if you’re getting them frequently, you've got a problem that needs fixing. The trick is to find information about your particular BSoD, and  then—since that information usually comes in an obtuse form—search the Internet for more practical advice.

What should you look for when the BSoD is in front of you? You’ll find useful data immediately below the first paragraph, and under the “Technical information” label near the bottom of the screen.

Since you can’t use Windows’ Snipping Tool to capture a BSoD screen, you’ll need to write down the important information on paper. Or you can use a camera or phone to photograph the screen. Just don’t expect a great-looking photo—or even an easily readable one.

You can also get information on the BSoD after you’ve rebooted: If you get a “Windows has recovered from an unexpected shutdown” message, you’re in luck. Click View problem details for information. You can also click Check for solution, but don’t expect much help there.

You can also get information, after rebooting, via the free program BlueScreenView. Whichever way you get the info, intelligent use of a search engine can probably bring up something useful.

If it doesn’t, here are some other tests you might try:

> Check the health of your RAM with Memtest86+ (memtest.org).
> Update your drivers with SlimDrivers (slimwareutilities.com).
> Diagnose your hard drive with HD Tune (hdtune.com).

 

 

2. Recover deleted files

Read more

You’ve fallen for a scam! Now what?

You've fallen for a scam! Now what?

By Jeandre de Beer / Pc World

What’s done is done. Here’s what you need to do to keep your mistake from costing you further.

Cyber Criminals tricked you into giving away some sensitive information. How can you mitigate this situation?

Don’t feel bad. We all make mistakes. 

 

But with these sorts  of mistakes, you have to act fast to avoid disaster.

 

What you need to do depends on how you were tricked.

 

Did you give them your email password? Your bank and/or credit card numbers? Your passwords for Facebook, Twitter, or other social media sites?

Did they remotely access your PC, or trick you into installing software?

If you have reason to believe that criminals can access your financial accounts, call your banks and credit card companies immediately. Explain the situation and follow their instructions.

Next, change any passwords that might have fallen into criminal hands. This includes email, social-media, and other passwords. 

If you’ve been using the same password for multiple accounts, change all of those passwords as well.

And stop using the same password for multiple accounts already!

If you can’t change a password—or even log on to a site—that means the crook got there first. Check the site for instructions on recovering a
hijacked account.

Read more