As computer processing power increases the security of traditional passwords decreases due to vulnerability to what is known as dictionary attacks or brute force attacks. These are attacks where an attacker computer puts together a set of passwords and tries them out until your account is compromised. To face this threat the concept of password […]
Avoid entering sensitive data like your credit card numbers or any other financial or sensitive information into any public computer.
Always log out of websites by clicking “log out” on the site. It’s not enough to simply close the browser window or go to another website.
44% of #Twitter‘s 947 Million accounts have never tweeted …not even once
Things you didn’t know Gmail can do
1. Dot’s Don’t Mean Anything: If your e-mail is [email protected] you will an e-mail if it was addressed to [email protected] or [email protected] Actually the dot’s don’t change anything at all. Go ahead try it! 2. It can give you Background Info on your contacts Most e-mail service providers offer an address book. But with […]
6 Benefits of the Cloud
Cost Efficiency Traditional Information technology systems rely on software that puts many overhead costs on companies. Added to the purchase prices, the licensing fees for multiple users can prove to be very expensive for the establish. On the other hand, cloud computing can significantly lower a company’s IT expenditure as it comes at a much […]