Blog


Remove GeoTagging before sharing your photos

GeoTagging
We often share our photos on Instagram, Pinterest, and Facebook. We also send our photos via Whatsapp, Facebook Messenger, and Skype without much privacy concerns. Did you know that the person who receives your photo can reveal your personal information such as the location of where the photo was taken and when it was taken? If the photo was taken from your backyard, you are advertising where you live to anyone who has access to your photos. A stalker can find your home from an Instagram photo you've posted a few days ago, and a thief will be able to determine your whereabouts by looking at the timestamp embedded in our photo you posted an hour ago in Hawaii. We often share too much information on social media, and they can work against us if someone abuses them.

What is your backup strategy?

Backup Strategy
No one is thrilled with making backups but some of us who lost data in the past know how critical it is to backup our data regularly. I used to make a backup of my PC on an external HDD, and replicate the contents back to forth when I get a new PC or new HDD. As size of HDD gets larger, I've upgraded my HDD a few times and finally moved to a NAS drive with RAID 1 mirroring. Having an external hard drive was great until cloud drives debutted in 2008.

My Facebook is hacked and someone is asking money

Facebook is Hacked
We often hear a Facebook account is hacked, and someone is using the stolen account to ask for money from friends, family, and business acquaintances. If you become a victim of a stolen account, there is a good chance that you'll not be able to access your Facebook account as the hacker probably changed your password. You'll have to let your friends and family know that your Facebook account is hacked, but you will have to contact them individually as you have no access to your Facebook account.


How to protect yourself from doxxing?

Doxxing
There are many reasons someone wants to dox you and share all your confidential information with the public to target you. Hackers have been using "doxxing" to revenge their rivals and enemies, but this practice has been extended to regular people like us. Gathering personal information online is not an easy task, but someone will go through the trouble of collecting the data to harass you is mind-boggling.

6 Cybersecurity Tips for Writers & Bloggers

Cybersecurity Tips
Cybersecurity studies say that around 30,000 websites are hacked every day. Many hackers break into websites without their owners realizing the issue, so it might take months before the breach is detected. At that point, making repairs is way too late. The best protection is prevention, and this rule applies to cybersecurity. To keep a blog or author website safe from hackers, writers need to follow the best practices of cybersecurity.

What is a sitemap?

Sitemap
A sitemap is the file that you specify to let the search engines know about the pages, videos, and images hosted on your website. By creating a sitemap, you can specify which pages are important, when they were last updated, and how often they were changed as well as alternate language versions (if any). You may also create an HTML version of the sitemap for your visitors to allow them to easily navigate your website.


What are Client Hints?

Client Hints
Client Hints is a new feature introduced by Google on Chrome browser and is later adopted by other browsers and included in the HTTP specifications. Client Hints was developed to help deliver responsive web easier and faster, and also makes it easier for webmasters to markup less code.

What is ARIN?

ARIN
ARIN is one of the 5 RIRs (Regional Internet Registries) responsible for the management and distribution of the Internet number resources known as IP Addresses (IPv4 and IPv6) and ASNs. ARIN serves the region comprised of the United States, Canada, and many Caribbean and North Atlantic islands. ARIN is a nonprofit organization found in 1997. The primary function of ARIN is the registration of IP addresses and ASNs to ensure global uniqueness. Registration service includes allocation. assignment, and transfer of all Internet number resources. ARIN assigns IPv4, IPv6 and ASN numbers to governments, universities, ISPs, and for-profit organizations.

How do you use a proxy server?

Proxy Server
Every computer on the Internet has an IP address, and it obtains one from the ISP that provides the Internet. The IP address is the identity of your computer, and the servers providing service to you will know what IP it is communicating with. Some people want to hide IP address and browse the web anonymously. There are several ways you can hide your IP address, and using a proxy server is one way to achieve it.


How to unlock a mobile phone and check network compatibility?

Unlock a Phone
When you buy a phone from T-Mobile, Sprint, and AT&T; they offer you a subsidized phone deal in exchange for a 2-year (or 30-months) contract. They also lock your phone, so that you cannot take the phone to another carrier. To use the phone you bought from Verizon on the AT&T network (or vice versa), you'll have to unlock your phone. The US carriers used to lock your phone for years, but with the "Unlocking Consumer Choice and Wireless Competition Act", you have to right to unlock your phone if you meet their "Unlocking Policy".