Here are some tips on “How to Safely and Securely Dispose of Your Old Gadgets” | WIRED

This is IMPORTANT… If you are planning on getting rid of your old devices (smartphone, tablets, computers), PLEASE take at least (at minimum) the necessary steps to clear the device of your data. Always do a backup to ensure you have all of your files, before doing this.

Reflected below, are steps I extracted from the article (see source link below), that will help you wipe an Android device, a Windows Computer, and a Mac. I don’t know how many times I have assisted folks and they throw the old device in the closet somewhere and the device is still holding their entire life…

For Android devices, open up the Settings app then tap System > Advanced > Reset options, and then Erase all data (factory reset). Over on iOS, the equivalent option is in the Settings app under General > Reset > Erase All Content and Settings.

If you’re using a Windows computer, you need to load up the Settings app then click Update & Security, then Recovery, then Get started under the Reset this PC option. Choose to remove all personal files during the process. If you’re using a Chromebook or Chrome OS tablet, open up the Settings pane and pick Advanced, then Powerwash to get your computer into an as-new state.

It’s slightly more involved on a Mac: You need to restart macOS, then as soon as it begins to boot up again, hold Option+Command+R until you see a spinning globe. Release the keys, then choose Reinstall macOS, then choose Continue. Follow the on-screen instructions and select your main hard drive when prompted.

Source: How to Safely and Securely Dispose of Your Old Gadgets | WIRED

How to check if you have a Google+ account — and delete it | by INSIDER

Google is shutting down Google+. If you have a Google+ account, I highly recommend you delete it. Steps to delete the account can be found by clicking on the source link below…

After a Wall Street Journal report revealed that Google accidentally exposed personal information of hundreds of thousands of Google+ users, you might be thinking about deleting your account before the social network formally shuts down. We’ve got you covered.

Source: How to check if you have a Google+ account — and delete it – INSIDER

A Software Option To “Securely Wipe Your Drives, Save 20 Percent With BitRaser” | by PCMag.com

BitRaser

BitRaser is available in multiple editions that are designed for different use-cases. For typical home and professional users, the BitRaser For File package lets you securely erase an unlimited number of individual files and folders. Step up to the full BitRaser suite, and that will enable you to wipe entire drives securely with a sliding price depending on how many drives you need to wipe – perfect for IT specialists. And if you’re dealing with smartphones, BitRaser for Mobile has you covered on Android and iOS devices.

Source: Securely Wipe Your Drives, Save 20 Percent With BitRaser | PCMag.com

Scam Alert: Don’t Fall For This Facebook ‘Friend Request From You’ Message | by Putnam Daily Voice

Been receiving messages from my Facebook friends that they received another friend request from me and noticed others have been receiving this as well.  Did some research on this and found that this is all BOGUS. Just stop doing it and disregard those messages…  You can read more on this by clicking on the source link below or Google it (numerous sources out there on this matter).

You can stop forwarding that latest warning from your Facebook friends about your account being cloned. You weren’t. It’s bogus. And you’re just making it worse. It starts out:

“Hi….I actually got another friend request from you yesterday…which I ignored so you may want to check your account…” Then it tells you to “hold your finger on the message until the forward button appears…then hit forward….” Your account isn’t sending duplicate friend requests. And you didn’t receive a request from the person you’re forwarding it to.

Source: Scam Alert: Don’t Fall For This Facebook ‘Friend Request From You’ Message | Putnam Daily Voice

Here is a descriptive list of “Back to School Cyber Security Tips” – The LastPass Blog

These tips are good educational points for, not only for Students, but for everyone. I have found over the years people do not take online and device security seriously and/or do not have a good understanding of it. I encourage you to follow the source link below to learn the basics and learn how to keep your online presence safe.

Online and device security may not be the first thing that comes to mind with the new school year, but more and more middle school, high school and college students have mobile devices, laptops, and online educational requirements. It is more important than ever that students protect their digital lives as much as adults.

Source: Back to School Cyber Security Tips – The LastPass Blog

At Last, The Secret to Satellite Internet Security is Revealed

This is a Guest Post by Allen Jame, who is a follower of “What’s On My PC”. Thank you Allen for sharing your expertise on Satellite Internet Security with my readers…

Satellite communication is referred to as one of the most popular communication technology used for global communication.

Its applications are vast. Military intelligence, Broadband internet service, and weather forecasting are its some most popular applications.

The satellite dish network internet Wi-Fi is supposed to be the best solution for getting internet in the rural areas.

Although its advantages are vast still security in the satellite communication is a significant concern.

There are many limitations. For example, power control, high link delay, and link availability are some of the standard security issues on the satellite internet.

During the satellite communication, protections of the links and the satellites are not enough. Sound integrity and the confidentiality of the downlink earth stations is also a significant concern.

In this article, you will witness security issue with the satellite internet. Some of the main security issue covered in this article are:

  • Eavesdropping
  • Satellite security link protocol issues
  • Network infrastructure issues
  • TCP based security issues
  • Information-System based security issues
  • Long delays

Continue reading “At Last, The Secret to Satellite Internet Security is Revealed”

Powered by WordPress.com.

Up ↑