Showing posts with label Compromise. Show all posts
Showing posts with label Compromise. Show all posts

Saturday, February 1, 2014

[How-To] Maximize Your Laptop's/Notebook's/Netbook's Battery and Performance



It's been now several years with my old trusted laptop and very rarely it has let me down, other than the case where I had to change the motherboard, but it's lasted me a good five years and I've used it roughly and it has been on numerous trips with me to many places around India.

Today, I’ll be showing you ways and methods to recuperate those and maximize your battery life. Some of the steps may require you go into the Basic Input/Output System (BIOS) or Unified Extensible Firmware Interface (UEFI) of your laptop / notebook / netbook, and others would be simple software tweaks.

Every laptop / notebook / netbook user wants a longer battery life, but only a few know how to get it without buying a new laptop / notebook / netbook. Even though manufacturers have made great developments and improvements over the past years in increasing the efficiency of their products, even the most efficient batteries aren't lasting long enough for today's users.

You would not have realized this, but your laptop / notebook / netbook even though it is brand new is loaded with integrated peripherals and bloatware (read manufacturer customization's and branded software) that you won’t use and consumes more resources than needed and reduces your laptops / notebooks / netbooks battery life.

Before we go into the nitty-gritty of things, firstly you should do a full review as to why batteries die in the first place. From the basic components like the CPU to the track-pad/mouse-pad, each and every component of the laptop / notebook / netbook consumes power. The amount of power consumed varies from one component to another component and also fluctuates based on factors and conditions such as core/system temperature and processor/system workload.

The higher the number of components / peripherals attached to your laptop / notebook / netbook and the more amount of work you do with it, the quicker the battery will drain. Every background program, driver, or service that loads, and every electronic circuitry that is used uses a teeny-weeny bit of battery power. Thus, reducing the number of attached or active peripherals and minimizing the load placed on the laptop / notebook / netbook will increase the batteries life.

Most of the manufacturers or vendors customize their laptop's / notebook's / netbook's to their liking and they are not easy to hunt down and remove or eliminate. So you, as the owner, have to make an effort to minimize this resource consumption and maximize the battery life.

Some of the immediate things you can do with a new purchase or even on older laptop's / notebook's / netbook's is by:

  1. Keeping your laptop's / notebook's / netbook's cool
  2. Dimming its display
  3. Enable system hibernation

In this how-to I’ll be focusing on things that will illustrate the benefits of modifications and tweaks

There are a number of hardware and software tips, tricks, and tweaks and to increase your laptop's battery life. However, some of these tips, tricks, and tweaks may cause your laptop's / notebook's / netbook's to function under par or to even cease to function. So, it is, therefore, imperative that you should take this advice with a pinch of salt and be very careful. Even though I have tested these tips, tricks, and tweaks on my own laptop, I will not and cannot guarantee / warranty that they will, would, could, or should work with your hardware.

Therefore, with this thought in mind, in no event shall I be liable for any damages whatsoever (including, without limitation, damages for loss of business/personal profits, business/personal interruption, loss of business/personal information, or other pecuniary loss) arising out of the use of or inability to use the advice, even if you have been advised of the possibility of such damages. You also agree that I will not and cannot be held liable for any deleterious and/or injurious changes that might occur as a result of you following the tips, tricks, or tweaks mentioned in this guide.


ALWAYS MAKE A BACKUP BEFORE YOU CHANGE THINGS IN YOUR SYSTEM AND YOU KNOW IT MAY BECOME WORSE OR BAD.

Every electronic component (such as diodes, transistors, integrated circuits, optoelectronic devices, valves, discharge devices, resistors, capacitors, magnetic (inductive) devices, networks, transducers, sensors, detectors, antennas, assemblies, modules, prototyping aids), be it active, passive, or electromechanical use power when they are used. When they are not used in any function, they contain static power which is just static energy.

Disabling and/or disconnecting unused and unwanted peripherals will improve battery life immensely. Software-wise disabling, uninstalling, or removing unnecessary applications and/or services will greatly help conserve power consumption. In addition to that, updating drivers (it would be video drivers most of the time) helps by letting the system optimize or transfer some processes, such as video encoding/decoding, games, playback from the CPU to a relatively power-efficient and dedicated graphics processor.





Image Credit: TechGYD

[ABOUT: Devesh Prabhu is an avid blogger and has been blogging posts and rants on many subjects through his various blogs. He has been associated with the blogosphere for the past 8/9 years and inadvertently left the blogging scene albeit to concentrate on his personal life, but his desire to be among his readers brought him back.]

[NOTE: The article "[How-To] Maximize Your Laptops/Notebooks/Netbooks Battery and Performance" first appeared on the Komputer Knowledge Blog.

[DISCLAIMER: All content provided on this blog is for informational purposes only. The owner of this blog makes no representations as to the accuracy or completeness of any information on this site or found by following any link on this site. The owner will not be liable for any errors or omissions in this information nor for the availability of this information. The owner will not be liable for any losses, injuries, or damages from the display or use of this information. These terms and conditions of use are subject to change at anytime and without notice.]


Sunday, September 1, 2013

[AVOID] HOW-To Avoid Credit Card Scams [TIPS]

Over the past many years I've seen many people fall prey to Credit Card Scams over and over again in many places and at unsuspecting times.

Mostly you would have read about these scams on the Internet or heard about this in the news channels. The latest one was where some cops had their money taken by people somewhere else and it was all due to the fact that they had given out their Credit Card or Debit Card number and the number at the back of the card.

IMPORTANT:

1. Never ever give out your card details on shady websites where you have some doubt or the website does not look legitimate  There are many ways to find this out, but the most simple way to look at it is just by looking at the Unified Resource Locator (URL) in the address bar of the browser.

2. While doing online transactions check the URL and then only think about giving the details. Even if it is a legitimate website just double-check to be sure.

3. If want to purchase something online, do it mostly through Internet banking as it would be safe.

4. Use the option of Cash-on-Delivery, as it would avoid giving out your card details even if it means paying a little extra in the way of transportation costs or courier charges.

5. In any condition, do not, and I repeat, do not give out your CVV number to unknown people or fill in shady websites. With CVV number and your Credit Card details money can be withdrawn and products can be purchased online using your Credit Card details.




[ABOUT: Devesh Prabhu is an avid blogger and has been blogging posts and rants on many subjects through his various blogs. He has been associated with the blogosphere for the past 8/9 years and inadvertently left the blogging scene albeit to concentrate on his personal life, but his desire to be among his readers brought him back.]

[NOTE: The article "[AVOID] HOW-To Avoid Credit Card Scams [TIPS]" first appeared on the Komputer Knowledge Blog.

[DISCLAIMER: All content provided on this blog is for informational purposes only. The owner of this blog makes no representations as to the accuracy or completeness of any information on this site or found by following any link on this site. The owner will not be liable for any errors or omissions in this information nor for the availability of this information. The owner will not be liable for any losses, injuries, or damages from the display or use of this information. These terms and conditions of use are subject to change at anytime and without notice.]

Tuesday, August 20, 2013

[PC Basics] Where You'll Get Hacked: Common Mistakes, and How to Prevent It [INFOGRAPHIC]

Where You'll Get Hacked: Common Mistakes, and How to Prevent It



Where You'll Get Hacked: Common Mistakes, and How to Prevent It



[Devesh Prabhu is an avid blogger and has been blogging posts and rants on many subjects through his various blogs. He has been associated with the blogosphere for the past 8/9 years and inadvertently left the blogging scene albeit to concentrate on his personal life, but his desire to be among his readers brought him back.]

[NOTE: The article "[PC Basics] Where You'll Get Hacked: Common Mistakes, and How to Prevent It [INFOGRAPHIC]" first appeared on the Komputer Knowledge Blog.

[DISCLAIMER: All content provided on this blog is for informational purposes only. The owner of this blog makes no representations as to the accuracy or completeness of any information on this site or found by following any link on this site. The owner will not be liable for any errors or omissions in this information nor for the availability of this information. The owner will not be liable for any losses, injuries, or damages from the display or use of this information. These terms and conditions of use are subject to change at anytime and without notice.]



Thursday, July 25, 2013

What to Do After You’ve Been Hacked

Evernote became the latest member of the “we’ve been hacked” club. And the thing is, what was once a pretty exclusive club now lets just about everyone in these days. I’m a member too. And as I discovered when I was hacked last year, my experience was distressingly commonplace. And yet while being hacked may be increasingly familiar, it isn’t getting any less stressful or confusing. It’s hard to know what to do, or where to begin, immediately afterward.
Whether you were hacked, phished, had malware installed or just don’t know what the heck happened but there’s somebody all up in your e-mail, here are a few good first steps to take following an incident. This is by no means comprehensive, but it’s a good start.
Ask Yourself Why
While you are fixing things, it’s a good time to take a step back, and ask yourself a more basic question: What was the reason for the breach? If it was your bank account, the answer may be obvious. In other cases, such as e-mail, it can be for a host of reasons — from using it to send spam, to requesting money from your contacts, to getting password resets on other services. An attacker may even be trying to gain access to your business. Knowing why you were targeted can also sometimes help you understand how you were breached.
Reset Your Passwords
Immediately change the password on the affected service, and any others that use the same or similar password. And, really, don’t reuse passwords. You should be changing your passwords periodically anyway as a part of routine maintenance. But if you’ve just been hacked, it’s now more urgent. This is especially true if you reuse passwords, or use schemes that result in similar passwords (like 123Facebook, 123Linkedin, 123Google).
“Password reuse is one of the great evils and its very hard to prevent,” says PayPal’s principal scientist for consumer security Markus Jakobsson. Sites can set up password requirements — for example a character length or that a password include symbols and numbers — but they cannot force people into not reusing the same or similar passwords. “It’s very common for people to use similar or the same password but it’s very rare for people to realize that it creates a liability for them to do it and that they need to change their password after they’ve been hacked.” 
Update and Scan
There’s a possibility that the attacker got in via your machine. Almost all malware is installed by victims themselves, if unknowingly. And if something nasty is on your computer, you need to get it off before you start a recovery process. Make sure you are running the most recent version of your operating system. Download a solid anti-virus product and run a scan for malware and viruses that may have been the source of the attack. This is the most basic thing you can do, so do it now. And moreover, use a brand-name commercial program that you pay for.
“Malware antivirus software isn’t perfect — they have a hit ratio of 50 to 75 percent and can miss almost as much as they find, but it’s better than nothing,” explains Jakobsson. And why should you pay for it? “Most people who search for ‘free antivirus’ end up installing malware.”
Take Back Your Account
Most of the major online services have tools in place to help you get your account back after it has been taken over by someone else. Here’s how to do that on AppleFacebookGoogleMicrosoft,Twitter and Yahoo. Typically, you’re going to need to be able to answer some questions about your account. Facebook has a novel method that relies on friend verification. Are you using a service not listed here? Typically you can find your way back in by searching for its name plus “account recovery.”
Check for Backdoors
Smart hackers won’t just get into your account, they’ll also set up tools to make sure they can get back in once you’ve gotten them out. Once you have your accounts back, you should immediately make sure there isn’t a back door somewhere designed to let an attacker back in. Check your e-mail rules and filters to make sure nothing is getting forwarded to another account without your knowledge. See if the answers to your security questions were changed, or if those questions themselves have changed.
Follow the Money
If there is an element of commerce involved in the affected account, thoroughly review any activity on that account. Verify that no new shipping addresses have been set up on your account, no new payment methods have been added, or new accounts linked. This is especially true of sites that let you make one-click purchases, or issue payment cards.
“Attackers do things for a reason,” says Jakobsson. “If we are talking about attacking your Bank of America account or PayPal the reason is obvious: They want your money. What criminals will often want to do is hook up a debit card to your account. If they add an address and then request a financial instrument, that is a way for them to monetize.”
Perform a Security Audit on All Your Affected Accounts
Often, one account is simply used as a gateway to another. Your Dropbox account may only be a means to get at something stored there. Your e-mail might only be a path to your online banking. Not only do you need to secure the account you know was hacked, but you need to check all the others it touches as well. Reset your passwords on those services, and treat them as if they have been compromised.
De-Authorize All Those Apps
This is one of those non-obvious but important steps. One of the first things you should probably do if you’ve had an account compromise is de-authorize all the associated apps that use that account for login or for its social graph. For example, Google, Twitter, Facebook, Dropbox and many others support OAuth, which enables third party apps to use account APIs without having to give them the account login information. But if a hacker has used it to authorize another device or service, and remains logged in there, simply changing your password won’t get them out. There could be a rogue client out there that you remain unaware of even after regaining access to your account. The best bet is to pull the plug on everything you’ve given access to. are on GoogleFacebook and Twitter. It may be a pain to go back through and re-authorize them, but it’s less so than leaving a malicious individual lurking in your account. And in any case, doing so periodically is just good hygene.
Lock Down Your Credit
It’s bad enough you had your email hacked, but you really don’t want your identity stolen as a result. Services like LifeLock will do this for you for a fee, but you can also do it yourself by contacting the three major credit reporting agencies directly. Depending on the state you live in, locking down your credit might be free, provided you’ve filed a police report.
Speak Out
“Say that your Facebook account gets hacked,” says Jakobsson, “there’s a good chance you won’t lose any money, but your friends might.” The mugged-in-London scam works by hijacking your identity to contact friends to request money. It’s also true, though less commonly so, on AIM and Google Talk and other services. There may also be data that you need to let others’ know has been accessed–from financial matters to sensitive personal information.
But there’s another reason to do this too, and it’s the same reason for this very article, which is to raise awareness. The best tactic of all is to do everything in your power to not be hacked: to run up to date software, use good password hygiene, and make backups of everything in your system.
“This is an amazing opportunity to educate people,” says Jakobsson. “”When you say, ‘wow, it could happen to him; it could happen to me,’ that’s when you change.”

Via: http://www.wired.com/gadgetlab/2013/03/what-to-do-after-youve-been-hacked/