Wednesday 28 December 2016

Your Waistline and Heart Disease: What's the Link?

Lose weight. You hear this advice all the time. But did you know that where your body stores those extra pounds matters for your heart health, too?
“A thicker waistline increases heart attack risk,” says Nieca Goldberg, MD, medical director of the New York University Langone Joan H. Tisch Center for Women’s Health.
Stomach fat is linked to high blood sugar, increased blood pressure, and raised levels of triglycerides, a type of fat in your blood. “All of these are major risk factors for heart disease,” Goldberg says.
So what makes an expanding waistline a problem for your heart?

It’s About Location

Belly fat, also called visceral fat, is closer to internal organs, says Sonya Angelone, a cardiovascular nutrition expert in San Francisco.
This type of fat can be related to hormones, like those that kick in at menopause. That's when many women start seeing their tummies thicken.

Tension Plays a Role, Too

Your body also makes a "stress hormone" called cortisol, “which increases belly fat,” Angelone says. It narrows blood vessels and raises your BP to boost blood flow. Your body needs this in times of high stress. But too much cortisol can lead to blood vessel damage and plaque buildup, so it’s hard on your heart.
It can also lead to weight gain. The process draws fat from storage and sends it to your midsection. This has an inflammatory effect that can lead to heart problems, too.
It's a good idea to keep your stress levels down. Stay calm the best way you know how, or try out calming techniques like yoga and meditation.

Make Over Your Diet

These ticker-friendly tips can also help you watch your weight:
Look out for sneaky sugar. Did you know there's some in booze, for instance? “Alcohol is sugar,” Goldberg says. Same goes for sodas and sports drinks.
Swap fruits. Go for strawberries, blueberries, and raspberries instead of high-sugar bananas and grapes. They can quell your cravings just as well.
Watch the whites. Avoid bread and white-flour foods, like white rice. Brown rice and multigrain versions are better for you, but eat them in moderation, Goldberg says.

Try a Mediterranean-style eating plan. The diet is good for your heart and can lower blood sugar. You’ll eat more fruits, grains, beans, and nuts, along with healthy fats like olive oil.
Think spicy instead of sweet. For instance, use vanilla or cinnamon to flavor oatmeal and other foods instead of brown sugar and fatty cream. Try a dash of cinnamon in black coffee, too.
Avoid fads and quick fixes. Trendy diet kits and breath-stopping waist cinchers will always crowd store shelves. But there are no special exercises, devices, or diets that target belly fat. “As you lose weight, the weight will come off the belly, also.”
Eat healthy for the long haul. You might try a hard-core, fat-melting program, and you may pair it with a weight-loss drug. “But it’s not something that works for long term,” Goldberg warns. “People have to learn good habits. There’s no way around it.”
To help map out the approach that’s best for you, ask your doctor or dietitian to test your body fats. You can find out your chances of getting heart disease and learn what foods your body needs. You can also get checked for inflammationdiabetes, and other things that could affect your health. “Personalized care is the best option, and now with the testing available, is the best way to go to ensure success,” Angelone says.

Get a Move On

Stay active. Get up from your desk and take brief walks throughout the day, or while you make phone calls.
“Being more active all during the day will burn more calories than just going for a run once a day,” although focused exercise is important too, Angelone says.
Get out your bike, treadmill, or running shoes. Or just crank up the dance music.
“There are other ways to move than what we normally think of as exercise,” Goldberg says.
You can try aerobic-based DVDs or subscribe to an exercise channel or two. Smartphone apps are handy for keeping track of your fitness as well.
Whether you're young or older, you can lower your odds of getting heart disease if you don't smoke and you find ways to add exercise into your days.


source:webmd

Continue Reading...

Friday 23 December 2016

No.1 G5, a smartwatch that is really smart and inexpensive

No.1 G5 Smartwatch with sleek look, fast MT2502 processor, and a low price tag



The one thing that can make you stand out in a crowd is a good quality watch and if that watch is a smartwatch, you are sure to be a head turner. However, the smartwatches available from the majority of big companies like Samsung, Apple etc. are very expensive and out of the reach of normal smartphone users. Enter the all new No.1 G5 smartwatch manufactured by No. 1, a popular smartwatch company.
The No. 1 G5 smartwatch is sleek yet powerful. It is packed with tech features so that you can get the best out of it with your iPhone as well as Android smartphone. Let’s take a peek at how the No.1 G5 fares.

Build, Design & Display

The No.1 G5 is made up of stainless steel, which is suitable for both sports and casual wear. Which means that you can wear it at parties or while running and doing exercise. Other components include TPU plastic material and Sapphire crystal for its scratch resistant screen. However, the watch is not water resistant. The watch case is made out of 316L stainless steel that is resistant to any rough usage. The band is made of a soft rubber-like material, while the clasp is a thin metal. The sapphire screen above the metal body that is ‘anti-reflective’ and ‘abrasion-resistant’ is surrounded by a plastic, non-rotatable bezel, which has tiny markings as well as cardinal directions (e.g. N/S & E/W) on it.
The No.1 G5 has a round dial with a 1.2” OLED display that comes with a 240×240 resolution and MediaTek MTK2502 CPU processor. It measures 27.5 cm x 4.5 cm x 1.2 cm and weighs 49 grams. The reduced size of the watch makes it light weight and it fits smoothly into your wrist. It also has an automatic light up intelligent power-saving gravity sensing system automatic identification and light up. No.1 G5 is available in three different colors – Gold, Silver, and Black.

Battery

The No.1 G5 packs a large non-removable 380mAh battery, which represents a good 50% increase in battery size over “flagship smartwatches” like the Apple Watch, and the Samsung Gear S2, sneaking much closer to the likes of the Moto 360 and LG G Watch Urbane. As a result of the battery size, No.1 G5 lasts a full day with heavy use.

Software

The screen turns on by pressing the middle button, which displays the watch face of your choice. You can choose an analog, digital, worldwatch or a retro look as your watch face. To navigate, you use gestures and taps to interact with the touchscreen.
A swipe from left to right will change screens and take you through all the apps preinstalled on the tiny 64MB ROM, while a swipe in the opposite direction will move backward one context menu. Then, of course, you tap to interact with various options and elements on-screen. No.1 G5 uses an App called Fundo to connect the smartwatch to your Android smartphone or iPhone, which then syncs health information and notifications to the device.
Speaking of health, the smartwatch tracks steps taken quite accurately and estimates the number of calories burnt. It can also track your sleeping habits as well as heart rate and compiles these all into a nice graph on the Fundo app. It has a heart rate monitor, a pedometer function, and sedentary function that reminds users every time they have been on a prolonged activity.
The other major function of this app is notification control. You can control exactly which Apps can display notifications on the watch, and it performs admirably.

Connectivity and Support

The No.1 G5 supports both the iOS and Android operating systems and can be synced to a smartphone via Bluetooth 4.0 connectivity. It also supports remote camera mode, remote calls, and remote music playback. Languages such as Chinese, English, French, Russian, German, Spanish, Portuguese, Italian, Turkish are also supported.
There are three physical buttons on the right side of the watch face, which are of decent quality. On the left side is a thin micro-USB port for charging the watch. It comes bundled with a USB cable but not an adapter. You can charge it by plugging it into a computer or using an existing micro USB adapter with the cord provided by the company.

Conclusion

The No.1 G5 smartwatch is a decent, reliable watch that is smart. Since this is a smartwatch first, it is important to remember that the device does not constantly track your stats and activity. You have to open the related app and start a tracker. If you forget to start them, nothing gets recorded. However, given the expensive smartwatch brands available, the No.1 G5 smartwatch stands as a very competent smartwatch on its own in comparison to other smartwatches available in the market.
You can buy the No.1 G5 smartwatch from Banggood here for $30.99.
The holiday seasons is upon us and Banggood is offering a never in the lifetime offer of 50 percent off for the Christmas season. You can order No.1 G5 smartwatch and other electronic gadgets for 50 % off from here.


Source:Techworm
Continue Reading...

Thursday 22 December 2016

What Will Happen If Entire Internet Goes Down

What Will Happen If Entire Internet Goes Down

What would happen to us if the Internet went down…?

The DDoS attack which brought down the Internet in much of United States of America and  parts of Europe left users without Twitter, Spotify, Reddit, Netflix and many other websites. The attack also left PlayStation Network users high and dry throughout the day. The DDos attack was fuelled by your and my common Internet of Things connected devices like smart camera, CCTVs, smart refrigerators etc.
For those out of the loop, on Friday morning, a distributed denial of service attack against DNS provider, Dyn brought down websites and apps across the internet, temporarily barring access to Twitter, Pinterest, WhatsApp, and more for millions of users. While Dyn was able to stabilize the situation within a few hours, a second DDoS attack began in the early afternoon, again disrupting services across the web.
Dyn provides domain name system services, translating common internet addresses into machine-legible information that ensures you get to where you’re trying to go on the web. So every request you make for a website has to go through a DNS server. Citing Flashpoint, a security intelligence firm, Forbes reports that the attackers appear to have used a Mirai botnet against Dyn.
Mirai botnets exploit Internet of Things devices, taking advantage of their low security to employ them in DDoS attacks. In late September, someone going by the handle Anna-senpai released Mirai’s source code, and since then, the DDoS attacks using Mirai botnets have increased.
The 1.2TB DDoS attack using such Internet of Things connected devices caused a complete breakdown of the Internet in the United States and parts of Europe. What would happen if the Internet to the entire world goes down? Such a scenario has been actually predicted by a security researcher, Bruce Schneier. In fact, Schneier says that some unknown entity is already working on bringing down the whole Internet. Schneier in an essay last month revealed that companies responsible for the basic infrastructure of the Internet are experiencing an escalating series of coordinated attacks that appear designed to test the defenses of its most critical elements. It seems likely that the attack against Dyn which brought down the Internet on 21st and 22nd October was a part of this grand scheme.
So what happens if Schneier is right and the Internet is actually shut down?  We look at the impact if such a situation arises in near future.
A situation like this brings  E.M. Forster’s disturbing tale ” The Machine Stops” to mind. Written in 1909, it describes the downfall of a civilization that is totally subservient to an automated life-support system. Foster’s novel has its citizens thinking of the Machine as an infallible deity and live in their individual mechanical wombs, communicating and doing business only through the Machine. They worship it in their fashion until in the words of the author:
There came a day when, without the slightest warning, without any previous hint of feebleness, the entire communication system broke down, all over the world, and the world, as they understood it, ended.
Though we have not yet arrived at such a situation where the Internet is a god but it leaves no doubt that our lives totally depend on the being online today. Here are some things that would happen if there was no Internet :
1. No Social Networking = No online friends.  When Internet connection goes off, the first casualties are social network websites like Facebook, WhatsApp, Twitter, Snapchat. As soon as this happens, users who normally contacted their friends and colleagues through social media try to contact with friends and family through telephone lines. Due to overload, telecommunication services go down. Due to non-availability of Internet, LTE networks go down leaving users at the mercy of landlines.
2. No Internet = No News/Information Without the Internet you wouldn’t be able to get round the clock information like news, or weather forecast. Air-traffic can’t function, high seas become dangerous. Metros come to a complete standstill. Suburban train networks will run slowly bringing big cities around the world to a creeping halt.
3No Internet = No online banking/ATMs Online banking goes down. ATMs failures cause huge queues at banks. Banks face huge clearing pile up as the cheque clearing and money transfers have to be done manually.  This continues until the time there is a breakdown in services. There would be no PayPal or Visa purchases. Credit and Debit cards would become redundant as Point-of-Sales would not work. NYSE, FTSE, Nifty etc would stop trading in shares and stocks. WTI trades for Crude oil would stop as will Chicago Mercantile Exchange leading to stopping of commodities trade.
4. No Internet = No Satellites. The GPS network would completely breakdown as will the normal satellite communications. Everything which is connected to Satellites would have to be shut down.
The above some examples that come to mind easily. The Internet is much more than dominant in our life today than it was a decade ago. Also millions of IT workers who are dependent on the Internet would be out of work while big companies like Google/Facebook/Uber would shut down.
Seems like a grim scenario! Looks like Foster foresaw the situation in 1909 when he wrote ‘The Machine Stops’. Though there is a counterview to this. The internet is self-resilient.   It can’t simply be “shut down” – it’s not built that way.  Turning off the Internet is like shutting off religion. You just can’t do it.  Come to think of it… it’d be easier to turn off religion than to turn off the internet.
However, we seem to closer to making the Internet our god. Not in the abstract way but the Internet surely dominates our way of life with a god-like presence. Without the Internet we would surely be hurtled to stone age again as switching to manual way of doing things would be too difficult.

Time to remember that the Internet can’t just be turned off… but it can/could be stopped, of course.

Continue Reading...

Leaked images show Nokia P Flagship with 6GB RAM, 23MP Camera and Snapdragon 835

Leaked images show Nokia P Flagship with 6GB RAM, 23MP Camera and Snapdragon 835

Leaked Renders Show Nokia P Flagship To Come With 6GB of RAM, SD835 And 23MP camera

Looks like Nokia will live up to its reputation of bringing the best to its smartphone buyers. The yesteryears smartphone king recently confirmed that it would be making its return to the smartphone business with Nokia Android smartphones somewhere in March 2017. According to the reports, Nokia’s Android smartphone will be showcased at the Mobile World Congress 2017 in Barcelona, Spain in late February.
HMD Global, a Finnish company that currently holds the right over Nokia’s logo has already unveiled the first new Nokia device – the Nokia 150 feature phone.
However, a new leak (two pictures) originating from the Chinese social website Weibo apparently says that HMD is working on a premium Nokia Android smartphone dubbed the Nokia P. The Nokia P is rumored flagship device Nokia stable that is expected to released in early 2017.

According to Weibo, the flagship device will be powered by the Qualcomm Snapdragon 835 processor coupled with the Adreno 540 graphics processing unit. The chipset is said to offer download speeds of up to 1Gbps and come with 6GB of RAM. The phone in question appears to sport a metal body with an anodized finish. The pictures reveal the front and back panels of the phone, with the Nokia branding on the rear.
Further, it will boast a 23MP camera with a sensor made by Carl Zeiss, the well-known German manufacturer of optical systems. If previous rumors are to be believed, the Nokia P smartphone will sport a QHD display, i.e. a display featuring a resolution of 2560 by 1440 pixels. The Nokia P might come in 5.2-inch and 5.5-inch sizes and feature IP68 certification for water and dust resistance suggests previous rumors.
We have to take the new leaked information with a pinch of salt as not all Weibo leaks are genuine. But considering that Nokia is making a comeback, it has to be a jaw-dropping device which will awe and shock it’s buyers. And Nokia P flagship Android smartphone looks like one.

Source:Techworm 
Continue Reading...

Nokia sues Apple for patent infringement in iPhone and other products

Nokia alleges Apple stole its tech to make iPhone, files court cases in Germany and the U.S.


Nokia alleges Apple stole its tech to make iPhone, files court cases in Germany and the U.S.

Apple has been in trouble for copying tech and designs several times since the launch of iPhone in 2007 till date. Now it has another lawsuit to face this time from Nokia. Nokia says that Apple stole its patented technologies like display and even the iOS to make its own iPhone.
The yesteryears king of mobile phones, Nokia filed a lawsuit against Apple Inc. on Wednesday in Germany and the U.S. for patent infringement over intellectual property used in the iPhone and other Apple products. The suit was filed in Regional Courts in Dusseldorf, Mannheim and Munich in Germany and the U.S. District Court for the Eastern District of Texas.
Nokia says its complaint includes “32 patents in a suit across all of the actions, covering technologies such as the display, user interface, software, antenna, chipsets and video coding. Nokia is in the process of filing further actions in other jurisdictions.”
In a statement, Nokia said, “Since agreeing a license covering some patents from the Nokia Technologies portfolio in 2011, Apple has declined subsequent offers made by Nokia to license other of its patented inventions which are used by many of Apple’s products.”
However, Apple claims that Nokia’s failing cellphone business has prompted them to transfer patents to patent assertion entities to get out of FRAND (Fair, Reasonable, and Non-Discriminatory) licensing deals it established for essential patents, allowing the company to collect higher royalties.
From Apple’s complaint: “With its cell phone business dying, Nokia began to seek out willing conspirators and to commence its illegal patent transfer scheme in full force; that scheme has continued in full effect to the present. The driving force behind Nokia’s strategy was to diffuse its patent portfolio and place it in the hands of PAEs. Acacia and Conversant were its chief conspirators.”
On the other hand, Nokia’s own patent infringement complaint against Apple claims that the company has declined to establish licensing deals for Nokia technology that is used in Apple products.
Ilkka Rahnasto, head of Patent Business at Nokia, said: “Through our sustained investment in research and development, Nokia has created or contributed to many of the fundamental technologies used in today’s mobile devices, including Apple products. After several years of negotiations trying to reach agreement to cover Apple’s use of these patents, we are now taking action to defend our rights.”
This is not the first time Apple is involved in a patent battle. Earlier this year, it paid $24.9 million in a Siri patent lawsuit and $625 million in a Facetime patent lawsuit. And how can one forget, Apple’s famous five-year-patent battle with Samsung over design features. Luckily for Apple, they won that patent infringement battle against Samsung.

source: Techworm
Continue Reading...

Friday 2 September 2016

How to track you vehicle with your smartphone

A Brand New Tracking Method That Fits Anybody’s Budget.

Have you ever gone shopping and forgot where you parked your car? It’s happened to all of us. And wandering through the parking lot on a hot day clicking the panic button so your alarm goes off can be frustrating and irritating.
Now you don’t need an expensive GPS unit or annoying monthly subscription service to keep tabs on your car. You can track your vehicle without breaking the bank and it’s easier than you ever thought it could be!
As you know, most aftermarket GPS tracking units are expensive and must be installed by a professional. Similar services offered by car manufacturers as a “concierge service” are actually expensive monthly subscriptions that they conveniently hide in you car payment. Either way, they are both costly and require you to pay a monthly bill just to maintain the service. But don’t we already pay enough monthly bills? 
The good news for you is technology is solving many of life’s most annoying problems: Like losing and forgetting where you parked your car! 
One company has created a tiny device with an advanced tracking app that works with iPhone or Android phones and it could be exactly what you’re looking for. 

What is it?

It’s called TrackR, it’s about the size of a quarter and it’s revolutionizing the way we keep track of our important things. 
trackr-bravo-4

How does it work?

Simple! You only need to install the thin battery in the TrackRdownload the free app on your iPhone or Android, link the device to the app and then attach TrackR to whatever you want to keep tabs on. In less than 5 minutes you are ready to go!
Once it’s all set up you can even attach it to your suitcases when you travel, cars, your keys, your wallet, your expensive electronics and anything else you can think of.

The possibilities are endless!

Tracking your stuff really is that easy. No monthly subscriptions or bills to pay! You have enough stress to deal with – let TrackR keep tabs on your valuables while you tend to life’s real problems.
Lets say you want to track your car, simply hide the tiny device anywhere like under the floor mats, in the glove compartment or in the trunk. (Somewhere it won’t be found if your car gets stolen!)
maps
Now, if you ever forget where you parked your car you can quickly find it using your smartphone. All you need to do is open the app on your phone, click on the “find device” icon and it will tell you exactly where the TrackR was last seen and the coordinates of it’s current location.
Check out the video below if you want to see it in action.

You’re probably wondering, “how much is this thing going to cost me?”

Unlike most of the GPS tracking units sold today, the TrackR only costs $29! That’s a small price to pay for peace of mind isn’t it?

Now you’re probably wondering “Where can I buy one?”

update

Okay, but what else can it do? 

As we said before the TrackR has unlimited possibilitiesDo you have a pet that is always getting lost? Attach it to their collar and track them when they run out of the house. Do you find yourself misplacing your wallet or keys too often? Then attach it to them and never worry about them again! 
The TrackR even comes with two sided tape so you can stick it to flat surfaces like underneath bike seats or your expensive electronic devices (because bikes & electronics are easy targets for thieves!) 

Attach it to anything that’s important, valuable or easy to lose and then relax…

Now that you’re aware of the potential of this genius invention, we’ll go over how easy it is to use & set up, just so you don’t have any doubts: 
  1. Buy the TrackR today and it will be delivered to you in about a week.
  2. When you get it, install the battery in the TrackR, download the app on your iPhone or Android and link the device to the app, and then hide the device in your car (or attach it to anything else you want to track)
  3. Relax. Now you don’t have to worry about losing your valuables. TrackR has you covered! 
PRO TIP: TrackR is a great gift idea because THERE IS NO MONTHLY SUBSCRIPTION!
They have an amazing summertime sale going on right now and if you buy 4 TrackR’s they will send you 4 additional Trackr’s for FREE!
So pick up 4 TrackR’s and get 4 for FREE so you and your family can keep track of everything: Suitcases, pets, keys, bikes, toys, and even electronics like your iPad, laptop or kindle!
Continue Reading...

Monday 29 August 2016

Ivory Honors Nominees List [VOTE Pearl Okoroma as the mostbeautiful]

WhatsApp Image 2016-08-23 at 11.43.57 PM


IVORY honour award is here again, We have a lot contestant hoping to win an award, i present to you a lady i can guarantee you wont waste your vote upon, her name is PEARL OKOROMA  
All you have to do is to visit the following link and search for her name in the most beautiful category then click submit and share with your friends you can also vote as much as possible..
http://www.sirkenayo.com/ivory-honours-nominees-list-vote/


Continue Reading...

Wednesday 17 August 2016

It’s not all about ransomware – keyloggers are still alive and well!

Ransomware gets a lot of attention these days, and understandably so.
It’s the digital equivalent of a punch in the face: there’s no doubt what’s happened, and the crooks leave no stone unturned to make sure you know it.
Some ransomware not only creates some sort of HOW-TO-PAY document in every directory where there are scrambled files, but also changes your desktop wallpaper so that the payment instructions are visible all the time.
You can argue, however, that less visible malware attacks are even worse, especially if you only find out about them days or weeks after they started, and they include some sort of data-stealing payload.
Like the range of malware that SophosLabs researcher Gabor Szappanos (Szapi) was reviewing recently while working on a paper about Word-based attacks.
Szapi was looking at a particular subset of Word-borne hacks: what are known as exploit kits.
Exploit kits are pre-packaged, booby-trapped files that automatically try to take over applications such as Word or Flash as soon as you open up one of the malicious files.
The idea is to bypass any pop-up warnings that would usually appear (such as “you need to enable macros,” or “are you sure you want to install this software”) by crafting the exploit file so it causes a controllable crash in the application that just loaded it.
Szapi noticed that all of the exploit kits he’d covered in his paper (going by names like Microsoft Word Intruder, AK-1, AK-2, DL-1 and DL-2) had been used at some time to distribute data-stealing malware known as KeyBase.
His first thought was along the lines that “KeyBase ought to be dead by now, because it’s been around for a while, it’s well-known, and the author himself took it offline long ago.”

Sadly, however, the KeyBase Trojan is alive and well, even though it’s no longer openly available.
KeyBase is primarily a keylogger, meaning that it keeps track of what you type, collects up the data, and regularly uploads it to the crooks using innocent-looking HTTP requests.
When would-be cybercrooks set it up, there’s a point-and-click configuration system, so they don’t need any technical knowledge to decide what parts of your digital lifestyle to spy on:

Amongst other things, they can also keep track of what passes through the clipboard:

Monitoring the clipboard gives away plenty of information about your business, because you generally use the clipboard for items of immediate importance, such as copying-and-pasting text out of emails into documents, or vice versa.
That makes the clipboard a handy signal of interesting data about your business, such as this example data from KeyBase’s cloud-based servers:

KeyBase and other malware families like it are examples of Crimeware-as-a-Service (CaaS).
That’s where a group of technically-savvy criminals provides the servers and the control panels, renting out access to allow any number of non-technical crooks to jump right into the cybercrime scene.
Once a team of crooks has inside information on your business, such as your email passwords and a list of the people you do business with, they are well-placed to start bleeding you for money.
With ransomware, you generally know beyond doubt what has happened; you have a short list of choices of what to do next; and you have a firm price in Bitcoin staring you in the face.
But with system-sniffing malware like KeyBase to teach them how to login to your accounts, crooks can correspond with your creditors and debtors using your email address; change account numbers to divert payments; alter invoices; place bogus orders…
…and then, because they control your logins, they can cover their tracks (for example by deleting sent emails that you’ll know you didn’t write) to keep their swindle going as long as possible.
As we wrote in a recent article about a similar keylogging malware family known as HawkEye:
This is effectively […] high-tech crime available to low-tech criminals.
They [can buy] in the necessary booby-trapped documents; [buy] in the keylogger; [pay] someone to send very small quantities of spam; and then [settle] down to carry out old-fashioned, targeted deception and fraud.

What to do?

  • Patch promptly. Word exploit kits such as those mentioned above usually rely on security holes that have already been been patched.
  • Keep your security software up-to-date. A good anti-virus can block exploit kits, keyloggers and other malware in numerous different ways.
  • Beware of unsolicited attachments. This can be hard if your job is business development and the email is a Request For Quotation, but avoid opening just any old document.
  • If your email software supports it, use 2FA. That’s short for two-factor authentication, those one-time codes that come up on your phone or on a special security token. With 2FA, just stealing your email password isn’t enough on its own.
  • Have a two-person process for important transactions. Paying invoices and changing account numbers for remittances shouldn’t be too easy. Require separate approval from a supervisor, so you always get a second opinion when company payments are at stake.
Continue Reading...

Saturday 13 August 2016

How to Trace a Skype Message

You can make and receive voice, video and text messages from anywhere in the world using Skype. Any two computers or mobile devices connected to the Skype network can connect. Skype only displays the username of the person on the other end of the call, providing you with no way of determining where the call originate from. There could be many reasons why you might want to trace a call made via Skype such as harassing messages or trying to find a missing family member. By using your computer's command prompt and some online tools, you can determine a caller's IP address' physical location.

Step 1

In the Start menu or at the Start screen type "cmd" into the search box and press "Enter," which should launch the Command Prompt window. You can also find the Command Prompt utility in the Programs menu under the Accessories folder.

Step 2

Open Skype and sign in to your account. If you want to trace a recent call you should see the username in your “Recent Contacts.” Otherwise you may need find them in your contacts or search the Skype directory.

Step 3

Click on the contact that you wish to track and their profile information should appear in main window. Click on “Call” and wait for the person to answer. In order for you to trace their IP address, the contact must answer.

Step 4

After the contact answers the call type "netstat" into the Command Prompt window and press "Enter." You do not need to speak to them to complete the trace. You can also complete a trace by sending a file that takes a least a minute to transfer to the contact. The command prompt will create a series of IP addresses. In the Skype entry you will see the IP address of the contact listed under “Foreign Address.”

Step 5

Using one of many IP address-tracking websites you can trace the IP address such as What Is My IP Address, Whois.net, or IPaddress.com (links in Resources).

Tips

    Finding the IP Address will not usually give you exact physical location of the person making the phone calls or sending messages. It will give you the state, city, and ZIP code of the person, and law enforcement agencies can use the IP address to find suspects.

Continue Reading...

Friday 12 August 2016

Here is How to Find Out Who Has Been Accessing My Email Account

In the exciting age of digital technology, unfortunately, Internet users have become more vulnerable to phishing and hacking. Some of us have even experienced our email accounts being hacked. The obvious signs of this include emails appearing as though they have been read when you haven't read them yet or being locked out of your email account. If you think that your email account has been hacked, take sufficient precautions, such as changing your password. Next, you can attempt to find out who has been using your email account via their Internet protocol, or IP, address.


Step 1

Determine if someone has hacked into your email account. Check whether spam emails have been sent or forwarded via your email account, if any messages have been deleted or if unread emails have been read.

Step 2

Change your password -- preferably to a stronger password that is not a real word -- as soon as you suspect that your account has been hacked.

Step 3

Contact/call the company that provides your Internet access. The company's tech support will be able to help you track down the IP address using your email. If your email has in fact been hacked, you can also request that your Internet provider launch an investigation.

Step 4

Check the IP addresses of the activity on your email account on your own. If you use Google's Gmail, you can do this in one click. Open your Gmail account and go the bottom-right corner of the inbox. Under "Last account activity," click "Details." Here, a list of the most recent IP addresses that have accessed your email will show up.

Warning

    Even if you are able to locate the IP address that is gaining unauthorized access to your email account on your own, professional hackers will cover their tracks by hiding behind a proxy server. Also, an IP address does not give you the physical address of the email hacker; it only tells you the location of the ISP providing the connection to the hacker. Your Internet provider may be able to learn more during an official investigation.

Continue Reading...

Advertising

Advertise Here

Blogroll

About