Tuesday, 14 August 2018

what is Phishing?

phishing is a term used to describe a malicious individual or group of individuals who scam users. They do so by sending e-mails or creating web pages that are designed to collect an individual's online bank, credit card, or other login information. Because these e-mails and web pages look like legitimate companies users trust them and enter their personal information.

How to identify a phishing e-mail.

  1. Company - These e-mails are sent out to thousands of different e-mail addresses and often the person sending these e-mails has no idea who you are. If you have no affiliation with the company the e-mail address is supposedly coming from, it is fake. For example, if the e-mail is coming from Wells Fargo bank but you bank at a different bank.
  2. Spelling and grammar - Improper spelling and grammar are almost always a dead giveaway. Look for obvious errors.
  3. No mention of account information - If the company were sending you information regarding errors to your account, they would mention your account or username in the e-mail. In the above example, the e-mail just says "eBay customer", if this was eBay they would mention your username.
  4. Deadlines - E-mail requests an immediate response or a specific deadline. For example, in the above example, the requirement to log in and change your account information within 24 hours.
  5. Links - Although many phishing e-mails are getting better at hiding the true URL you are visiting, often these e-mails will list a URL that is not related to the company's URL. For example, in our above eBay example, "http://fakeaddress.com/ebay" is not an eBay URL, just a URL with an "ebay" directory. If you are unfamiliar with how a URL is structured, see the URL definition for additional information.

                                                                                 source:Computer Hope

Know to RJ-45 and making networking cable

Registered Jack-45, an RJ-45 is an 8-pin connection used for Ethernet network adapters. This connector is most commonly connected to the end of Cat5cable, which is connected between a computer network card and a network device such as a network routerThese connectors can be purchased at most electronic stores and computer stores. get more than you think you need.

next topics are how to make a network cable


  1. Cat5, Cat5e, Cat6, or Cat7 cable - This cabling can be purchased in large spindles at stores that specialize in cabling. Cat6 cabling is the most commonly used cable used today for networks.most network cables consist of a green, blue, orange, and brown pair of cables.
  2. There are two cable standards T568A and T568B, each twisted-pair. If you want to create a straight-through cable, both ends of the cable should be identical and should match the T568A. If you want to create a crossover cable, one end of the cable should match T568A and the other should match T568B.
  










Speed up Windows 10

Turn off shadowing and visual effects

To turn off these resource draining features, follow the steps below.
  1. In the Search Windows text box, next to the Start button on the taskbar, type sysdm.cpl and press Enter.
  2. In the System Properties window, click the Advanced tab.
  3. On the Advanced tab, click the Settings button in the Performance section.
  4. In the Performance Options window, select the Adjust for best performanceoption, then click the OK button.

General PC Tips

  Adjust any setting on your PC with the Windows “God Mode” folder, which is a centralized Control Panel for all the OS settings. Access thi...