Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

What to do if you lose your smartphone?

What to do if you lose your smartphone?

Many phones are lost every day - and found, not always by the owner.

If you are a user of one of the "Smartphones", you must keep at least 2-3 passwords in your phone, whether from some social services or maybe bank accounts.

What happens when you lose your phone with all the data?

Symantec, a security software maker, conducted a test to find an answer to this question. They deliberately "lost"  50 Android phones in Los Angeles, San Francisco, Washington, New York, and Ottawa. The phones were loaded with identical apps, data, and files - and none were password-locked.

Symantec has found that in most cases - over 95% - people who find a phone try to access personal and sensitive data or services such as e-banking or e-mail.

What to do if you lose your smartphone?

  • First of all, set the password on your phone. Every smartphone has the option of unlocking the screen using a code, PIN code, shape, and more recently face recognition. Keep your phone locked even when you are at home, because at least once you will go outside and forget to lock your phone.
  • Avoid saving passwords for your applications. This will probably force you to use the same password on several services - which is a significant security risk not only in this case but in general.
  • If you have not done any of the above, and still lost your phone, it is a good idea to quickly find a computer and log in to your e-mail, online banking, and other services that you access from your phone and change passwords
  • If you cannot find the phone, inform the operator that it has been lost to switch off your service until you get another device.

Some police departments in the United States warn that smartphone thefts are on the rise. Robbers often try to sell phones for money, but those who buy them can try to access your data and services.

Comments

Popular this month

Mobile Browsers

The Internet on mobile devices is becoming more popular and has more and more users. As mobile internet expands, so do mobile browsers. Although the devices themselves already have built-in basic internet browsers, new browsers are constantly appearing. The reason is that each of the programs brings something new and useful. For example, Opera Mini is most popular on older phone models that use Java applications, while on Android platforms Chrome , Firefox ,  Dolphin , and xScope are more represented.

How to ROOT a phone in 30 seconds

Recently, an application appeared that ROOTs some Android devices in a few seconds! You don't need Odin or anything else, just that app, and in a few seconds, your phone is rooted. An app called  ExynosAbuse can be found on the XDA forum, downloaded, and installed for free on your phone. After starting, all you have to do is press " Root device " and it will do its job in a few seconds. You don't even have to restart your phone, you will only be notified that the ROOT has passed successfully and you will see the SuperSu icon.

How to change IMEI number on Android phone?

IMEI is an abbreviation of "international mobile equipment identity" and each mobile phone should have a unique IMEI number. You cannot change this number with the operator, but you can temporarily change it on your device. It allows the operator to accurately identify your device and thus enable/disable network services. Also, you can use the possibility of changing the IMEI number, at least for a short time, if you know exactly what you want, but I leave those ideas to you because this is an educational article.

Self-destructive email

Self-Destructing email is a service that offers a unique email address for a specified period, usually 10 minutes. After the scheduled period of the email address expires, it is automatically destroyed and all messages that arrived at that address. IMPORTANT : These email addresses can be detected! Look at the alternative .

Twitter is celebrating its sixth birthday

Exactly six years ago, one of the founders of Twitter posted his first tweet - " just setting up my twttr ". Although the popularity of this service was modest in the first few years, today Twitter has over 500 million users who send tweets, and messages 140 characters long.