SECURITY ARTICLES




Can My Employer Monitor My Work Computer At Home?

Your employer has access to technology and legal authority to view your work computer while working from home.
Author: Gloria Mutuku
Monday, May 24, 2021



How to Check If an Email Is Legit?

It’s crucial for you to check if an email is legit or not as cybercriminals are continuously looking for opportunities to steal your valuable information by sending phishing emails.
Author: Tithi Raha
Tuesday, May 25, 2021



What types of cyber-attacks and how to prevent them?

Cyber attacks are here to stay as long as the internet exists. In this article, we will give you the best tips on how to avoid each attack.
Author: Faith Cheruiyot
Friday, June 4, 2021



Does private browsing actually work?

Private browsing works by simply blocking your browser from tracking your online activity whenever it is activated. For instance, when browsing privately, your browser will not save your browsing history.
Author: Collins Okoth
Thursday, June 10, 2021



Can You Get a Keylogger Just by Visiting a Website?

A keylogger can get installed into your computer in a matter of a few seconds by visiting an infected website. Learn how these malicious programs work and how you can protect yourself.
Author: Tithi Raha
Tuesday, June 22, 2021



What Is End-to-End Encryption in Messenger?

End-to-end encryption, in simple terms, is encrypting or scrambling messages in such a way that they cannot be decrypted unless by the recipient. So the recipient receives the message in an encrypted form and decrypts it.
Author: Collins Okoth
Tuesday, June 22, 2021



Cyberstalking and How to Protect Yourself From Identity Theft

Cyberstalking is a type of online harassment where a stalker carries out unwanted, persistent, and often obsessive behavior over email, online media, and mobile technology.
Author: Ian Musyoka
Wednesday, July 7, 2021



Computer Repair: How to Detect Crypto Mining Malware

On average, cryptojacking victims report abnormally high CPU usage, slow running computer, hot computer fan, server overload, and a shortened battery life. These crypto mining malware are hard to detect in a system as they are designed to run
Author: Ian Musyoka
Monday, July 19, 2021



Unlock PDF: How to Remove a Password From a PDF File

pThere are three ways using Acrobat DC Google Chrome or password recovery programs However though each has its own limitations and power Depending on the restrictions on your PDF file each of the named methods can remove passwords at a certain levelp
Author: Fay Kokri
Wednesday, September 15, 2021



What is HTTPs, and Why Should I Care about it?

pThere are two types of protocols between a web server and a web browser that is HTTP and HTTPs The HTTPs protocol is the secured version of the two while HTTP is unsecuredppA secured protocol means that the sessions between the web browser you are u
Author: Collins Okoth
Wednesday, October 20, 2021

ver: 20230311S160933
×

MEMBER
Login
COMMUNITY
Forum Blog
SERVICES
Android Repair Backup Custom PC Build Data Restore DC Jack Diagnostic Email Migration Email Setup Game Console Repair In Home iPad Repair iPhone Repair iPod Repair Mac Repair Monitor Repair Networking New Computer Setup Printer Repair Remote Assistance Security Smart Home Stereo Repair Tablet Repair Theater Tune Up Tutorial TV Repair
ARTICLE CATEGORY
Android Apple Cloud Device Technology Ethics Hardware Troubleshooting Internet Network Personal Computer (PC) Product Review Security Software Asset Software Troubleshooting Technology Concepts Windows 10 Windows 11 Windows Software