protecting privacy online is a subject that is on everyone’s lips because it is essential to browse the web. The tips to safeguard our personal information (and that of family or friends) Internet are many and have different scopes , but in this article I will approach the most important.
Some basic guidelines to protect our data are established for quite some time:
- not publicly disclose passwords and credit card numbers;
- DNI numbers, physical addresses and phone numbers in particular social networks, forums or websites;
- social networks to personal content is not visible by anyone;
- Choose strong passwords and update them every certain period of time,
- data entry and downloading files from unknown sites or untrustworthy;
- Search the web references before testing a site or service with potential to access private information;
- not answer e-mails of support with personal information or login credentials.
These tips are “among the most basic core” and are of great help, but not always sufficient to protect privacy online . Then I leave a list of tips and tools for improving the security of web browsing.Verification
system two-step verification requires users online service to confirm its legitimacy through a security code sent by text message. This kind of protection is not yet widely adopted, but companies like Google, Facebook and Dropbox offer this possibility.
activate two-step verification users have to integrate a cell phone number to their accounts. Thus, each time they log into a PC browser or unknown receive a security code (one and only) by SMS to be compulsorily enter.
The beauty of this system is that you can rely on computers or everyday applications to avoid repeating the process continuously. To activate the configuration in two steps:
- Google.com: Account | Security | two step verification .
- Dropbox.com: Settings | Security | two step verification .
- Facebook.com: Account Settings | Security | Login Approvals .
Some services that implement
verification in two steps also enable the use of application-specific passwords. This saves problems on platforms that do not accept the security code entry. Google and Facebook are two of the services using this method.
application password automatically generated key is a single use and . It is usually used in mobile and desktop applications. Then I leave an example of its implementation:
- After enabling two-step verification in Google want to log on to Gmail for Android. The e-mail client does not support the entry of a security code, so they need an enrollment application.
- To generate must log on to Google.com and enter Account | Security | Applications and sites online . At the bottom of this page is the section passwords applications. There have to enter the name of the application and press “Generate Password” . Subsequently
- should use this key to log into Gmail for Android. If you ever lose your phone, you have to enter the same section and revoke access to this application password. This way no one can see your emails and not have to change the original password , but generate a new application-specific password.
on Facebook must be a Account Settings | Security | Passwords applications .
trackers and advertising
statistics and advertising platforms collect data of Internet navigation to display announcements. If you do not want to register their tastes or behaviors online is sent to different companies can take advantage of extensions as AdBlock, Ghostery and AdBlock Plus . You can read the review we published recently to know the main features of such tools.HTTPS Everywhere
This extension for Mozilla Firefox and Google Chrome was developed jointly by the Electronic Frontier Foundation (EFF) and The Tor Project. The goal of the utility is encrypting communications between users and websites of large caliber . HTTPS Everywhere HTTPS enabled on all sites that support it partially but not used by default.
With this add is possible to send data securely, without worrying about spies trying to steal them. The version for Mozilla Firefox is the most recommended and advanced, as destined to Google Chrome is still in Alpha. Both editions can be downloaded via the official site.DuckDuckGo
Google, Bing and Yahoo! search engines are the most adopted worldwide but have a major drawback: the user information stored. If you are concerned about privacy and do not want their data end stranded for months (or years) in a company server, DuckDuckGo is an excellent alternative to consider.
is a web browser that delivers results from multiple sources and not track or store user data b>. It also provides a lot of information about how they collect information the major search engines (Google, say), and its own selection of tools to prevent online trackeo.
So far we talked about the protection of privacy and blocking trackers that collect information based on criteria navigation. But this does not make you invisible on the web. If what you really want is enjoy the web without leaving traces have to try Tor.
This utility includes an Internet browser and tools that help online anonymity. Instead of connecting directly to a user with a specific website, software misleads potential spies “bouncing” on the Tor network. It is an application that deserves to be tested and is available in Windows, Linux and Mac OS X .
official website of The Tor Project have much documentation on the origins, the installation and use of the browser, so aprovéchenla.
Image via The Tor Project .
Improve the safety of our Android Smartphone is not very complicated. Through a few simple steps, in fact, be very easy to make your phone a completely safe device. Since we have discussed above ElGeek with which applications can improve the security of our Android. Lets look at some tricks you keep safe, too, our phone.
1. The release pattern, a simple way to ensure our Android
. One of the most popular phone lock is unlock pattern. With this pattern, you can set a password on a panel of 3 × 3 points, and use that model to unlock device. It’s not like the PIN block, which uses numbers to lock the device, but a password is easy and intuitive for anyone but yourself, you can access the phone. Do not take more than a few seconds unlock and thereby gain a lot in security.
2. Applications user information in the unlock screen
placed in the locked screen information why the phone can sernos returned. Not an option Android native, so we’ll have to install the application, which is free on Google Play. Two applications do, and well:
Phone Found – Owner Info
3. No device rootear
rootear eliminate certain restrictions that are imposed on the device by the manufacturer, which means that a series of guarantees that were used to help protect your phone from bits of malicious code and are no longer dangerous. If we do not properly use the Root of Android, better not.
4. Get applications at the official store of Android Market
say that the surest way of obtaining an application is doing in its original source. application download third-party sites do not offer any guarantee about whether what we are installing our device is not actually malware.
5. Antivirus for Android
malware on your Smartphone , and to maintain proper operation.
6 . Wireless Connectivity
golden rule is a good idea off all wireless connections unused. If you go away you should turn off Wi-Fi, until you are in the range of other known network. This will save a lot of battery life and reduce the risk to connect to malicious parties or even detect your device without your knowledge.
There are currently over 100 million users of Mac OS X worldwide. Despite what everyone thinks that Mac is invulnerable to viruses and cyber attacks, this is not true , and is likely to increasingly look more attacks on Apple computers, focusing on two main aspects: the outdated programs and neglect by users. Thus, we can launch with the help of Kaspersky Lab, these 10 simple tips to increase the security of your Mac:
1. Create an account other than Administrator for your daily activities
To do this, go to the “Accounts” in “System Preferences” and creates a non-administrator user. Use the new account for your everyday tasks such as email and web browsing.
2. Use a browser that has a ¨ ¨ sandbox to isolate processes, and a history that demonstrates that addresses security issues
recommend Google Chrome many reasons, first is that is updated more often than Safari, Apple’s default browser. Besides having its own sandbox, Chrome has a version of Flash Player which is a valuable barrier to malicious exploits. Make sure the new browser in your default Web browser.
3. Uninstall the standalone version of Flash Player
a common target for cybercriminals attempting to gain absolute control of your computer. To uninstall Flash, You can use two tools from Adobe, one for the other versions 10.4-10.5 for 10.6 and up.
4. Solves the problem of Java
Flash Player, Java is one of the favorite targets of exploits writers who want to install malware on your computer. We recommend that you uninstall completely from your computer. Unfortunately, Apple does not allow Oracle updates Java for Mac directly. They do it themselves, and usually many months of delay. This means that Mac users are exposed to threats for much longer than those of PCs
5. Run “Software Update” and patches your computer as soon as updates are available.
old or outdated programs . The programs most often attack are Microsoft Office, Adobe Reader / Acrobat and Oracle’s Java, but other applications. When you see the warning “Software update” from Apple, be sure to install patches and reboot your computer when needed.
6. Use a password manager to help you avoid phishing attacks.
“Keychain” . Whenever possible, try that passwords are unique to your resources and strengths and put them in the keychain instead of remembering passwords easier.
7. Disable IPv6, AirPort and Bluetooth when not needed.
8. Enables full disk encryption (MacOS X 10.7 +) or FileVault
Lion, Apple updated its encryption solution (FileVault) and added full disk encryption. This is known as “FileVault2″. It has the advantage that ensures the whole disk instead of just your home folder, and can be very useful if you steal the computer.
9. Upgrade Adobe Reader to version “10″ or later.
10. Install a good security solution
infected worldwide. Today, any Mac user urgently needed to have a security solution installed on your computer.
Font | Kaspersky Lab
Infections, malwares, viruses, etc.. , are the next item on our computers. And most of the time they are admitted to our PC despite having security measures (antivirus, firewall, etc.). Appropriate. What is the key to prevent your computer from getting infected? For it is not having the most expensive antivirus market, but to sail safely and perform some simple steps to keep secure the personal files of your computer.
Your PC, always updatedUpdate the PC
often , keep it clean and WIN navigate responsibly helps cybercriminals to access personal data stored in the PC and WIN improves user safety . Increasingly, cybercriminals exploiting security holes and patched but not corrected by the user. It is therefore advisable to keep your computer updated and clean, and responsibly navigate to prevent possible further infections.The digital cleaning is very important to prevent the entry of virus into the computer. But this is not only recommended cleaning is performed on the PC but also on mobile devices that connect to the Internet as ‘smartphones’ and ‘tablets’. It is recommended remove user accounts that are no longer used , at least for online stores, auction sites or associated with bank details. should also be remove those accounts that the user no longer uses q ue were made circumstantially for reasons of travel, leisure, professional information, among others.
social networks, a source of infection
It is important for defense against ‘cyber’ take time to bring order to social platforms , and to review the privacy options they offer. Many users have long lists of contacts have come to accept indiscriminately. It is therefore recommended eliminate those “friends” who are not known or are difficult to identify . Thus the information you shared on the network will spread in a more controlled and not come to strangers. As for the passwords that are used to protect these social networks, it is advised that are replaced from time to time . It is important not to be repeated in different accounts and alternate alphanumeric characters and is case sensitive.
How to properly clean your computer
convenient constantly keep your computer updated , especially the operating system and browser. It is also recommended always eliminate all those programs where manufacturers do not provide updates. All those duplicate files, temporary will not be reused also should be removed comprehensively . Removing them is able to improve the computer speed significantly.As for ‘Cokkies’ , web history and files related to Internet use should also be deleted frequently. This can be done now include among their browsers settings the opportunity to automatically delete. Finally it is also good to avoid losing data after an attack make a backup of the hard drive and use a comprehensive security solution, which should be regularly updated.
also smartphones or TabletsRecommendations to more securely maintain a ‘smartphone’ or ‘tablet’ , are verify the installed applications on these devices and the permissions that they have. It is also necessary to check the memory card or internal memory of the terminal If some toner any files related to uninstalled applications. These devices should have an antivirus system is updated regularly , because as happens on the PC, when connected in the network suffer everyday risks of being attacked by viruses and malware.
The new version of the most widespread mobile OS in the world, Android 4.0 Ice Cream Sandwich, includes some new features that are sometimes hard to find. The main advantages of Ice Cream Sandwich is the redesign of applications, the new graphical interface and memory management. Now let’s see some tricks or utilities that probably do not know and may be useful once you start using Ice Cream Sandwich on your Android device.
Notification multicolor LED
while recording video
intervals recording time
Data Connection Limiter
Complete management of background processes
Ice Cream Sandwich
includes, as we have seen, a manager of multitasking with a specific button. In pop-up menu can close applications by dragging them out.
Uninstall applications menu
be uninstalled directly, for which we must hold the icon for a few seconds, and then drag the option to “delete” shown at the top.
Remove the Google search bar
Ice Cream Sandwich
comes with a permanent search bar of Google on your desktop , but you can delete and restore. To do this, we must go to Settings -> Applications -> All -> Google Search, and click on “Disable”. The downside is that the space occupied by the bar can not be used to customize, so that would be blank.
annotation of images
any photo or screenshot, if To add a note, we can open the gallery, and accessing the edit menu in the photo, add a note to the image.
See the description of a button
Android is now the operating system most used and popular smartphones in the world. Like all other operating systems, also has many applications and thousands of programs that are coming every day. Enjoy full Android experience is in most cases too expensive, as most of these applications are through the payment of an increasingly large amount of money. Not all users are comfortable or familiar with the buying premium applications or payment, and another problem is to pay a price for an application that does not accomplish its mission or not we worth .
Today, the Android open system allows us to install third party applications without any restriction, and also install applications that are extra premium and you can find them free. But how to download these applications? From here do not support piracy in any way, and advise that, if an application you like, pay for it in Google Play , which will give the best support for the application, with constant updates.
How to find the online application
Once you enable this option, you can install any application from the Internet. If you know how Google search , you will find very quickly. Type application name in the search and then added the name of file sharing sites as MediaFire.com, 4Shared.com, FileSonic.com and so on, along with Android. Here, for example, has used the 4Shared.com server:
In the search result is the link to download the application, which is completely free . Open the website and download the application free.
GetJar, applications “pay” for free
GetJar Market is another alternative that works like all types of software the same: here are hung applications listed and paid shops in Android, and here are totally free. Getjar but is, in turn, as these. The trick is that GetJar pact with the developers to pay a previously agreed amount for each discharge is made through this application, so get everyone wins something : the user gains the application for free, the developer gets benefits, gets GetJar users and increase advertising revenue. The steps to download a free application through GetJar are:
If the application has met the expectations you had to download it, we repeat that ideally buy it legally in Google Play (formerly Android Market), then get completely support as Google and developers and you can keep track of all application updates offered. But before addressing the purchase of the application, using these simple tricks you can access the download and installation backups from them, with which you can check how the application before deciding to buy it .
Font | Techshouters, Android.es
time discussing battery problems experienced by some users of Linux distributions , especially for those with the 2.6.38 kernel. The duration of these batteries can be significantly reduced in that case, even with newer kernels 3.0 and 3.1-future, but at Phoronix have some tips to help prevent these problems.
an exciting new Michael Larabel article offers some tips to not only solve that problem, but for our laptops even more efficient power consumption, and focus, though, the users laptops with Intel chips (both CPU and GPU), and the new Sandy Bridge. Here are the tips:
These options can be added to the boot loader in the file GRUP / boot / grub / grub.cfg to make them permanent, or can be passed by hand to i915 load the module in case of counting on such chips. If you do not use the Intel graphics driver for Linux these changes will not offer any improvement in the autonomy of your battery.
Phoronix tests conducted with teams that did possess such GPUs and showed that indeed the battery consumption with these options enabled can make significant improvements in various scenarios, so if you have a laptop with Intel GPU, try it.
across the web we can find a multitude of good advice to be more productive, many having to do with planning, avoid distractions, organizing time, among others. However the great possibilities of settings with the desks in Linux allows us to take advantage of certain “technical details” that we can use to squeeze even more time when making your daily tasks on the computer.
is why, bypassing many of the excellent general advice is to save time and be more productive, get 10 tips on writing activities, programs and settings that can be done in Linux and powerful desktops (especially GNOME and KDE) that I personally have helped a lot to be faster, saving time and ultimately be more productive with the little time we have .
Organize your desk
Although Linux desktops are designed to be functional and practical, we can always make changes at will to leave it as needed, take advantage of the many customization possibilities that exist to be well equipped for the job , but remember that overloading the desktop can be completely counterproductive.
2 workspaces and window management
option we can use it to organize our activities and quickly access them expeditiously and avoiding the confusions that occur when you have many windows, especially if you use advanced window managers. Set shortcuts to jump from one desktop to another easily and take advantage of multiple options for managing Kwin and Compiz window.
3 Use the keyboard shortcuts
program in every system and always have the option of perform some functions quickly by keyboard shortcuts , from basic ones such as Alt + Tab, to others that are related to functions specific. It is important to use these shortcuts, or set up your own in the “Keyboard Preferences” or “combinations”.
4 Avoid unnecessary clicks by the mouse wheel
Linux can use the mouse wheel for various functions , for example to navigate between tabs or windows to focus on the Taskbar or Dock, you can also use the wheel as a button to open links in New tabs, use drag and drop wisely or go from window to window if you press on the window title, among other tricks.
5 Use a pitcher
available for Linux have multiple launchers, some basics that come by default and other more intelligent and Kupfer, GnomeDo and Synapse. Either way, set up or learn quick access to it to be a couple of keys for each application , folder or file. Moreover, the three mentioned have multiple functions to make everything faster and easier.
6 Take the “drag and drop” in its entirety
are several programs that support the option to drag and drop objects between them , because it can, for example, take the browser files an application or vice versa, you can also drag portions of text from one side to another and even taking them can open files and taking them to the icon of the program you choose (provided it is compatible).
7 customer uses for web mail, news and other online services
Although the advantage of the cloud is able to “access to everything from a browser,” the fact is that sometimes load all the browser can be slow and annoying , for example if you give a intensive use GMAIL, sometimes it’s best to set up a client like Thunderbird, Kmail or Evolution to manage emails, Internet and not depend upon to perform some tasks that do not require it.
Avoid unnecessary distractions
related to point 1. Evita additional notifications, alerts, plasmoids or applets too flashy, not of much use, among other things. On the other hand you can use programs such as Focus Writer to stay focused on your work if yours is to write and even maintain full-screen applications also helps.
9 uses a clever music player
Recently we talked about music players that are available for Linux and the fact is that there are many very good, some of them support radios and smart playlists avoid you having to be directing the music going to listen to while you work . But of course if the music distracts you, it is best avoided entirely.10 Use
programs to organize your time
calendars and task lists to alarm systems and tools to measure time. Can use a multitude of programs that can help you organize, measure and better manage time , some of them are integrated into the mail client and others are more specific such as Remember the Milk, the applet Hamster KTimeTracker GNOME or KDE.
Well, those are some tips, of course, some will be more useful and practical than others and many also require certain minimum skills to get them started, however take some time to adjust our system for once can deliver significant savings of time later , so worth a try. And you do what other ways have failed to improve your productivity in Linux