Author Archives: buyinza

Cloud Computing

cloud computing

Cloud computing can be defined as a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. It is now evolving like never before, with companies of […]

Phishing Attacks and How to avoid them

phishing

At least anyone using the internet and has an email address has seen or received a phishing message once or a couple of times before. I am going to talk all about it here in this blog. Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message […]

Incognito Mode: What is it? What can and can’t it do?

incognito mode

Incognito mode, also known as Private Browsing, is a privacy setting that creates a new session that doesn’t save your activity to your computer. This activity may include browser history, cookies, cache, and login credentials. It allows you to go undercover when you’re browsing on the internet. Any searches or websites you visit in Incognito […]

Best tips to stay-safe online

Staying Safe Online

The Internet can feel like a dangerous place these days, With hacks, scams, malware and more. The Internet-connected appliances has opened us up to even greater risks. But the good news is that by taking just a small handful of security measures we can greatly reduce our exposure to all these threats. Here are some […]

How to enable two-factor authentication on your social media accounts

Social network

With the increasing popularity of social media platforms, security is of paramount importance. While choosing a strong password helps, 2FA improves your security further. Here is how to do just that for some of the common and most used platforms. 1. How to enable Two-factor authentication on Facebook: To enable two-factor authentication on Facebook, head […]

Two-Factor Authentication

two factor authentication

Two-factor authentication (usually abbreviated as 2FA) comes in different forms with some doing better than others. Hopefully you have heard about two-factor authentication, its pros and cons. Requiring something beyond just a password to unlock your online accounts makes them harder to break into. Tip: Keep in mind that two-factor authentication is different from two-step […]

Android App Permissions and how to manage them smartly

sns

App permissions govern what your app is allowed to do and access. This ranges from access to data stored on your phone, like contacts and media files, through to pieces of hardware like your handset’s camera or microphone. Granting permission allows the app to use the feature; denying access prevents it from doing so. Ever […]

Everything you need to know about 5G network tech.

tech news

5G is the next generation of wireless networks and promises a mobile experience that’s 10x to 100x faster than today’s 4G networks. When more smartphones and networks support 5G tech, it will have far-reaching consequences for consumers, from the cars we drive (or that drive us) to the food we eat to the safety of […]