Posts tagged How To
They are the favorites of thieves and store more data each time. Protect your information.
You may not have noticed but your smartphone lives in jeopardy. Just last week 150,000 mobile phones from different companies in China were infected by a virus called Xwodi, which records messages and conversations to be sent to a recipient unknown.
The virus arrives to users in a multimedia message with a link for free download of a program that promised to improve device performance. However, the real purpose is to capture Xwodi all voice and text information generated by the user, who can hardly notice him.
As if this were not enough, according to the Chamber of Commerce of Bogotá, in a report last July, the object was stolen mobile phone with 53 percent of all robberies.
To exposure with smartphones and their multiple uses, which make them closer to a computer than a phone, key protect the information stored. Here are some tips to learn how to encrypt documents, emails, text messages and photos. However, the first step you should take is to create a key input to the computer.
To encrypt (or encrypt)
1. You can protect your phone memory, memory card or both. When they’re not guarded as a whole, the state will look like ‘Off’.
2. It is possible to encrypt the memory card without using a key. This means that you can not use the micro SD in other devices. In the event that encrypt and store the key, remember to code in a safe place outside the device.
To decrypt the external memory (more…)
2 – The major distributions have a lot of useful programs and you can quickly and easily find online manuals for use and handling of such software.
3-On the Internet you can find a fairly large number of manuals, guides, and other technical information that will help you better handling and performance of Linux.
4 – Something that attracts the attention of Linux is its high reliability in safety, and that very rarely is attacked by hackers or viruses, making it a very reliable OS.
5 – Most people who use Linux have no problem with the start together with Windows.
6 – It is able to perform tasks far more efficiently than Windows, because Linux uses less resources, both hardware and software, its competitor Windows.
7-Have a system update and exit of new versions very frequently, about every six months.
8 – Tux is the mascot of Linux and is most loved and preferred the Windows logo that bears a resemblance to a butterfly, I personally have more fun TUX that Windows logo.
9 – If you see the advantage of a trained technician or engineer who can use Linux and know how to configure Linux servers earn more money than one who knows Windows, and that is rare and although not many companies have Linux on their computers or servers have a problem when there are few trained staff to fix which puts them in a better position.
10 – Some distributions allow copying of each of them much as you want, or better yet, you can request free distributions from their official websites of each of their distributions.
For you who has an iPhone, I think you you used to face this problem: how to unlock iPhone. This is one of the best service to unlock your iPhone 4. They have developed their own unique iPhone unlocking solution and they are confident to say that their unlock is the safest, most easiest iPhone Unlocking solution on the market today.
They have best solutions which is simple and failsafe, and will fully unlock any version iPhone, completely hassle Free, without having to worry about updates or complicated instructions! their Solution Enables you to activate any iPhone on any network, any carrier, any SIM card. No need to provide any information to AT&T, This is not a technical hardware unlock, No need to soldering/opening your iPhone. You can restore your iPhone to original state, You can use it on as many iPhones you want, works with any iPhone, any Provider, any Simcard! Fully iPhone optimized. (more…)
Between traditional PBX players are well positioned and start-ups to limited staff, the Post Office who wanted to install a VoIP solution in a new building, made a bold choice by awarding the contract to an SME. The beginning of a collaborative, value-added grew over time.
Two moves in quick succession in 2 years for a body of nearly 1,000 people and the need to settle in an old building where thenetwork needs to be redone. “Simplify, save, make the choice of VoIP, a technology that has market recognition,” offers Olivier Lenoir, head of IT infrastructure of the service at La Poste, which launches in 2007 containing a tender specifications providing 800 to 1,000 positions.
The traditional players are well positioned PBX and offer peak loads up to 30,000 jobs. But then, budgets are poorly understood … For the traditional PBX players have made an effort on the huge commercial IP phones they offer at competitive prices. But their business model does not allow them to engage on standard billing means services will be charged again, any new connection to the workstation as well. As for the French players in the VoIP, that are start-ups.
One of them, Proformatique, created three years ago but which in 2010 merged with Avencall, expert of Asterisk, a standard that has proven itself across the Atlantic and won for its strength and functional flexibility, moved XiVO its solution. “But will they align with the field teams sufficient to connect the phones on time? The Open Source VoIP Solution XiVO, will he good communications if hundreds of people are online at the same time? It was entitled to ask these questions, “recalls Olivier Lenoir, behind the tender. The Post did, however, a bold choice and “the tender was won narrowly by Proformatique, given the selection criteria set by equation, the overall cost of the investment, references and the structure of the provider” Olivier Lenoir said.
A night to connect VoIP 400 posts (more…)
How to Unlock Codes on BlackBerry Bold (9000), 8800, 8820, Curve (8300, 8310, 8320), javelin (8900), Gemini (8520, 9300), and Onyx (9700)
Note: NO SIM is required to unlock the phone. After phone is unlocked, remove the battery, insert SIM as desired and reinsert the battery. The phone must be restarted to use the new SIM card.
- Go to Settings
- Go to Options
- Go into Advanced Options
- Go Sim Card
- hold down the ALT key and press: MEP2 (Please note that you will not see what you type on the screen) *
- You will be asked to unlock the code. Enter and then press to confirm trackball and your phone is unlocked!
* If your phone is a 9700 or 9000 that require a second code (ie.Bell), please repeat until step 6 and press mep4 to enter the second code.