Twitter is probably the most popular social network out, the reason i say this is because it is constantly moving slow and is always over capacity. Twitter is a free Social Network website that allows people to catch up and interact with others. It started of by naming the 5 star hotels that could be found in Philadelphia starting from the higest to lowest.Ģ. The first thing that i saw was nearby attractions, nearby airports, and nearby hotels.
In the search box i typed in Philadelphia, when i typed that a series of things came up.
I think that if people leave there wifi unprotected without a password than that must mean they dont care of other people use it thats why its unprotected.ĥ.The five thing the author mentions to help ypu with your email is Delete it, Answer it, Let someone else deal with it, Save it for reference, and tag it for later action.Ħ.The best way to avoid or block spam is to Dont let spammers know you exist, dont ever reply to a spam or click the unsubscribe link, and dont ever buy anything advertised via spam.ġ. If they dont know exactly what he is doing how can they fine him.
I think the incident with the man using the wifi was wrong i dont agree with it at all. Two methods to protect your wireless network is to hide your network, and encrypt your network.ģ. he also tells you to do is to check your computer security software, he also suggest that you can download free shareware programs. you can tell if someone is using your wi-fi by checking the logging function which lets you see what web sites have been accessed recently. the reason for these interferences is the fact that Wi-Fi uses unlicensed spectra.Ģ. The author mentions that wireless phone handsets are notorious for causing Wi-Fi disruptions. They also ask for your personal information.ġ.Wi-Fi is a set of instructions for configuring radios that allow computers to talk to each other without wires. Pharming is a type of identity theft committed when you land on a phony Web site. Phishing is a virus that gets a person to give up all their personal information to a person who will take it and use it to their advantage for credit card fraud or to use there social security number.
The warning the author states is that many of the companies offering free anti spyware software are actually spyware promulgators.Ħ. Two recommended programs to keep your PC free of spyware malware are Lavasoft's Ad-aware Personal, and investing a little money on a commercial anti spyware utility Webroot Spy Sweeper.
Key logging is a program that record every keystroke you make and email the file to the hacker who will sift through the logfiles for passwords, banking information, and credit card numbers. They can be bad for you because some website may not be secure and all your information can get leaked out and your email account get alot of spam mail.ĥ. They can be good use to you because you dont have to keep putting your email and passwords in once you log onto a site that you always go to. Cookies are text files that are embedded in most commercial websites, that helps remember you. It is important because after it erases the files, it writes over them with ones and zeros so that the magnetic particles that store the information lose all record of what they once held.Ĥ. One method the author recommended that I think i will try is deleting duplicated files because i often tend to edit some of my pics and and dont save over them so i do have alot of duplicate images.ģ. Thats were i keep all the junk i dont use anymore.
I make sure that eveything that i dont use or dont need is in a recycle bin or in a personal folder i use called stuff.
Five methods that the author recommends to maintain and tune your computer use a junk-cleaning program use Windows Disk Cleanup Utility get rid of unwanted applications delete printer drivers you don't need, and delete duplicated files.Ģ.