Archive for the ‘Security’ Category

locate i Phone,apple iphone,cell phone number tracker,cell phone tracker,cheap iphones,cheap iphones for sale,find my iphone,i phone 4 deals,imei tracker,iphone 5,iphones for sale,latest iphone,locate i phone,locate my iphone,mobile number locator,mobile number tracer,mobile number tracker,mobile tracker,mobile tracking system,number tracker,phone,phone number tracker,phone tracker app,phones for sale,refurbished iphone,track my iphoneIn recent years there have been many stories about how iPhone and iPad have located stolen or lost due to location services and the Find My iPhone app. Both the application and the service are free tools and therefore worth activate to prevent shock.

For the application to find my iPhone function, location services must be enabled on the device you’ve lost or stolen, but of course, the success stories are warning potential thieves that this functionality exists and if the thief is He’s good at this type of equipment most likely to know how to turn off location services.

Fortunately there are ways to prevent off location services simple and inserting it much more difficult for the thief. It’s pretty simple, just go in the App Restrictions Settings; these are the steps to follow:

Executes the Settings app

Click on the General

Low and click on the section Restrictions

Click on Enable Restrictions, asks for a PIN code. Advisable not to use the same PIN that phone.

Once activated the restrictions, searches Listing Location.

From that moment to turn off location services to use the PIN code.

Of course there are ways to bypass these protections, but at least the savvy thieves will find it difficult and more opportunities to recover your device.

The downside is that every time you install a new application you need to use location services should go to the Restrictions panel and allow that application to use location services.

In any case I recommend the activation of these restrictions on all your iOS devices, better safe than sorry.

Protect anroid device,adroid market,all android phones,android 3.0 honeycomb,android phone reviews,anroid phone,droid,encryption software,google android 2.2,internet security 2011,lookout mobile security,mobile device security,mobile security,mobile security 9,mobile security review,password protect,password protection software,protect anroid device,top 5 android phones,upcoming android phonesMany cell phone users worry that the same thing happens to them on their computers, that is, to become infected with viruses, spyware, malware, rogues, etc. Android is based on the Linux kernel, this is the core of the system, and is quite safe. However, every system has weaknesses, the following are some suggestions for your information protect from malicious software.

1. Download applications only from Android Market

As Google realizes that there is a malicious application removed from the Market and uninstall it from your phone. If you install without using the Market, you’re on your own, because Google cannot rid your computer.

2. Please review Reviews and Comments Applications Downloads

Do not be fooled by the appearance of an application, read the reviews and comments from users who have downloaded. So you’ll know beforehand if the system slows down the application. or if you have some strange behaviour.

3. Beware of applications that require many permits

Must be wary of asking many permits applications, such as access to your contact list, or access to your SD memory, or send SMS. With these permissions an application could steal data or, for example, send SMS to paid services without you knowing about.

4. Do not store sensitive information on the phone

Not store bank details or passwords in the ATM cell. Malicious applications can take over this data. Or you can simply lose the phone and get someone else’s hands.

5. If you lose the phone, deletes the information remotely

Install an application such as Norton Smartphone Security or SMobile Security Shield, you can retrieve your information and delete it remotely in case of loss or theft. If you motoblur, already have this functionality

i phone private data,cell phone spyware,cell phone tracker,cricket phones,investigator jobs,locate my phone,lost phone locator,phone tracker online,phone tracking software,private eye,private investigator,private investigator jobs,private investigator licenseUnlike the first GSM phones contain a Smartphone like the iPhone a lot of personal data in example email messages, pictures, contacts, user names and passwords.

When you buy a new iPhone and your “old” iPhone to resell it is very wise to put all your personal data to delete. The iPhone is standard and option available, it removes all data and overwrites the freed disk space three times with blank data.

For all personal data contained on your iPhone to delete, go to the menu option:

General Settings ▸ ▸ ▸ Reset option: Delete all settings

Tap on the button ‘Delete iPhone’ to confirm your selection.

Depending on the type of iPhone that you can use to delete from 10 minutes to 1 hour. Once all data has been removed, the iPhone will automatically restart and all your personal information deleted safely. In the display of the iPhone will reboot after the default text “Connect to iTunes appears.

apples new apps, calendar for ios, download ios 6 now, gmail ios contacts, ios 6 calendar, ios 6 compatible tweaks, ios 6 developers, ios 6 for developers, ios 6 google, message ios 4, newest ios apps, permissions for apps, privacy settings on gmail, you tube ios, your privacy with ios 6, ios 6, Related post

Main problem with iOS 6

Apple map review

Tips for protect your iPhone/iPod touch

How to extend iOS battery life

Why you jailbreak iPhone

Personal data assign to a device, many have a bad feeling. Your personal information behind in various applications is not without risk, there can always be information leaks. Fortunately, this is not common.

In iOS 6 are measures that the unauthorized use of personal guarantees better. Apple’s privacy protection thoroughly addressed and now it is quite easy to manage all the applications that use your personal information. Additionally, you now own application permission to use your data to use.

Privacy has its own preferences menu; here you can find all the settings for location services, contacts, calendars, reminders and find photos. Additionally it is possible to manage all application that use Twitter and Facebook. The setting for location services is not unknown in iOS and remained virtually unchanged. The other privacy settings, however, is new in iOS 6.

With the switch in location services have the ability to set the option on or off. When this option is disabled application cannot determine your location. The location services are also used to accurately determine your location, such as the maps application. (more…)

Mac OS x,buy mac os x,eclipse mac os x,gimp mac os x,git mac os x,install mac os x,mac,mac os,mac os x,mac os x 10.1,mac os x 10.2,mac os x 10.3,mac os x 10.4,mac os x 10.5,mac os x 10.5.8,mac os x 10.6,mac os x 10.8,mac os x finder,mac os x lion,mac os x mail,mac os x panther,mac os x server,mac os x snow,mac os x version,mac os x wiki,mysql mac os x,os x 10.5,vlc mac os x,wine mac os x,winrar mac os xApple’s Mac OS X gains indeed grounds, but is also under pressure. While Mac users for their startling new threat of drive-by malware, loom more problems.

Malware

A plague that has long lain dormant is that malware for Mac OS X. The personal computer operating system from Apple has the reputation to be a secure platform. Viruses, worms, Trojans and other pests that plague Windows for years, are hardly touched on Mac OS X. But that does not mean that there is no malware. There is simply much less malware on this platform.

Why? Partly because OS X from the ground up with certain security ingrained, user default not when administrator work. Simultaneously lacked Apple’s operating system until recently few layers of protection that Windows already has. But the Mac is less, thus less interesting for malware creators, provides another explanation.

Cybercriminals target now also specifically on the Mac. As with the Flashback malware, which first occurred as an update for Adobe Flash for (more…)

Tips for protect iPhone ipod,apple i pad,apple i pad 2,apple ipad 1,apple iphone 4g,apple ipod,apple itouch,find my stolen iphone,hiphone 4,i pad 2,ipad 4.3,ipad 8gb,ipad deals,ipad nano,iphone 3gs white,iphone 4 vs ipod,iphone offline,ipod,ipod tuch,ipod4,itouch,itouch 4,itouch 4g,music from ipod,my stolen iphone,new ipod,protect ipad,protect iphone,tips for protect iphone ipodThe iPhone or iPod Touch, Who both want that device while protecting both, but never enough, sometimes we neglect or do not give enough attention to this until it is often late.

That’s why I bring the following recommendations that we used one to one guarantee for much longer enjoy them.

 

1.Problem: The rear

It is the longest passing in contact with the surface, in early versions of iPhone and now the iPod Touch are metallic, which makes it very easy scratching and fingerprint are impregnated and fluids and you look a bit ugly.

Solution:

The best way to protect it is a case, on the market a wide range of cases for the iPhone and iPod Touch  of different colors and materials to protect them also gives them a much more elegant appearance and beautiful.

I personally rather like the rigid, besides protecting it from scratches helps to absorb shock if dropped.

2.Problem: Screen Scratches

There is a myth that the screen of the iPhone and iPod Touch are proof is just a myth, I checked myself with my first iPod Touch and test the (more…)