Can you recondition an old computer?

There are many ways to deal with old computers. One popular way is to get rid of it. This is because old computers have no value, are slow and take lots of physical space.

The other way to deal with them is to sell them for a super low price so that you can buy a new one without paying too much. However, second hand electronic stuff does not really have any value. For instance, you probably ended up selling a graphic card for $50 that you bought for $200-$300 originally.

So why not keep your old computer and make good use of it.

How to rebuild an old PC

1. Format your hard disk to ensure you have completely remove all the data in it – remember that even formatting your disk might not remove all your data.

Continue reading

What are the risks of getting infected by malicious software?

Have you ever thought of what is going to happen when you are infected by a computer malware? About a decade ago, computer virus aims were to replicate themselves and destroying key operating system functions. If you got a computer malware infection at that time, most probably your operating system will be corrupted by the malware and you will need to format your hard disk to solve your problem.

Today, malicious software behaves a little different. We have more than 10 types of computer security threats such as virus, trojan, worms, spyware and many more. Each type of malware has their own speciality and here are top 3 risks of getting infected by a computer malware. Continue reading

The top 5 mistakes I have made in blogging

About a year ago, I started blogging on a niche topic, hoping to earn some income from it just like many other bloggers out there today. However, nothing comes easy and I have been through a lot in that one year period. In this entry, I would like to share the pain when I started out, by telling you the five biggest mistakes I made.

1. Meaningless domain name

I started out by naming my blog and want to find a domain name as close as possible to the name of my blog. On top of that, I have the fear as well to have a long domain name because it is difficult to remember. As a result, I ended up creating a totally meaningless domain name which I still have the regret today. People find it hard to determine the niche of my site just by reading the domain name. The lesson learned here is to have a domain name which can represent your niche as close as possible. Continue reading

Does Security Have to be Technical?

I had been a software engineer for at least 3 years specializing in digital security. A month ago, I attended a small workshop which talked about IT Security for corporate and the speaker said this somewhere in the middle of the workshop:

“Security is a process. It does not have to be really technical and the most important part is the process.”

I stunned for a while and suddenly my mind wondered away from the workshop deeply thinking, what is the speaker trying to deliver? I started this serious thinking simply because it is not said by some non-technical or sales person. Instead, the person speaking in front of me is a Certified Ethical Hacker.

A padlock key on a keyboardAt the end of the workshop, I begin to understand what he is trying to deliver. After 3 years of writing programs for the benefit of security, I turned out saying that security is a process. Why would I say that? Look around us. All the tech that you need to protect yourself from cyber crime is there. Anti-virus, firewall, anti keylogger, parental control, password manager and many more are all available in the software market. There is no reason for us to say in terms of technology, we are not good enough in security.

Continue reading

Are Antivirus and Firewall Sufficient for Good Security?

Whenever people talk about computer and internet security, they talk about malware which consists of virus, trojan, worms, spyware and many more. When they come to talk about the solution for those threats, the solution is to get an antivirus and firewall to do the work.

The question now is, are they sufficient for a good computer and internet security? I would say ‘No’. It is very irresponsible to put the blame into that awesome software when you become a victim of malware infection. I believe that software like antivirus and firewall are there to help you in achieving good security, but not creating some sort of plasma shield to you.

The reasons why you have a poor security

As I said, you can’t blame the software for being too poor as the reason that you to get infected. Part of the reason why you are infected can be several below. Continue reading

5 Most Popular Two-Factor Authentication Security Devices

As we had discussed before, one-factor authentication is not sufficient in order to have good security. Especially when we talk about sensitive transaction such as banking transactions, it is not secure anymore today if it were done only using username and static password.

Two-factor has to come into the IT security field to ensure that the correct person is authenticated. The items below are the five most popular methods used for any two-factor authentication.

1. Mobile OTP

Mobile One-Time Password

Mobile One-Time Password (OTP)

Continue reading