• Home
  • Products
  • Purchase
  • Support
  • Company

CompuClever Blog

How to create a safe password

June 21, 2012 by Charles Edward

Practically every day we hear about email and bank accounts getting hacked, mostly because of  “password entropy”: we often don’t bother to change passwords frequently, the passwords we do have are easy to crack, and we often use the same password for multiple accounts.

  • Length: Passwords should incorporate 8 or more characters.
  • Complexity: Include letters, punctuation, symbols, and numbers.
  • Change your passwords often: Change the passwords for your email, banking, and credit card websites about every three months.
  • Variety: Don’t use the same password for everything. By cracking one password it’s easy to find out where you do your online banking etc.

How to create a strong password:

  1. Start with a sentence: Create a strong safe password
  2. Remove the spaces between the words in the sentence: Createastrongsafepassword
  3. Intentionally misspell some of the words: Cre@teas7rongs@fep@$$word
  4. Add length with numbers: Cre@teas7rongs@fep@$$word2112

Extra hints:

Try Microsoft’s secure password checker.

Never create passwords that incorporate:

  • Plaintext or “dictionary words” in any language (that’s why we modified our password with numbers and symbols).
  • Words spelled backwards, common misspellings, and abbreviations.
  • Sequences or repeated characters such as 12345678, 222222, abcdefg, or adjacent letters on your keyboard (qwerty).
  • Personal information: Your name, birthday, driver’s license, passport number, or similar information.

Where do you keep all this information?

  • Some people rely on pieces of paper to store passwords, but this can be inconvenient.
  • You can also store passwords in a text file on a USB drive
  • There are also password storage services and programs, but these have some drawbacks:

Desktop password managers and browser based password managers are convenient, however often do not provide any protection for stored password. If the computer is on, it is possible for another individual to access the password manager and read the user’s password. This situation is improved slightly by requiring the user to enter a password to access the repository, however if the passwords are stored in an unencrypted fashion, it is still generally possible to obtain the passwords given local access to the machine.

Filed Under: Blog, Protect online privacy

How to protect your online identity

June 11, 2012 by Charles Edward

 

Have you ever Googled your name online? If you haven’t, try it out: you might be surprised at what you discover. It’s possible that your home phone number, address, family photos and even birthday may appear as search results.

Thanks to the killer combination of social networks, bad passwords, and highly personal information stored on our computers, we’re all at risk at some point of having our online identity hijacked, sometimes with disastrous results.

Social networks make it easier for hackers to learn more about us

Facebook has 800 million active users worldwide, and marks the biggest cultural transformation of the past 5 years – social networking is here to stay.

We love to share everything online, from pictures of our children to birthdays and other celebrations. Often we use social networks to connect with former classmates, or broadcast where we went to school.

The visibility of personal info makes “identity theft” an increasingly common problem.

For example, it’s quite easy for a determined hacker or even prankster to pull together various pieces of your identity together to potentially access your bank account, or other accounts containing your credit card information such as iTunes.

How many times have you been prompted for your mother’s maiden name in order to get help with a credit card bill?

And how can you be sure that that information about you isn’t stored someplace online?

Bad passwords are a major threat to your internet privacy

Besides relying on personal information available on the internet, hackers and fraudsters also take advantage of human nature to hijack your Amazon or iTunes accounts, or even your online banking information.

We rely on a variety of passwords to login into a variety of websites. Human nature tends to make us very lazy – often we use the same password for more than one website.

If a clever hacker discovers the password to one of your online accounts, he or she might try out your other accounts such as iTunes to see if they use the same password.

For example, LinkedIn, the social networking site for professionals, was recently hacked, and several hundred thousand passwords were made public. The passwords were linked to email addresses, and, in quite a few cases, these email addresses used the same password as the LinkedIn account.

Although the security breach was quickly discovered, it’s quite possible that, if undetected, hackers around the world could have accessed the passwords and accessed credit card and banking information, or even hijacked email and social media accounts.

Identity theft can be catastrophic.

The risk of personal information stored on your own computer

Our computers carry a treasure trove of personal information that can really cause us problems in the wrong hands. Every time we enter personal information such as our name, address and phone number into an online form, it will be stored as a “cookie” on our computer.

Sometimes, through no fault of our own, we will surf on the Internet to a website that has been compromised by hackers, and will download a “Trojan” or similar malicious program onto our computer. This “malware” is often programmed to scan for personal information, including credit card numbers, and send it to a hacker.

And a very obvious risk is that someone may actually steal your laptop or home computer from your office or home.

It’s potentially game over for your Internet privacy.

How to safeguard your online identity

There are a number of ways to preserve your online privacy and make sure you are not hacked.

1) Lock down your social networks

Make sure you understand how to lock down privacy settings on Facebook and other social networks. Don’t display your birthday, your street address, your email address or your telephone number to ANYONE on Facebook or other social networks, even if they are friends (what happens if your friends get hacked?).

2) Use different passwords, and change them often

Make sure that you never reuse the same password for different social networking sites (and make sure you use a strong password). On top of that, change your passwords at least once a month. Hackers are always probing the defences of any login page you can imagine, from your email account to your utility bill.

3) “Clean” your computer on a regular basis

To make sure no one and snoop around your computer, make sure you delete Internet cookies, browsing history data, and privacy files pertaining to email and instant messaging on a regular basis. Also, erase all personal information such as personal ID, passwords, credit card data and banking information.

 

Filed Under: Blog, Protect online privacy

How to create a system repair disk

May 18, 2012 by Charles Edward

blue screen of deathIt’s inescapable: there will come a time in the life of your computer when you will not get it to start properly. It could be caused by a virus or malware, a hard disk failure, or a corrupted registry.

The end result is the same: your computer will not start, and you will be unable to access any of the programs you’ve paid for, including, for example, Microsoft Office suite or even Windows itself. Replacing the software from scratch can cost hundreds of dollars, and sometimes it’s even necessary to replace the computer itself.

At the very least, you’ll be saving yourself hefty computer repair fees, which can run towards $100 an hour!

How to create a System Repair Disk

If you have one of those bad Windows days where you can’t boot up your computer properly, what you really want is something you can quickly use to get at a command prompt so you can properly troubleshoot.

Windows 7 now includes the ability to create a system repair disc, which is essentially a CD-bootable version of Windows that just includes the command prompt and a suite of system tools.

The trick is to create a system repair disk *now* rather than later when you’ll need it. Here’s how:

how to create a system repair disc1) Navigate to the “start” button in the bottom of left corner of your desktop

2) Click the start button

3) Type “system repair disc” in the Start Menu search box, and you’ll be led to the utility.

It’s a good idea to create this system repair disc BEFORE you have problems, otherwise you’ll end up with no way to create one when you need it most.

Filed Under: Blog, computer fixes

How to defrag your hard disk to speed up your PC

May 14, 2012 by Charles Edward

How to defrag your hard drive to speed up your PC

Your PC’s hard drives and system registry can become fragmented if not maintained regularly. Fragmentation of your hard drive and system registry causes everything to slow to a crawl while your computer attempts to perform seek and write commands. This, in turn, slows down the performance of your entire system.

Sometimes, if you want speed up your computer, you need to “defrag” your computer’s hard disk.
Defragmentation is a process that reduces the amount of fragmentation in file systems. It does this by physically organizing the contents of the disk to store the pieces of each file close together and contiguously.

It also attempts to create larger regions of free space using compaction to impede the return of fragmentation. Defragmenters also keep smaller files within a single directory together, as they are often accessed in sequence.

Defrag your hard drive to speed things up

“Defragging” your hard drive completely removes fragmentation gaps and produces a cleaner, more compact file organization that takes up less disk space and consumes fewer memory resources. The result is that your computer has optimal access to its files and programs, so your system and application response times are improved.

PC TuneUp Maestro provides quick and easy access to defrag your hard drive. Click Optimize >> Disk Defrag to quickly and easily launch the Windows hard drive defrag tool.

Always remove junk files and data before you defrag your hard drive

PC Clean Maestro

Before you defrag your hard drive, it’s also good idea to remove junk and unneeded data files – over time your PC is left with temporary files, leftover file remnants from uninstalled applications, log files, Windows error reports, and much more. It doesn’t make any sense to use the defrag tool to organize and make space for these unnecessary files, so if you can, get rid of them first.

And we’d like to mention that PC Clean Maestro can help with this!

Try PC Clean Maestro for free

PC Clean Maestro allows you to remove unwanted applications cleanly and remove junk files and data to free up hard drive space. PC Clean Maestro also protects your online security and privacy by scanning and removing sensitive personal information.

>> Download the free version of PC Clean Maestro

PC Clean Maestro has passed the Microsoft Windows 7 Logo Certification Test, the McAfee SECURE Certification Test and the Intel Partner Software Certification Test. It’s clean and safe to use.

 

Filed Under: Blog, improving performance

Increase your PC’s speed while avoiding paying for more memory

April 18, 2012 by Charles Edward

Your PC’s performance is directly linked to how much “physical memory” or RAM your PC has – free RAM memory space means programs run more quickly and Windows is more responsive and enjoyable to use.

Many people buy more RAM to speed things up, but buying and adding more physical memory will only be a temporary, expensive measure if you don’t manage memory usage on your PC. Even PCs that have a lot of physical memory available still need to watch for actual memory usage because every program you run (and there are a lot of programs that automatically run in the background whether you want them to or not) consumes memory.

Without watching for what programs and applications you are running on your PC, especially the hidden ones and those run automatically from Windows startup are hard to catch. There are tools you can use to see what programs are running and how much memory they use.

Easily view and manage every program on your computer
PC Clean Maestro’s gives you easy access to the Windows Task Manager, which provides a quick view of your PC’s memory status and usage information. To open the Task Manager, click “Manage” from the main menu, select “Windows System Tools“. From the list, locate “Task Manager” and click the “Open” button. Review information provided on both the “Processes” and the “Performance” tab of the Task Manager.

You can even click the the “Mem Usage” column heading to sort programs by memory usage – you can see which applications consume most of your memory, and then you can decide which programs to remove in order to help speed up your computer

Use Clean Uninstall to completely remove programs and increase your memoryPC Clean Maestro

If you discover you’re running applications that take up a lot of memory but you don’t even really need, you can actually stop them from running and uninstall them with PC Clean Maestro’s Clean Uninstall feature.

Try PC Clean Maestro for free

PC Clean Maestro allows you to remove unwanted applications cleanly and remove junk files and data to free up hard drive space. PC Clean Maestro also protects your online security and privacy by scanning and removing sensitive personal information.

>> Download the free version of PC Clean Maestro

PC Clean Maestro has passed the Microsoft Windows 7 Logo Certification Test, the McAfee SECURE Certification Test and the Intel Partner Software Certification Test. It’s clean and safe to use.

Filed Under: Blog, improving performance, PC Clean Maestro

  • « Previous Page
  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 15
  • Next Page »

Don't miss out

Get a copy of "5 Tips for a Fast PC" when you sign up for our free "PC Tips" newsletter.

Subscribe Now
Archive Newsletter

Recent Posts

  • Ultra File Opener 5.7 Release Note

    Ultra File Opener 5.7 Release Note

    July 24, 2018
  • How Blue Light Affects Your Health and What to Do About It

    How Blue Light Affects Your Health and What to Do About It

    May 11, 2018
  • How to Protect Your Privacy & Identity on Facebook – Part 2

    How to Protect Your Privacy & Identity on Facebook – Part 2

    April 18, 2018
  • Facing the Truth – Facebook & Privacy

    Facing the Truth – Facebook & Privacy

    April 7, 2018
  • Spectre and Meltdown:  Massive Security Holes Impacting All Mac and PC devices

    Spectre and Meltdown: Massive Security Holes Impacting All Mac and PC devices

    January 12, 2018
  • How to Fix Computer Sound Problems

    How to Fix Computer Sound Problems

    December 19, 2017
  • Correct Ergonomics Sitting at a Computer Desk

    Correct Ergonomics Sitting at a Computer Desk

    November 17, 2017
  • Five Useful Tips and Tricks for Windows 10

    Five Useful Tips and Tricks for Windows 10

    August 27, 2017
  • Going Incognito – Browse Web in Privacy Mode

    Going Incognito – Browse Web in Privacy Mode

    August 4, 2017
  • Don’t be Held at Ransomeware

    Don’t be Held at Ransomeware

    July 14, 2017
Contact Us | Privacy Statement | Terms of Use | EULA | Partner With Us | Uninstall | Blog
CompuClever© Systems Inc. 2023 All rights reserved.
Microsoft is a trademark of the Microsoft group of companies. All other trademarks are the property of their respective owners.