Sunday, November 30, 2014

How to Protect your Privacy on Social Media

How to Protect your Privacy on Social Media

Notions of privacy in the digital age are permanently up for debate. Some say it’s impossible to maintain privacy when everything is posted on Facebook; others say it’s up to the networks to afford us control over our content. Social networks like Ello have accepted the challenge of finding a new way, one that allows us to share every moment of our lives, but only with select people, and definitely not with advertisers.
Until this is perfected it’s important to understand how to control your privacy online. Let’s take a look at 4 of the big social networks.

Facebook

The social media superpower has come under the most scrutiny regarding its privacy and data policies.
Plus apparently it's controlled by a dinosaur so you know it's secure.
As a result, Facebook has overhauled its privacy settings, making them as simple to control as possible.
The Privacy Check-up lets you control who can see your posts in future, which apps can publish to your timeline, which personal details are publicly viewable, and which are locked down.
This won’t lock down older posts; to do that we’ll need to go a bit futher – click ‘See More Settings’ in the Privacy panel.
facebook-timelineTimeline & Tagging Settings allows you to control what other people can and can’t post to your timeline. It’ll also let you manage whether or not people can tag you in things without your permission. There’s a handy feature that lets you see how others view your profile, so you can make sure your selected settings are having the desired effect.
Blocking lets you simply block invitations from specific people, apps, pages and events, affording you a blanket layer of protection against particularly stubborn spammers.
Apps allows you to control what data your apps can access, and importantly, whether or not they can post on your behalf.
For a more in-depth walkthrough of Facebook’s controls, check out Gizmodo’s complete guide.

Twitter

There’s a few privacy features available on Twitter, but the most obvious is whether your Tweets are protected or public. If they’re protected people will need to follow you to see anything, and you’ll need to approve each follower request individually.
twitter-privacy
The rest of the settings can be found by clicking on your profile photo in the top left and selecting ‘Settings’.
From here you can manage who can tag you in Tweets, whether location data is included, how people can find you (by email or phone number) as well as your options with regards to tailored adverts and promotional content.

LinkedIn

You’ll find LinkedIn’s privacy menu lurking in the top right hand corner of the website, hiding in the dropdown reached by clicking your profile picture.
Here, under Privacy & Settings you’ll find 4 tabs to control your profile: ‘Profile’, ‘Communications’, ‘Groups, Companies & Applications’ and ‘Account’.
linkedin-privacyProfile includes various privacy settings to control who can see what you post, your activity feed, your connections, and overall control about the visibility of your profile to strangers. As a side note, you can also control other social network interactions, and manage your profile details from here.
Communications allows you to set who can contact you or invite you to groups. You can decide how often to receive LinkedIn’s emails, and manage push notifications for your mobile devices.
Groups, Companies & Applications gives control over which groups you’re members of, and to reach settings for emails from these three.
Finally, Account is used for more mainstream features, such as profile visbility (again), email & password and homepage controls. Interestingly the Account tab also lets you request a download of your LinkedIn data. Under a link called ‘manage security settings, there’s also the option for two-step verification (which we’d recommend).

Instagram

Instagram is as simple as they come – either everything is public or everything is private. If it’s the latter people will need to be following you (and also approved by you to do so) in order to see anything associated with your account.
You’ll need to head to the mobile app to manage these settings, but once there just hit ‘Posts are private‘.

Saturday, November 22, 2014

Delhi Computer Service

We are your IT Department
Since our hunt, we have been occupied with offering IT Service , Networking arrangement, Laptop Repairing, Laptop Spare Parts, Branded Desktop, Assembled Desktops, Branded Printers, Desktop Repairing, APC UPS repair, remote arrangement, Hardware Accessories and APC UPS according to the necessities of our customers. Notwithstanding these, we likewise offer Computer Repair Services, Computer Spare Parts, Computer UPS, to our customers based over the worldwide. Acknowledged for their more extended administration life and phenomenal execution, our extent indulges the necessities of different Offices, Education Institutes, Broadcasting Center, Banks, Reservation Counters, Commercial Establishments and Government Sector.
Our relationship with brands like Molex & D-Link for organized system cabling arrangements, Sonicwall for Network Security Solutions and Dell, HP, Lenovo, for IT supplies’ similar to Servers, Desktops & Laptops and so forth are a couple of steps towards guaranteeing the achievement of our vision.these can likewise be offered with different gathering choices according to the necessities of our regarded customers.
We have utilized focused experts, who with their incredible deliberations have empowered us to stay at standard with our rivals. They work frequently  to comprehend the needs and requests of customers and likewise find suitable suppliers and sellers. Our colleagues additionally work in close co-appointment with one another so that customer’s particular prerequisite is met viably and inside the stipulated time span.

Tuesday, September 30, 2014

Stay safe with iCloud



You’ve most likely detected by currently that some celebrity photos were allegedly taken from Apple’s iCloud by a hacker. It had been according that the hacker(s) found a vulnerability with iCloud and was ready to hack into it and steal photos that some celebrities had wittingly or inadvertently backed-up.
Apple confirmed it found no security breach however that some accounts had been compromised. Though it’s most unlikely that your knowledge can be taken from your iPad/iPhone/Mac, its price taking the time to create certain you’re safe.
So here square measure some tips for keeping your stuff safe:

Use sturdy passwords
 
Access to Apple’s iCloud needs a watchword therefore build its sturdy. Minimum of fourteen characters and a mixture of upper/lower case and numbers can build it a watchword that’s arduous to crack. Don’t use it for all of your on-line accounts although as a result of if somebody was to induce hold of it, they might access everything of yours on-line. To assist you retain track of all of your passwords, use a watchword manager.

 Review what you backup
 
Go to settings on your device and choose iCloud. Here you'll activate and off what you wish insured. It’d be that you just select to not have your photos insured (but if you decide on to change this off confirm you back them informed associate external disk drive or with iTunes). Or even you’d rather keep a copy your photos however not your contacts or mail – it’s your selection.

 Delete any compromising pictures
 
If you’ve got some photos on your iPhone or iPad that you just don’t need others to envision, you’ll got to delete them in 3 places. The primary is that the ‘Cameral Roll’ that is wherever photos square measure keep on the device itself. The second is ‘My icon Stream’ that is actually what’s insured in iCloud. Third, if you don’t need to stay the photos in the slightest degree, visit your Mack and delete the photos from iPhoto. Deleting from these 3 places can take away your photos from your iPhone/iPad, iCloud and your laptop.
There is no reason to be frightened of iCloud or different cloud storage. They’re terribly helpful for keeping your documents and knowledge insured and accessible where you've got web. There’s a way bigger probability that your device be physically taken than your cloud storage being hacked, however it’s perpetually necessary to remain safe on-line. Follow these 3 tips and you’ll be simply fine.

Monday, September 22, 2014

Total IT Service Support



We are your IT department. We’re a team of friendly engineers based in Delhi, and we love
technology. We realize you might not, and that’s why we’re here to help.
The main areas of technology we cover include:
  • IT Support 
    On call 24-hours a day: whatever your IT problem is, we’ll sort it
  • Consulting
    What technology to buy, where to buy it, and how to get it working
  • Websites Design & CRM’s
    From SEO to CRM’s we aim to help you make the right decisions
Technology should make small businesses more money, not waste their time. Whether it’s a crashed computer that’s holding you up, you’re in need of a whole new network or some staff training, we offer you peace of mind.
Contact: 9891011610 and 9810909321