YouMobile on Facebook YouMobile on Google+ Follow YouMobile on Twitter
Tags - provide

Just as it is necessary to have a strong password for an email account, so it is important to have an impenetrable password to log in to the site. Forget the codes that contain your name or the name of your favorite sports club, or worse, the domain name with the addition of a couple of numbers. It is too simple and it is not recommended to use such passwords. A good password must be long enough. How much? At least 10 characters. When an attacker tries to break into your site, special systems that you can install should prohibit further attempts after a couple of unsuccessful password entries. The password must be unique. Never use the same password to access other sites and services on the Internet.




When you use different and complex codes everywhere, it is very difficult to remember them. You can solve this problem by using software called a password manager, like Keeper Password Manager & Digital Vault, which integrates into your browser and remembers all your passwords, and can also create random passwords for new sites and services you register on, and which allows you to access all your passwords from anywhere; you can find out here more about this tool. It also allows an encrypted database with passwords to be stored on your computer and not available from any location or device. In both cases, you only need to remember the master code to access the database, and of course, it is important that the master password is very complex and never used on other services. It additionally supports two-factor authentication, which raises security to an even higher level.

If your site can be accessed by multiple users, it's a good idea to assign them appropriate roles and privileges. Someone who just writes texts does not need access to administrator privileges. In this way, you will prevent others from making changes to the site and in the texts that they did not create, or that the possible theft of their access parameters endangers the entire site. Whether you have misused your account or accidentally deleted part of the site, you must perform regular data backups. 

When using certain sites with registration and login, it is not bad to set an alternative to password recovery. In case you forget the access parameters, you can request a password reset, and a link to enter a new password will be sent to the email address from the account. This email address must be always current because otherwise the email will be sent to an address that you no longer use and then you would not be able to solve the problem. 

There are different views on writing down all passwords in a paper notebook. If someone comes into possession of that notebook, they will have all your access parameters for all sites and services. For that very reason, it is good to keep a notebook in a safe, as a treasure, because it is. Avoid logging in to sites and services via public computers from cafes, hotels, airports, but if you can't avoid that, be sure to clear your history and cache from your browser. Never accept that the browser remembers the entered parameters. Since these are public computers, they are not secure enough and you do not know if they are infected with malware that records data entry, and therefore your passwords. Even if you are a big company, there is a potential for a security breach. As for personal computers, it is important to update the programs regularly, and scan the system with antivirus software.

The owners themselves are often to blame for revealing passwords, as they do not pay enough attention when opening the links they receive in messages. Spam messages with links that lead to sites that resemble the original ones, but are located at a completely different address, are often spread on social networks, in emails and comments on sites. When you access them, they ask you to log in with a username and password. By entering your access data, you are sending that data to the hacker, who set up such a fake (phishing) site.

Many internet users do not notice that it is a malicious site and enter their data and thus compromise their accounts. It is important to always check the source of the message and if it seems suspicious to you, never open the links that are in it. Also, if you visit a page from suspicious messages, make sure that the web address matches the correct one, before entering any data on such a site.

As you can see, there is a growing need for increasingly complex passwords. One solution is password managers, but it will be easier for us when the technology develops and when we scan the thumb or cornea instead of entering the codes. These immutable and unique biometric data can be used as another factor in applications, without which access to services is not possible. The use of biometric data already exists. It is available for a small number of people and certain products. Until such technology becomes standard, we will have to apply the tips in this text.

However, with the introduction of computers, there was a need for both new and automated tools to protect files and other information stored on your computer. This is especially important for shared systems, such as file - sharing systems, which is enabled access through public computer networks. An important change that also affected security is the emergence and expansion of distributed systems, as well as the expansion of applications computer networks, communications, and distributed systems. Generic toolset names, procedures, policies, and solutions that are designed to protect the system from attack computer network security. To effectively assess the security needs of an organization and to selected different security products, policies, procedures, and solutions, to the manager in the company which is in charge of security, a systematic way is needed to define the requirements in terms of security and to categorize approaches to meet these requirements.

We are already into 2017 and the Galaxy S8 may not seem as far away from being launched as it seemed to be just a month ago. Today, a new report/leak has come into attention, courtesy of an unlikely source; What we can see via the leaked image is a software running on a PC, called Samsung Desktop Experience. There are three visible tabs on the right, marked as,

1. Multi-Tasking
2. External Monitor
3. Keyboard & Mouse

As some of you have already figured out, the entire setup looks very similar to Windows Continuum Workspace experience, reserved for Windows smartphones only. As the Continuum program allows a Windows smartphone user to experience PC-like functionality, we are guessing that the Samsung Desktop Experience will also bring something similar to the Galaxy S8.

The only issue might be that the S8 will run on Android, which is a completely different OS from Windows altogether. Nevertheless, I am sure that Samsung will hire the right developers to bridge the gap in-between the two operating systems in order to deliver a smooth experience to the users. The ability to properly use a keyboard and a mouse could lead to windowed apps, true multitasking and better productivity on the Galaxy S8 in certain situations. Are you excited for his one?

Saikat Kar (tech-enthusiast)

5G systems


We all are using 4G LTE devices now, However, the International Telecommunication Union (ITU) is working on setting the standard and defining the specifications for the Next Generation 5G (5th Generation) Network.


Between June 10th and 18th, 12 delegates debated on the specifications to be established for the upcoming 5G network standard. The ITU has decided that 5G networks will have a peak speed of 20Gbps, or 20 times the peak speed specification of 4G LTE networks, which stands at 1Gbps.


5G Network


One thing to bear in mind is that these are theoretical max speeds, and that the first 5G networks will likely reach much lower peak speeds. At the moment, the fastest LTE standard is LTE Cat 9, which provides peak speeds of up to 300Mbps, well below the 1Gbps speed specification of 4G networks. What this means is that while crazy transfer speeds are to be expected, 5G subscribers will not be able to download an ultra high-definition movie in just a second, which is what a download speed of 20Gbps would mean if put into practice.


5G networks will also be built with internet-of-things (IoT) devices in mind, as the ITU has established that 5G networks will be able to cater to more than 1 million IoT devices inside a 1 square kilometre radius at an average speed of above 100Mbps. The ITU expects the first commercial 5G networks to start opening for business in 2020, although a working example is being prepared for the upcoming 2018 PyeongChang Olympic Games.




Posts: 5348

© 2018 YouMobile Inc. All rights reserved