GET QUOTE

‘How-to’ Guide for Non-tech Entrepreneurs | Digifrizz Technologies

December 12, 2019 Digifrizz digifrizz

Guide for Non-tech Entrepreneurs

Are you afraid of the complexity of hyper connected world? People are getting smarter with everyday internet use, and here you are still giving perplexed look with a pop-up over your head ‘HOW TO?’

I know it’s a real life problem that you are embarrassed of sharing with others. Trust me! There is nothing ashamed of for being layman. May be, you don’t know, but you are not alone. The difference is that, they are hovering over ‘HOW TO’ in every possible time.

You really don’t need to have technical background in order to start-up your business or attain success.

Well, all you need is a ‘HOW TO GUIDE’ for all ‘MUST-KNOW FACTS’.

1. How to secure your data on public Wi-Fi networks?

5 tips to follow to secure your data on public Wi-Fi—

  1. Safety with VPN (Virtual Private Network):

Public Wi-Fi network is the popular hunting ground for cyber criminals. Nothing makes you happy like letting you access free public Wi-Fi. Isn’t it? VPN is the most secure option to keep your information safe when logged on to public networks. It actually encrypts your internet activity while are using public Wi-Fi network. Cyber hackers cannot access the tunnel between you and server.

  1. Network Verification:

Before you browse through public Wi-Fi, verify whether the network is legitimate or not. It’s better not to get connected to any network in order to avoid being victim.

  1. Turn Off Sharing:

Do you turn on sharing preference while connected to public Wi-Fi? It’s a ‘NO-NEVER’ advice. Every operating system has ‘turn off’ option to stop file sharing. You just have to use that option before you connect your device with public network.

  1. Protect with Antivirus:

Install only the latest version of antivirus program so that it can detect the malware while you are using public network. The advantage is the installed antivirus program will alert your device when it is at risk of getting malicious attacks and suspicious activity.

  1. Safeguard with HTTPs

Do visit only (I repeat ‘ONLY’) the encrypted sites when you are not able to access VPN. While you are accessing different websites, make sure that website has HTTPs at the beginning. If there is a padlock symbol at the beginning of the web address, this means that particular sites use encryption.

2. How to safeguard your Wi-Fi network?

To how many suspicious devices your Wi-Fi network is serving? Do you know if anyone eavesdrops or sniffs on your Wi-Fi network? When your private password gets accessed by anyone, it becomes quite difficult to keep unwanted intruders out of your network. Without implying security precautions, you cannot control if anyone misuses your network.

Accessing Admin Panel with ONLY Ethernet

You are risking your network while accessing the admin panel over wireless. Why? Simply because — Your login credentials are sent over the air while you are logging without using Ethernet.

Enable your Firewall Feature

There is build-in firewall feature in most of the routers. All you have to do is to enable your SPI Firewall. It will block incoming connection if it is suspected.

Change Default Login Settings

When you have a router for the time, a default admin username along with password is given to you. Most of the people prefer to keep it and set it as default. These login credentials are easily accessible by anyone who searches it by the router model number. So you must change the credentials as early as possible.

Encryption is Must

DO NOT use any kind of weak encryption like WEP encryption which can be easily cracked. Use WPA Personal or WPA2 Personal mode to encrypt your network.

3. How to send encrypted Emails?

Snooping government officials and cyber criminals are there to intercept mails when it is sent via regular email. You are at risk to breach confidentiality when you are sending you confidential data through unencrypted emails.

Mailvelope

 You are allowed to encrypt or decrypt emails with OpenPGP encryption in a free browser extension Mailvelope. Mailvelope is compatible with Yahoo, Web.de, Posteo, Outlook, GMX, and Gmail as well.

Virtru

It is compatible with Yahoo, Hotmail, Outlook, Gmail, along with few other providers. You will get end-to-end email encryption feature.

Send 2.0

It is compatible with Gmail and Outlook with military grade encryption. You will get both free and paid plans.

Startmail

It is compatible with Gmail and Outlook with PGP encryption. You will get both free and paid plans.

4. How to memorize all your passwords?

You may have 25 different accounts for different purposes, but I’m pretty much sure you don’t have 25 different passwords. It is obvious not able to memorize a large number of passwords all the time. You tend to create single or few passwords, and use it for all your accounts. Technically, you make it easier for cyber criminals to crack all access through hacking only one password.

Lastpass App / lastpass.com

It is one of the most popular password managers which demand you to remember one master password and it will remember all of your passwords.

What’s more?

Even if you cannot memorize that one master password, you will still be able to access all your passwords securely through its ‘Fingerprint Support’ feature.

KeePass 2

It is open source software where you can generate password database files with .kdbx extension. These files are highly encrypted, and all you need to do is to access all your files through accessing one master password. If someone has your file, he/ she cannot access any of your passwords without having that one master password.

5. How to un-send an SMS message?

Did you just hit the send button for the message consists of racist tirade awful language? I know it’s really difficult to have patience when client is getting into your nerve. But, sending profanity ridden message to your client due to running out of patience is not something what you want.

On Second Thought / onsecondthought.co

  • Free Android messaging app

You will have full ONE MINUTE to un-send a SMS text message. After installation of ‘One Second Thought’, set it as your default messaging app. You can choose any amount of buffer time between 0 to 60 seconds to un-send your message.

TigerText App

You can delete your text message only if the person on the other end has not yet opened the message. You will get to know whether you successfully recall your message by the green colored icon next to your message. Green icon indicates that the recipient already received your message. On contrary, if you recall your text message, and the green icon is not there, that means you are successful in un-sending your message.

6. How to get your own disposable email address?

You have to provide your email address to access certain information via certain websites. Are you comfortable to provide your personal information to any website without knowing whether it is reliable or not. It is highly recommended that you should be aware of identity theft, threat of fraud and spam.

Have you ever thought about temporary disposable email address? Yes, you heard me right!

Guerrilla Mail

  1. On this website, you are able to create your temporary disposable email address and further you can use it where you don’t want to provide your real email id. In www.guerrillamail.com multiple domains are available, and it allows you to choose any of it.
  2. You can create scrambled version of your disposable email id through selecting the option ‘Scramble Address’. Scramble version will stop others to view your received emails.
  3. Keep a note: Guerrilla Mail server deletes all your received emails after an hour.
  4. To check your incoming emails, you just have to connect to Guerrilla Mail website, and put your unscrambled email address.
  5. Once your need is over, just choose the option ‘Forget Me’ to delete your disposable account permanently.

 

7. How to know which websites you can trust?

Trustworthiness of a website is a question in today’s increasing fraudulent internet activities. World becomes modern, and here you are still pursuing old foolproof ways of justifying reliability of a website.

WOT (Web of Trust)

  1. This is a free browser extension that helps you to decide whether the web address you are visiting is safe or not. Thousands of users shared personal experiences, ratings, and reviews that help you to rate trustworthiness of a website.
  2. You have to install ‘Web of Trust’ in your choice of browser. Safety rating icon will be visible in your browser every time you visit a website. Green icon indicates the website is trustworthy, in contrast, red icon indicates danger.
  3. It is recommended to share your experience too in WOT to help other users.

8. How to block ads on internet?

Surfing a web address without being bombarded with web advertising is like fantasy. Isn’t it? Let’s make your fantasy come real. Yes, you can block all the annoying advertisements while surfing internet in real. Google, YouTube, Facebook are the tech giants where people across the world are present to make money through advertisement. But, such advertisements may be of little use to you.

Adblock Plus

  1. You have to install Adblock Plus in your browser with free download to block all the web ads. After you install this, all web advertisements will automatically be blocked from any website you visit.
  2. No matter whether you are surfing Google, or YouTube, or Facebook, Adblock Plus will block all kinds of ads text ads, video ads, banner ads, or any kind of pop-up ads.

9. How to make your online accounts hack proof?

The cold hard truth is, today hacking becomes easier because we become casual to the power of the internet. Its doom and gloom that we can make our online accounts 100% digitally secure by staying off internet. ‘Not using internet’— Next to impossible. Isn’t it?

No worry! Making your online accounts hack proof is simple. Just keep some tricks!

  1. Say ‘NO’ to Basic Password

We all have the tendency to make extremely basic passwords so that we don’t forget our password. You have to make your password easy by keeping its strength high. Use alternatives for words. Let me explain it more for you— you can use ‘0’ for the word ‘O’, ‘$’ for the word ‘S’, ‘@’ for the word ‘A’ and so on. Add your favorite or lucky numbers at the beginning or end of your main bunch of words.

  1. Make Unique Password and Get Password Manager

Is there any point of making password hard to crack but you use it for all your online accounts? In that case, you are risking all your accounts. You may have password manager like LastPass (How to memorize all your passwords?) to remember all your passwords. Make it difficult for the hackers to crack your password by contributing uniqueness for all your online accounts’ security locks.

  1. Two-Factor Authentication

Creating incredibly strong and unique password is not enough for ensuring security. You need a second line of defenses!

Unfortunately, your password manager like LastPass has a major weakness; that is the degree of security of your master password. What if your master password gets hacked? In that case, Two Factor Authentication will be your second line of defense.

Get Google Authenticator which is supported in LastPass. Google Authenticator will generate code in every 30 seconds, and you need to insert the current code at the time of login. So, even if your password gets hacked, hacker needs your phone to access your account.

10. How to secure your chat on Google, Facebook, and the web?

Google Hangouts and Facebook Messengers are popular platform where we make confidential conversations too. But are they secure? Today securing your confidential conversation from prying eyes of competitors or malicious users, and stop them from eavesdropping on your chat is difficult. Though, nowadays encryption is there in every app, still you should use strong encryption to double secure your chat while dealing with confidential information.

ChatSecure:

This app doubles your security by allowing you start your chat immediately encrypting it. Not only in iOS and Android, you can use it on the computer platform as well.

What’s more?

This app supports all popular chat accounts on websites like Google, Facebook and many more. It’s up to you which platform you want to use for your business talk.

11. How to password protect your WhatsApp messages?

WhatsApp is for both personal and professional chat and it is there in ready-to-open form in our cell phone. Once in life, we all have been in a situation where we have to let our coworkers or friends borrow our phone. What if they start reading your personal messages in WhatsApp? Have you ever thought of restricting your WhatsApp access from others? The first question you will come with is ‘HOW?’.

App Lock

This particular app will allow you to restrict access to any application including WhatsApp by securing them with single password. Just make sure you recover your password in case you forget your password. Let me make you clear!

Once you install App Lock in your phone, you need to set a recovery email address along with password. If you forget your password, you can reset it from your inserted email address.

With the security lock, your phone can never be in wrong hand. Every time someone tries to open your WhatsApp app, they will be asked to insert the password you set earlier.

12. How to recover deleted photographs / videos from SD card?

Have you ever deleted important photographs or videos accidentally and sat holding your head down?

No worry! Few steps to follow and you will have all your deleted photos.

  1. Remove your SD card

First, in order to avoid accidental overwriting of data, you have to remove your SD card from the device where it was used.

  1. Install RECUVA

You can install any recovery software, but I will suggest you to install free solution like Recuva. Unfortunately, there is no version for Android yet, you will have version for Windows only. You need a computer or laptop to install this recovery application. Recuva can restore any image with png, jpg, gift or many other formats. First Recuva will ask you few basic questions through which you will get your result.

  1. Connect your SD card to your computer

You need an SD card reader to connect your SD card to your laptop or computer.

  1. Select option ‘Scan for non-deleted files’

Next, go to ‘Options’ dialogue box and select ‘Actions’ tab. You will have an option ‘Scam for non-deleted files (for recovery from damaged or reformatted disks)’. You have to enable that box. This will allow you to scan your entire SD card space for deleted files as well.

  1. Select option ‘Deep scan’

You will have another option ‘Deep scan (increase scan time)’. You have to enable the box for scanning the entire hard drive.

  1. Final Scan

Run scan option once you are done with your settings. It will scan your drive for deleted files.

  1. Save

Once the system is done with the scan process, you can filter results by file type, file name and date. Make sure you don’t save them to the SD card back where they got lost before. You have to save them to a different space.

13. How to back up important data on hard drive?

Suppose, your hard disk gets crashed and all of your important data got lost. Even thinking like such thing gives you a mini heart attack. Well, why to wait for something like this to happen? Make your private data secure by backing the up regularly.

Google Drive

Today, no one is out there who doesn’t know what Good Drive is, and very few are there who don’t use Google Drive App. Apart from this, few use it but not on daily basis. I will recommend you to save your data in Google cloud and stay risk free. Uploading in Google Drive is easy and takes few seconds. There will be no risk of losing data and you can access your data anytime anywhere over the web.

14. How to stay secure from ‘Phishing Scams’?

Are you one the way of becoming one of the victims of Phishing scams? Stop giving perplexed look on the term ‘Phishing Scams’. It’s something we all know but unaware of the ways to avoid risk.

‘Phishing Scams’ are the fraudulent activities that cybercriminals do by asking your personal details (like username, passwords, credit card numbers as so on) with a link attached. Such mails or messages pretend to be a trustworthy source and you get trapped with just single click.

Basic Suggestions:

  1. Even if the sources seem trustworthy, never ever try to access those links you received from anywhere. Always visit official websites by typing their URL address and then log in with your personal details.
  2. NEVER EVER share your confidential information just because you received a call and are asked to follow few processes.

 

PhishTank

Now you can check trustworthiness of the web links through www.phishtank.com. Before you click on any link from your device, it is highly advisable that you should make sure the link is safe and it is not phishing attack. PhishTank with large crowd sourced database will help you to judge the reliability of a web link.

15. How to browse the web anonymously and stop being tracked?

Anonymous internet search seems not possible as Google tracks each and everything in every second. The next moment we are bombarded with ads for what we have been looking on the web. Concealing our web activity on Google means visiting history page and selecting ‘delete all’ or ‘delete manually’. What if you forget to do so?

Suppose, you used your client’s laptop for some reason and searched something you don’t want to disclose to your client. Blatantly, you forgot to delete history data and returned the laptop. What if they go through your history page? There is high probability; your client will look for your web activity.

Well, don’t get much stress on your nerve!

Start Page — An alternative search engine 

Surf internet anonymously with a good alternative search engine ‘Start Page’. You won’t get any difference in the search results while browsing through www.startpage.com. The only difference is the privacy terms ‘Start Page’ maintains for its users. Your privacy will be protected through keeping tracking cookies away, and protecting your IP address and location as well.

16. How to not get tracked by social networks?

You can’t pass a day without sharing your personal views on social networks like Facebook, Instagram, Twitter, Snapchat, Google Plus and so on. You love to share personal news and don’t want to be tracked. Right?

Advertisers are keeping their presence everywhere to track consumers and their interests. Now some of you are completely OKAY with the fact if advertisers approach you for their products or services. But is that all? — Unfortunately NO.

You are tracked by the social networks even when you are not connected with them. You probably noticed you searched for something in Amazon, and then you got ads on Facebook for the same products. Sometimes you are sharing very personal information, or something that makes others identify your psychological traits. This information is not limited to your friends and relatives, but it goes beyond. Cybercriminals, vindictive acquaintances, spam bots could take an interest, too.

STAY SAFE by keeping yourself away from trackers!

 

Blur

You can stop being tracked by using Blur which blocks tracking strength of social networks.

  1. Visit www.abine.com
  2. First, install the Blur app in browser of your choice (Mozilla Firefox and Google Chrome are recommended).
  3. Enter your email address and generate a password to register in Blur 

  1. Now you are free to visit any website without having any fear of being tracked. Once you install Blur, it will stop all the social networks to track your web activities.
  2. Want to look for number of trackers Blur blocked for you? Simple! You will find the Blur icon on the top right corner on your browser. Just click on the icon and you will get the number of trackers blocked.

 

17. How to stop Google to track your Smartphone?

Your family may not know where you are, but Google knows where exactly you were and you are.

Intention behind constantly tracking your location is to serve you customized information about the products and services available nearby. Now this is scary if your location information gets tracked by wrong hand through this feature of Google. In that case, it is advisable that you should prevent Google from tracking your Smartphone.

Check your location tracks records on Google:

Google starts recording your location from the time you are into Google apps on your Smartphone. Search for https://maps.google.com/locationhistory from any of browsers of your choice. After visiting the site, sign into your Google account. With the help of Calendar, you can select any date in past and get to check the locations you visited on selected date.

What’s more?

You can use the ‘Play’ option in order to replay your movement on that selected date, in a more detailed manner. You will be amazed to check how Google stores accurate outcome of your visits.

Well, you can delete history records of your location track on Google.

To conceal tracking, you just have to change the settings of your Smartphone.

Change Settings of Smartphone (Android):

  1. Go to Settings
  2. Go to ‘Location’ option
  3. Go to the option ‘Google Location Reporting’
  4. Disable the ‘Location Reporting’ and ‘Location History’ options
  5. For more privacy concern — Turn off ‘Location’ feature from your phone

Change Settings of Smartphone (iOS):

  1. Go to Settings
  2. Go to ‘Privacy’ option
  3. Go to the option ‘Location Services’
  4. Turn off location access one by one for all the Google apps you are using currently

 

18. How to be aware before disposing your old mobile phone?

Did you dispose your mobile phone without concerning of erasing data? Yes? Then you are risking your data get misused.

Let me clear the thing! I’m not speaking about ONLY DELETING files. Probably, you don’t know the fact that deleting files doesn’t mean PARMANENT ERASE.

When you are holding a responsible position whether in professional or personal life, you are bound to secure all of your confidential data and information. Henceforth, be aware before you dispose your old mobile phone in order to prevent any kind of potential misuse.

Only deleting is not the solution. The reason is that a number of data recovery software is available, so anyone who wants to recover your deleted data could get them back in a smart way.

Erase all your data and information stored in Phone’s Space—

  1. First encrypt all data stored in your device
  • Go to ‘Settings’ option
  • Go to ‘Security’ option
  • Select ‘Encrypt Device’
  1. Do factory reset to erase data permanently
  • Go to ‘Settings’ option
  • Go to ‘Accounts’ option
  • Select ‘Backup and Reset’
  • Select ‘Factory Data Reset’

As you encrypt it on first hand, and then go for factory reset, you are double securing your data. Now, it is quite difficult for someone to recover your deleted data.

Erase all your data and information stored in SD Card—

  1. In case, you are using SD card for storing your data, then you have two options. One, you can remove your SD card from your old device and use it in your new device. Second is if you want to dispose your SD card, then encrypt all your data. For encryption—
  • Go to ‘Settings’
  • Go to ‘Security’ option
  • Select ‘Encrypt External SD Card’
  1. Format your SD card—
  • Go to ‘Settings’
  • Go to ‘Storage’ option
  • Select ‘Format SD Card’

For iPhone Users—

  • Go to ‘Settings’
  • Go to ‘General’ option
  • Go to ‘Reset’ option
  • Select ‘Erase All Content and Settings’