Keyboard Maker AI.Type Latest Data Breach

Recently there has been a massive data breach that exposed millions of people. Upon installing the Ai.Type keyboard the application requested full access to your phone which recorded every letter or number you typed. Why would a keyboard and emoji application need to gather the entire data of the user’s phone or tablet? Great question. (more…)

How to Speed up Your Windows PC

 

We all hate slow computers, so this tutorial will show you how to speed up your Windows PC.

Disk Cleanup Tool

Windows 7

Programs→Accessories→System Tools→Disk Cleanup.

Go ahead and tick everything in the disk cleanup window. Wait for the program to finish and click the delete files button.

Windows 10

Start menu -> Type Disk Cleanup

It will take about 5-10 seconds to come to the main window, and it will ask which files you want to delete. Select all files and click ‘Clean up system files.’ (more…)

dark web vs deep web

The Deep Web vs. The Dark Web

The Deep Web

The deep web is commonly known as the invisible web or the hidden web. The deep web is surprisingly large taking up 90% of the internet which is estimated to be 7.5 petabytes which most of that is made up of innocent content such as emails, logins, and subscription websites; generally, anything that requires a login will be stored on the deep web. 

The deep web contains over 90% of the information on the internet but is not able to be accessed by surface web users. (more…)

malware terminology

The Terminology of Malware – What You Need to Know

Computer Virus

A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions. In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros (software code inside of a Word document) to execute its code. In the process, a virus has the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data. (more…)