Translate

domingo, 15 de junio de 2014

how to clean your footprint on internet

1. Go out of social networks
It must be the first action. Enter the accounts you have on Facebook, Instagram, Flickr or Twitter and be sure to set all options with the maximum privacy. They cease to be 'social' for you, but your data will be overshadowed for other community members. An intermediate method proceeds to disable the account and can retrieve it later. However, it would be appropriate to terminate the account and ask managers writing erasing your data.

Do not forget go out of all photos and negotiate with their owners content removal. The information will not magically disappear, you must have patience and insist if after a few days is still reachable.
2. Did you write something?
The contents published have a great preponderance in Google. Copyright memory. Have you published a blog? You participated in a publication?? Opinaste? With your real name on a public forum? All this is likely to come to light in the future and must be removed if the data can commit.

It is very easy to drop a blog (if you do not remember your password, email searches), but not signed for a news or column. Generally the media are reluctant to remove entries from your file, especially if they do not prove incorrect. What is solution? Identify the information that can actually harm us and reach an agreement with the various publications. This section provides legal advice can help resolve the conflict in your favor, especially if the information is wrong or outdated.
3. Find yourself on Google
The above steps are aimed at erasing their activity, but there is still the third. To know, simply enter your name in Google I quoted. First classifies content between malicious and benign harmless because, as soon as you've moved in the network, you can not kill all the links and references. Contact managers by providing a copy of your ID to prove you are the person referred to.

In many cases you will not get an answer, but the data will disappear as if by magic. This usually happens within three to eight days. Ideally, repeat this process with the other search engines to get the desired effect.

Finally some information, especially comments, it will be impossible to put them out of circulation. In these cases the 'modus operandi' of companies who dedicate themselves to 'clean' profiles is to flood the negative points with dozens of positive reviews. You know the saying, so do not miss out on the first screen of Google, does not exist.

Videopad

VideoPad is a video editing application developed by NCH Software for the home and professional market. The software is complemented by the VirtualDub plug-ins that work with the software. VideoPad is part of a suite that integrates with other software created by NCH Software. This other software includes WavePad, a sound-editing program; MixPad, a sound-mixing program and PhotoPad, an image editor.
We have done a video of some interwievs of sports in the high school.

lunes, 9 de junio de 2014

Computer Security

Information Security refers to the characteristics and conditions of data processing systems and storage, to ensure confidentiality, integrity and availability.

TYPES

1.1- . Physical security
It is one that seeks to protect the hardware (wiring, computer tower, etc ...) of any accident or disaster: from theft (shoplifting) to natural disasters such as earthquakes
Physical security can be subjected to: fire, theft, flood, electrical surge and etc.
Here are our recommendations:
■ Cleans very appropriate from time to time, both readers and the motherboard and inside the tower, using the products for it
■ Try not to drink or pour liquids near the peripheral or the same motherboard. As an electronic component that is, it can reach your computer unusable .
■ Beware the voltage supported by the plate. Make sure that the voltage is correct revising the power supply.
■ Do not handle or you save the BIOS data unless you know to handle it properly, it could prove fatal.
■ Study well the data on your computer before making "overclocking" (make adjustments to "force" a little machine. Careful with this, because if you touch it you should not can "carry you" the computer ...)
1.2- . Logical Security
Software protects computer equipment, applications and really important data (like passwords and personal data) from theft, data loss and etc...

That's why we recommend the following:
■ Always have a backup (or several) of the most important data from your PC to have them even if your computer has a problem.
■ Install a good antivirus and I updated. Although it is free (there are really good, such as Avast or Avira free antivirus) work really well.
■ Do not open any suspicious or unsigned file without having spent a good antivirus scan. It is best to consult a specialized forum (as forospyware, for example) if you've opted for one in particular.
■ Much care and subtlety to the subject of the password. Write a reliable password for you but hard to decipher, especially to all the important files, or contain data that is actually useful. It is not recommended to use a different password for multiple accounts.