Year: 2023
-
7 effective steps for creating public and private keys for encrypting and decrypting email messages; end to end encryption
In the previous week, I made a video that takes you through the steps of encrypting and decrypting email and now i just want to note down the steps right here. You should be able to watch the video through the link below Asymmetric encryption, also called public key cryptography, uses public key private key…
-
STEPS FOR SETTING UP MAILVELOPE: AN APP FOR EMAIL ENCRYPTION
It is amazing how far we have come with encryption. I believe if you came across my past posts on encryption, you had a grasp on what symmetric and asymmetric encryption is about. These are adventurous topics that dive you into the world of technology, especially while communicating via email. Today we are going to…
-
Symmetric vs Asymmetric encryption: 2 Definitions
Symmetric vs asymmetric encryption plays a great role in choosing the best type of encryption for data types. Every organization has one way of encrypting and decrypting data, and the choice sometimes depends on the flexibility of the encryption method. A bank may choose both asymmetric and symmetric encryption depending on the convenience of the…
-
Let’s unpack encryption
Encryption has existed since 1900 BC, histories say that a normal man in Egypt used a simple code of hieroglyphic substitution in the tomb of Khnumhotep. So how did the man do this? By simply altering code and that’s where I am coming to. What is encryption? It is simply the process of disguising/ converting…
-
Signs that your phone has been hacked
Do you know that sometimes we end up using devices that have been hacked without knowing. This places us at risk and the information that we have; sometimes it could be financial information like emails containing our financial card details, identity information. Here are the signs to look out for if you think you have…
-
Money making as a cause for cyber harrassment:blogging
The era that we are living is an era where money is made from the web. Many people have taken blogging as a source of income and it’s a good thing. It only becomes a problem when it starts having a negative impact on the lives of other people who are online. I made a…
-
7 horrible forms of cyber harassment
Cyber harassment is one most common types of harassment in the present day. It is hard to know whether we are facing or we are being the implementors of cyberharassment when we don’t even know the types. Back in the day, I didn’t know that I was harassing someone when I threw a comment on…
-
5 easy Steps for getting backup codes for your google account
Backup codes come in handy in a situation where you can not access your phone or are on a flight but need to access the internet. They are safe to the point that once used, a code can not be reused again. However, caution needs to be taken while storing these codes. If you are…
-
How to set up two factor authentication on your email using desktop
Hello to every reader reading this, in the past week, I have been uploading videos on tiktok and You-Tube about setting up two factor authentications in our gmail accounts using smart phones. I will summarise that right below this text so you can watch the video of what I was saying before we dive into…
-
How to use kaspersky antivirus for free; 5 steps
I have got you covered today and isn’t it great that we are at the second phase of using Kaspersky anti-virus on our phones? Hello, today am going to give you the steps for using Kaspersky anti-virus on our phones for ultimate protection. The anti-virus has often been reliable in detecting malware for a long…
-
How to install antivirus in mobile phone
This is quite an interesting topic. Hi, how are you, I am writing this blog post at night here in Africa and I can’t wait to grant you the anti-virus answer you have been searching for . Without an anti-virus on your phone, you become a victim of malware and when you are a victim,…
-
7 effective strategies for maintaining mobile phone security
Hello, this ought to be my very first post in this blog and I am so excited to stay safe online with you. Today specifically I would love to talk about keeping your phone and its content safe. And below I will be giving you various tips that will keep you going. It is obviously…