Month: December 2023

  • 7 effective steps for creating public and private keys for encrypting and decrypting email messages; end to end encryption

    7 effective steps for creating public and private keys for encrypting and decrypting email messages; end to end encryption

    In the previous week, I made a video that takes you through the steps of encrypting and decrypting email and now i just want to note down the steps right here. You should be able to watch the video through the link below Asymmetric encryption, also called public key cryptography, uses public key private key…

  • STEPS FOR SETTING UP MAILVELOPE: AN APP FOR EMAIL ENCRYPTION

    It is amazing how far we have come with encryption. I believe if you came across my past posts on encryption, you had a grasp on what symmetric and asymmetric encryption is about. These are adventurous topics that dive you into the world of technology, especially while communicating via email. Today we are going to…

  • Symmetric vs Asymmetric encryption: 2 Definitions

    Symmetric vs asymmetric encryption plays a great role in choosing the best type of encryption for data types. Every organization has one way of encrypting and decrypting data, and the choice sometimes depends on the flexibility of the encryption method. A bank may choose both asymmetric and symmetric encryption depending on the convenience of the…

  • Let’s unpack encryption

    Let’s unpack encryption

    Encryption has existed since 1900 BC, histories say that a normal man in Egypt used  a simple code of hieroglyphic substitution in the tomb of Khnumhotep. So how did the man do this? By simply altering code and that’s where I am coming to. What is encryption? It is simply the process of disguising/ converting…

  • Signs that your phone has been hacked

    Do you know that sometimes we end up using devices that have been hacked without knowing. This places us at risk and the information that we have; sometimes it could be financial information like emails containing our financial card details, identity information. Here are the signs to look out for if you think you have…

  • Money making as a cause for cyber harrassment:blogging

    The era that we are living is an era where money is made from the web. Many people have taken blogging as a source of income and it’s a good thing. It only becomes a problem when it starts having a negative impact on the lives of other people who are online. I made a…

  • 7 horrible forms of cyber harassment

    Cyber harassment is one most common types of harassment in the present day. It is hard to know whether we are facing or we are being the implementors of cyberharassment when we don’t even know the types. Back in the day, I didn’t know that I was harassing someone when I threw a comment on…

  • How to set up two factor authentication on your email using desktop

    Hello to every reader reading this, in the past week, I have been uploading videos on tiktok and You-Tube about setting up two factor authentications in our gmail accounts using smart phones. I will summarise that right below this text so you can watch the video of what I was saying before we dive into…