Laptop and others Archives - Cleverti https://www.cleverti.com/category/laptop-and-others/ B2B Nearshore Software Provider. Software Development and QA & Testing Wed, 14 Dec 2022 00:06:25 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.5 https://www.cleverti.com/wp-content/uploads/2020/02/cropped-cleverti_circle-32x32.png Laptop and others Archives - Cleverti https://www.cleverti.com/category/laptop-and-others/ 32 32 How to secure your laptop – 6 steps https://www.cleverti.com/blog/laptop-and-others/howtosecureyourlaptop/ Wed, 04 May 2022 11:30:21 +0000 https://www.cleverti.com/?p=7459 Having a brand-new computer is an exciting experience, and in some cases, there is almost obsessive attention toward it because it's so sleek and elegant. As we usually do with accessories that lose their newness with age, this care begins to fade over time as well. Thus, we suggest you follow these steps to secure [...]

The post How to secure your laptop – 6 steps appeared first on Cleverti.

]]>
Having a brand-new computer is an exciting experience, and in some cases, there is almost obsessive attention toward it because it’s so sleek and elegant. As we usually do with accessories that lose their newness with age, this care begins to fade over time as well. Thus, we suggest you follow these steps to secure your laptop, keeping it both externally and internally safe.

 

Prevent scratch by adding a screen protector

Who hasn’t been extremely annoyed by scratches on the screen? Front-end developers and web designers hate them, and you can imagine why. One of the best ways to preserve our screen is to use a screen protector. These artifacts protect the screens from the most varied threats, such as dust, scratches, fingerprints, or even sun exposure. If you still haven’t purchased a screen protector for your new computer, the time has come.

 

Fasten your laptop with a Kensington cable

kensington cable

Kensington cable

This is the ideal solution for those who work in public environments and fear that their computer could be stolen. The Kensington Slot can be paired with a standard security cable lock.

Laptops with a Kensington lock hole can secure their portable device with a Kensington lock. The lock is inserted through the hole, with a cable attached around a secure location (e.g., table leg), so no one can walk away with the laptop while you’re away.

Add an antivirus

Many people believe that antivirus software serves no real purpose or simply doesn’t do what it’s supposed to do in protecting our computers.

Well, some operating systems are more prone to viruses than others, with Windows leading the pack. Despite this, antivirus software can help detect viruses, malware, and other types of cyberattacks. Being aware that our computer is vulnerable can and should put us on alert, which will encourage us to be more careful.

Having said that… yes, you should buy antivirus software if you can.

 

Encrypt your hard drive

When we talked about Kensington cable, we focus on the computer theft scenario. This situation can cause more problems than simply gaining access to user data.

Almost everyone has saved passwords to their devices, usually in browser settings, so they can quickly log into sites like Facebook, Gmail, and (wrongly) banking platforms.

By encrypting their hard drives, users can protect their computers from external threats that may access them physically or virtually. This method converts a physical disk or logical volume into an unreadable format that cannot be decrypted by anyone without the secret password or key that was used to encrypt the drive.

 

Backup your data

Data is vital for companies today as it serves as a foundation for interpreting reality and developing effective and accurate business development strategies.

We must ask the question: What if we lose the data, either due to the theft of the computer, or even if we get attacked by hackers?

Well, the most effective way to avoid data loss is the practice of making regular backups, and it can be done by removable media, external hard drives, cloud storage, and backup services. These are some common backup solutions that can save your data and give you some peace of mind.

 

Create a secure password

“Create a multi-character password!” – that’s the kind of talk we have with our parents. Unfortunately, the recent cyberattacks in Europe have revealed a frightening situation. Thousands of heavily compromised passwords exist within some well-known organizations. It happened with Vodafone in Portugal and Spain, for example.

For this reason, we offer you three suggestions for creating a password:

  • Do not pick anything shorter than 15 characters, if possible more;
  • Make sure to mix characters. By mixing up letters (upper- and lower-case), numbers, and symbols, you will increase your password’s strength and make it difficult for brute force attacks to crack;
  • Make sure not to use common substitutions.

 

Strong password to secure your laptop:  WjR49?aD*V1aB,H2

Secure Password

You can check the strength of your password here.

We hope that you will take the advice offered here into account, to make your life and your data more secure.

Stay safe!

 

The post How to secure your laptop – 6 steps appeared first on Cleverti.

]]>
Stop looking at the sun with a sieve: enjoy the GDPR! https://www.cleverti.com/blog/laptop-and-others/stop-looking-at-the-sun-with-a-sieve-enjoy-the-gdpr/ Wed, 14 Mar 2018 18:31:20 +0000 http://2020.cleverti.com/?p=2592 In times of great transformation using supposed bottlenecks to your advantage can only be a good thing. Learn how to make GDPR work for you. Information security is the order of the day. Constant attacks on IT systems are causing more or less intricate situations to companies’ management. But information security has many different dimensions. [...]

The post Stop looking at the sun with a sieve: enjoy the GDPR! appeared first on Cleverti.

]]>
In times of great transformation using supposed bottlenecks to your advantage can only be a good thing. Learn how to make GDPR work for you.

Information security is the order of the day. Constant attacks on IT systems are causing more or less intricate situations to companies’ management. But information security has many different dimensions.

Ransomware is one of the latest sources of concern, as hackers enter and encrypt discs that contain vital business information. If you fail to pay a ransom, you’ll become unable to access information, which can be more or less valuable for your company. It all depends on whether or not you have updated backups, and on your capacity and speed to restore safeguarded information.

Most companies do not have any business continuity plans, which can be quite inconvenient and unreasonable these days. Hiring an auditor to assess the state of information systems, as well as implement his/her recommendations, may not be cheap, we give you that. But won’t it be much cheaper than losing your information? Or worse, if data is tampered with on purpose, can you still be sure that you are making the right decisions?

Another dimension of information security also on the agenda is the General Data Protection Regulation (GDPR). In a very short timeframe, May 25, 2018, the GDPR enters into force and its consequences, although widely spoken, disseminated and transmitted in various forums, are not being fully measured by companies.

In most events on this subject, regulatory and legal information and consequences are transmitted while using a negative view, i.e. reinforcing the weight of fines, penalties, etc., which can lead a business to bankruptcy. Few show the great opportunity and benefits that the RGPD implementation can bring to companies. So it seems reasonable to ask whether and how, in fact, companies can benefit from this type of regulation.

During my many years of auditing and consulting, I have worked for companies of all kinds and in almost every business sectors. Many of them have implemented integrated systems of the ERP (Enterprise Resource Planning) type. This need had a huge boost in the 90s of the last century, but it is still present today.

“A business without an ERP is not well managed for sure!” – this is something that we often ear. However, not many know what is behind the ERP acronym. Well, it’s quite easy: it’s the biggest attempt ever to create a machine containing the most varied business processes of any company.

Attempted and achieved in most cases, but systematically bombarded in its foundations by the creativity and innovation of other much more complex and dynamic “machines” – people! And here is where one of the biggest and most famous “artillery pieces” comes in that confronts the “almighty ERP”, the spreadsheets. What is even more incredible is that these tireless “guerrillas” began to win one battle after another, almost winning the war.

But then came the ERP “retaliation”, the notorious Cloud ERP, with all its arguments of security, scalability, accessibility, integrity, as you need it functionalities, etc. Could it beat the spreadsheets? Well, at this point we can say that not yet because they have retaliated and turned the Cloud in their favor.

Meanwhile, other forces have entered the business management panorama – Mobile and APPs. These are new and complex forces since they both support information integration (they help the ERP) and are “turncoats”, striving to become independent by innovating in the business models and functionally they provide to companies.

In face of this complexity, flexibility and increasing variability scenario, why not take advantage on the GDPR to put some order in the house and start a true and consistent information management?

With so many ongoing battles, the GDPR can be an element of stability, fundamental for the control of information by companies. The “big guerrillas” are also the biggest factor of uncontrolled information. Practical, fast and productive, they are also easy to copy, send, change and customize. They are the biggest source of unsafe information and one of the highest assets for people who change jobs, especially if they are hired by the competition.

It is, therefore, the right time to stop looking at the sun with a sieve and use the GDPR to evolve substantially in your information management. Frame the GDPR into a Digital Transformation process that guarantees information security, but also its availability and integrity, while increasing the levels of effectiveness and efficiency of your company and consequently your competitive edge.

 

Written by José Pedro Gonçalves, Security Lead at Cleverti

The post Stop looking at the sun with a sieve: enjoy the GDPR! appeared first on Cleverti.

]]>
How to access hidden chrome devtools https://www.cleverti.com/blog/laptop-and-others/how-to-access-hidden-chrome-devtools/ Tue, 30 May 2017 13:13:19 +0000 http://2020.cleverti.com/?p=2619 Great tips to find concealed DevTools First of all, start by using Chrome Canary to develop because by itself it will give you access to more tools than the stable version of Chrome. Next, to unlock some hidden features from Chrome, Chrome Canary, and even Chrome Mobile Browser, you have to type “chrome://flags” in the address bar. [...]

The post How to access hidden chrome devtools appeared first on Cleverti.

]]>
Great tips to find concealed DevTools

First of all, start by using Chrome Canary to develop because by itself it will give you access to more tools than the stable version of Chrome.

Next, to unlock some hidden features from Chrome, Chrome Canary, and even Chrome Mobile Browser, you have to type “chrome://flags” in the address bar.

This will present you with a screen that shows all the available experimental features including those that are most interesting to us: the Developer Tools Experiments.

Just enable this so you can have access to new features for the Developer Tools and relaunch Chrome.

 

 

On a side note, let me warn you that in this screen you can enable some interesting features, including experimental JavaScript ones so you can start trying new features ahead. The list of available features is very extensive and I recommend that you please give it a look.

Now that you have relaunched the Chrome browser, you can open the Developer Tools and click the three dots on the top right side and select the Settings options or hit the F1 key on Windows

 

 

You will now have one more option on the left side: Experiments that gives you access to new experimental features.

 

If this was not enough, there are even more hidden experiments in this area. To access them you have to hit the shift key 7 times and they will appear next to the other ones.

 

 

Didn’t I tell you these were great tips? Now go ahead and try them out!

I really hope this will help to make your programming easier.

 

Written by Paulo Miranda | Developer at Cleverti

The post How to access hidden chrome devtools appeared first on Cleverti.

]]>