Free app that EASILY turns your notebook into a WiFi hotspot

Having a portable Wi-Fi device with you is a big help. Being able to share you connection to your friends will make you popular. Unfortunately, carrying with you a portable device that lets you do this is a bit of hassle to some. While these devices are small, the idea of buying one could make you think twice.

Though there are now ways to configure Windows to enable you to create a Wi-Fi hotspot, the process involved could make you think otherwise.

Well, ladies and gentlemen, the answer to your question is here. Connectify is here.

Using Connectify is as easy as 1, 2, and 3.

You first have to download the application on their site and install it in your laptop. Then open the application then set a password and SSID for your hotspot. Then choose the connection that you want to share and click on the large, friendly ‘Start Hotspot’ button and you’re good to go.

There are two versions of Connectify.

There is the free version. This type allows you to share your internet connections. It is a reliable application and does its job fairly well. What’s good is that it features no ads.

The other one is the paid version. This type allows you to rename your hotspot and automatically detects you Internet connection and has product support. You have to shell $29.95 for you to avail of the Pro version.

If you want flexibility, power and you have money to shell, then choose to buy the pro. But the free version is enough if you only want to share your connection to friends. Either way, you won’t be disappointed with this program.

Caution: Watchout for IPO scams in Facebook

People should be warned and watch out for scammers that will try to fool or victimize individuals. There are hundreds upon hundreds of scams out there that try to get your personal information by posing as legit businesses.

Sophos reminded users that bogus Facebook stock was offered last year and yesterday’s development of an IPO announcement will likely bring forth in schemes similar to that of last year’s scam.

People should be aware of the possible methods that scammers will use. Naked Security sounded off with a warning that people are out there that could use this to their advantage. The potential of free Facebook stock being used as bait to entice people to click on links or join pages are highly likely.

Facebook even went public on these as they said that, “Investors might think they are getting in on the ground floor of innovative social media companies, but instead find that they may have handed over real money for nonexistent shares.”

People need to be vigilant to these types of modus to protect and shield themselves from these types of scams.

Image source:

Caution: Facebook Valentine theme may be a malware!

Beware! The cybercrooks are at it again.

Computer security developer Trend Micro has unveiled a new malware that could harm your PC’s. This new attack starts with a Facebook post on affected users walls inviting their friends to install a Valentines Day theme on their FB profiles.

Trend Micro said in a blog post, “Clicking the Install button on the page will prompt the download of the malicious file, FacebookChrome.crx which Trend Micro detects as TROJ_FOOKBACE.A. When
executed, TROJ_FOOKBACE.A executes a script that is capable of displaying ads from certain websites.”

These attacks only work when you Google Chrome and Mozilla Firefox as your Internet browser.

This is not the first attack of this kind, “but considering that extension-capable browsers are coming to the forefront now, it serves as a waring to all of use that this may be continuing a trend that the malicious entities of the internet are going to follow in the foreseeable future,” the post writes.

These cybercriminals have been wrecking havoc on this popular social networking site and have used these types of tricks in their schemes.

So, to avoid being victimized by these unscrupulous individuals, you better look and study first before clicking any link that could potentially lead you to damaging your computers.

Devs get Absinthe jailbreak using Windows

 The release of the jailbreak for iDevices using Apple’s A5 chipset, such as the iPhone 4S and the iPad 2, was welcomed by Apple users with open arms. Much to the chagrin of Windows fans, their jailbreak has yet to be developed.

But according to iPhonefaq, the jailbreak that is being used by Apple can be used for Windows too. This jailbreak has been unethered and can be installed on any Apple device using its latest iOS – iOS 5.0.1. Those who use their Windows PCs have to back-up their device first and then update their device to the latest OS.

Here is a short list of what you need to do after backing up your device:

  1. Download Absinthe for Windows
  2. Unzip the file
  3. Run the Absinthe.exe file after extracting it
  4. Tether the iPhone 4S or iPad 2 to the Windows PC using the sync cable
  5. Click Jailbreak

The iPhone screen will show a message saying Restore in Progress, similar to that of the Mac. This process may take time to finish and after the device restarts, an Absinthe widget will appear on the gadget. Click or tap the widget and let the device do the needful. Once this is done, the device will again reboot with the Cydia Icon appearing on the screen. This suggests a successful jailbroken device.

New Facebook scam offers to change profile color

Facebook users beware! A new scam has just been discovered that tricks you to click on a link that would enable you to change your FB profiles background to black, pink or red.

Antivirus makers Sophos discovered the scam a few weeks ago. They said that the scam has already collected a total of 45,000 passwords and login information from Facebook.

In a blog post, the company explained that the scam works by asking FB members to click on a series of links that will enable them to change their profiles background color. This usually includes a survey hosted by a site outside of Facebook.

Graham Cluley of Sophos wrote, “Predictably, the point of all of this sharing is to drive more traffic to the scammers’ link where an online survey will pop-up. The more people who take the survey, the more commission that the scammers will earn.”

He also added that the scam usually uses the tricks that past scams have used to spread viruses throughout Facebook. This includes instructions to share links to their friends and comment on their profiles.

Image source:

iPad typing: still a difficulty

Touch typists will find it difficult to type a paragraph in an iPad without committing errors. Except maybe for a gifted few, the flat screen makes it hard for individuals to feel their way through its keyboard due to the absence of a physical keyboard.

For those of you who are having problems with the number of errors you make typing in an iPad, you are not alone.

Iphone and iPad developer in UK, Dave Addey, even has the same trouble as most mortals when typing in an iPad. He wondered why he was getting a ton of mistakes typing in his device. So he recorded the screen while he typed and found out which keys registered a touch and the order in which they registered.

He analyzed results he found on the video and one of his findings are that some keystrokes on the keyboard did not record in the document. An example of which is when he typed “i have”, the result became “iave”. The auto correct function automatically kicked in and corrected the word and typed “image”. Still an error considering that you typed the words “i have”.

So what would be the best tip to type faster? Practice, practice and more practice.

For those who need assistence, an app that teaches users how to “Taptype” is also available in the AppStore. But faster and more reliable means however,  it would be still  be smart to bring with you a physical keyboard such as Apple’s wireless Bluetooth keyboard or purchase a case with a keyboard attachment such as this one from Logitech. 😀

Kaspersky: Malware attacks on Android to increase in 2012

Android owners beware!

Top AntiVirus software maker, Kaspersky Lab, said that malicious files that are targeting Android based gadgets will increase this year. During the second half of 2011, the latter has targeted Android’s the most.

According to Kaspersky’s Cyberthreat forecast for 2012, “the unwanted attention that the Android platform has received from virus writers will intensify. In 2012, cybercriminals targeting mobile platforms will focus heavily on creating malware for Google Android.”

They also added that, “the dramatic growth in malicious programs for Android in the second half of 2011 saw Google’s operating system rank first among mobile platforms in terms of the number of threats. There is little to suggest that the virus writers will shift their focus in the near future.”

The increase can be attributed to the increase in the number of individuals using their mobile gadgets for Internet to do online transactions such as banking and shopping.

“Mobile espionage – data theft from mobile phones and the tracking of subjects using their telephones and geolocation services – will become widespread going well beyond the traditional use of such technologies by law enforcement agencies and private investigation companies.” The company added.

Image Credit:

Can I Run Multiple Operating Systems on My Server?

Can I Run Multiple Operating Systems on My Server?

Can you imagine if you could only work with one application such as e-mail, word processing, or browser at a time? This would obviously be a radical impairment on our ability to work. The same holds true for operating systems and platforms. Restriction to one of these at a time is a needless hindrance, and now Dell virtualization provides a way to run Windows, Linux, Mac, and other operating systems on one server.
Dell virtualization software allows you to run more than one operating system on a server. Virtualizing can save money, time, energy, and space by using remote technology to accomplish a variety of tasks without being tied down to the physical contingencies of a physical server.
To install the software for virtualization, you boot up the server or computer, load the virtualization program, and install an operating system from the media you have. The main operating system will be called the host operating system; secondary platforms will be guests. Once the virtualization program is running, each operating system you install on your server will perform like a new, separate computer. You can do anything on the guest servers that you can do with the host. You can run programs, share files, and partition drive space. The litany of benefits of virtualization includes:
Consolidation of Servers – Your server infrastructure can be maximized without having to purchase additional hardware; resources can be used more efficiently.
Energy Conservation – The less servers you have, the less electricity you will use. It has been estimated that the energy costs associated with running servers are actually more than the cost of the servers.
Management Made Easier – Managing one physical server with more than one virtual server is easier than managing several physical units. Hardware upgrades can be done using a management console, which eliminates having to shut the server down, install the hardware, and restart the server. Servers can all be managed with the same console.
Reduction of Backup and Recovery Time – Backing up and restoring virtual machines is easier as well. Hard drives and other hardware failures will not affect virtual machines as they are restricted to their physical medium.
As you can see, virtualization is a smart, efficient way to make the most of your networking infrastructure.

Google reminds users to create smart passwords

This month is National Cybersecurity Awareness Month which means online safety is gonna be much more emphasized (redundant much?haha).

In line with this, Google has come up with a few reminders of obvious-but-often-overlooked practices in keeping your online accounts secure by choosing smart passwords.

Michael Santerre, Google’s consumer operations associate, posted a list of common problems and their solutions in the official Gmail blog. Take a look and see if you have been doing any of these.

Problem 1: Re-using passwords across websites

Solution: Use unique passwords for every account such as selecting a phrase and using the first letter of every world in the phrase. You can also try swapping out letters for symbols.

Problem 2: Using common passwords or words found in the dictionary

Solution: Use a password with a mix of letters, numbers, and symbols. You can also choose two random words and put them together along with symbols.

Problem 3: Using passwords based on personal data

Solution: Your personal data can be easily found in the web social networking sites. Avoid using names of pets or children, birthdays, phone numbers and addresses.

Problem 4: Writing down your password and storing it in an unsecured place.

Solution: Don’t make it easier for others to hack your accounts. That list of complex and hard-to-guess passwords you came up would be useless if someone else found that slip of paper lying beside you computer.

Problem 5: Recalling your password.

Solution: Make sure your password recovery options are up-to-date and secure.

Again, please take the time in making sure your online accounts are safe. Just this week, thousands of Hotmail accounts were exposed through what authorities believe as phishing. Other reports say some Gmail and Yahoo accounts were also exposed. Don’t wait until yours become public too. 🙂


Top five apps to search for iPhone apps

With the gazillion (a little exaggerated, I know – but you get the point J) apps available in the market, a lot of people are now looking for easier ways to find what’s hot and what’s not.

To help sort out apps you might want to take a look at, PC World compiled a list of the top five apps that’ll help you find – yep, apps. Here’s what they came up:

App Miner

This app does what its name says: it mines for app treasures. And by app treasures, we mean those that’ll help you save a few bucks by keeping tabs on apps that are currently in bargain price in a master list. The App Miner lets you filter the list into free and paid apps, making it easier for those who doesn’t want to shell out some dough.

App Gems

App Gems helps users decide what app to get by providing user reviews for each app. Its provides a capsulated description and recommendations for the app, allowing you to somehow get the feel of what the app is all about.

App Sniper

AppSniper is similar to the App Miner, providing users with a list of apps whose prices have been dropped. The difference is that this app costs $1. To make up for the price though, the AppSniper is faster and has a more sophisticated-looking interface than the latter.


If you have absolutely no idea what app you’d want to download and you just want to leave the choosing to the er – hands of faith, then Fluke is the app for you.

This is a free app that shows you a random app at a time, perhaps making it more exciting by finding out apps you’ve never even thought to exist. If you want a bit more direction to your random search though, you can also choose to filter it by free or paid and by category.

The App Store

The last but uhm, not the least, is the App Store. According to the PCWorld, this is still the fastest way to search directly for apps, especially with the new Genius function that helps users find apps that are similar or related to the ones they’ve got.

Peace out! 😉