Satisfy Your Preference for Huge Flash Drives

The way storage technology has progressed recently has been staggering. Solid-state drives are now packaged into the size of chocolate bars, while portable hard drives are so powerful that terabytes of data can now fit into these devices that look like passports (pun intended as this is a WD hard drive model).

But even if these devices shrink in size, there is still a sizable market for the USB flash drive. After all, USB 3.0 ports are already built in most laptops, especially the newer models. Of course, even if SSDs and external SATAs are getting smaller, USB flash drives are still the smallest. What’s more, these minute devices now pack so much punch with their storage capacities. Let’s see which USB flash drives have impressed users with their storage capacities.

Kingston DataTraveler Ultimate GT

When it comes to sub drives, Kingston has earned the reputation of producing record breakers. In 2017, when the manufacturer released the Ultimate that comes in 1TB and 2TB capacities, it seems that they have outdone themselves again. The staggering capacity of the DataTraveler Ultimate GT should make most users look past its chunkiness.

Shipped in a silver metal case, the Kingston Ultimate GT 2TB USB 3.1 flash drive is available in 1 or 2TB capacities, comes with a blue USB 3.1 Gen 1 cable and Kingston branded black mesh carry bag, and it is capable of speeds up to 300MB/s read and 200MB/s write.

(Via: http://www.thessdreview.com/featured/kingston-ultimate-gt-2tb-flash-drive-review-space/)

Western Digital SanDisk Ultra Dual Drive Luxe

A new line of SanDisk Ultra Drive Luxes was introduced in January 2020’s CES event, and with capacities of up to 1TB, it has established itself as one of the biggest flash drives in terms of capacity. It’s also USB-C, which makes it a speedy and powerful machine. But those owning laptops that don’t have USB-C yet need not fret as the flash drive is also compatible with USB-A drives too.

Indeed, it features a dual USB connectivity: on one side, there is a USB Type-C connector, and if you flip it 180°, there is a traditional USB Type-A connector. The design of the SanDisk 1TB Ultra Dual Drive Luxe is smart.

(Via: https://www.cinema5d.com/sandisk-shows-a-8tb-portable-ssd-prototype-1tb-ultra-dual-drive-luxe-usb-flash-drive/)

Patriot Supersonic Rage

Patriot, maker of various computer-related devices including gaming keyboards, headsets, solid state drives, and mice are no slouches when it comes to producing flash drives. The Supersonic Rage has an Elite variant that comes with a 1TB capacity, making it one of the largest, but also most affordable flash drives.

While the GTX is the high performance play (topping out at 256GB), the GS is more of a capacity play (the top end version has 512GB of flash memory).

(Via: https://www.anandtech.com/show/9573/corsair-flash-voyager-gs-usb-30-512gb-flash-drive-capsule-review)

Is Your Browser Promoting Your Privacy?

With the number of people using the Internet in the millions, online privacy has been one concern that has never been more important. Fortunately, a good number of today’s browsers have been implementing changes to ensure its users that they are serious in providing them with more online privacy.

The most used browsers have come up with a number of tools to help in protecting you from first-party (used for things such as retaining your login information) and third-party (mainly used by advertisers to get information and track your behavior online) tracking cookies. Other efforts are directed towards fingerprinting, which tracks you by collecting details about your system configuration, which are then turned into your “fingerprint.”

Firefox introduces enhanced tracking protection

Trackers have already been blocked by Firefox way back September 2019. The browser utilizes Enhanced Tracking Protection, a customizable feature. This feature blocks trackers on a list of known trackers called the Disconnect list, which means not every third-party tracker is blocked. However, cookies that track across sites are also blocked by Firebox’s feature.

You can check if Enhanced Tracking Protection is enabled by checking the small shield icon to the left of the address bar. If the icon is purple, Firefox is blocking trackers. If it’s gray, there are no trackers to block. If it’s gray and crossed out, tracking protection is disabled for that site.

(Via: https://www.theverge.com/2020/2/7/21121202/firefox-privacy-tools-private-network-browser-settings)

What has Chrome done?

Chrome’s December release, Version 79, was all about improved security of passwords. In February’s update, Version 80 sees a new system for sorting cookies and blocking them from being slowly implemented. While first-party cookies are still allowed, third-party ones would need to have a same-site setting, ensuring that secure connections are used to access the sites.

Google also says that Chrome will phase out third-party cookies in two years in favor of an alternative system to cookies using new technologies Google is developing.

(Via: https://www.theverge.com/2020/2/11/21126427/google-chrome-privacy-tools-private-network-browser-settings)

On the edge, but secure

Not to be outdone by Chrome and Firefox, Microsoft’s latest update of its Edge browser has user privacy as a priority. Many have praised the new Edge’s privacy settings that are allegedly easier to use and understand compared to Chrome’s. Edge’s privacy settings are so powerful that users are being asked by the websites to disable their ad blockers even though they don’t have one installed. That means that the privacy settings of Edge can be an ad block in disguise.

Edge offers a one-click-to-fix experience that’s easy for anyone to control the degree of privacy they want while browsing the web. That’s to say, it’s quick and easy if you don’t really know what to look for, and you’re simply looking to be

Take Your Pick From the Best File Sending Apps and Services

Whether for work or for friends and family, we usually must share documents and files. The thing is, there are a lot of cases when what we share is larger than what our email services allow us to attach.

Take note that for these recommendations, we have to consider those three factors: (1) The service has to send the files fast, or at a speed that most, if not all of us are accustomed to. It’s the speed that we expect from these services – once we’ve told mom that we’ve already sent the files, all she needs to do is log in and click the link on her email so that she could download the file from her end. (2) The service has to be secure – not prone to hacking and access by third parties, although most services and cloud drives can’t promise end-to-end encryption, or the practice of these services not having any access to your files at all, even for law enforcement. (3) Lastly, these services or apps need to be as flawless as possible. The fewer hiccups, the better, of course.

Dropbox

One of the more ubiquitous file-sharing services, Dropbox provides users with free storage (2 GB), as well as plans starting at 2TB for $12 monthly. It also offers some value-added services like file-sharing enabling across the web, files and folders syncing between devices and the cloud, file collaboration with those you’ve shared the file with, among others. A new app was also introduced to the market in January 2020.

However you feel about it, the new Dropbox will start rolling out to everyone today. Those shared folders are now “Dropbox Spaces” — a hub, effectively, built around your shared files.

(Via: https://techcrunch.com/2019/09/25/dropbox-will-start-rolling-out-the-new-dropbox-app-to-everyone-today/)

 

iCloud

iCloud, Apple’s cloud storage service, maybe a bit behind its file-sharing rivals, though there have been strides for the product’s improvement. A free 5 GB of iCloud storage comes with every Apple ID, and paid options start at $2 monthly for 50 GB. iCloud is best of course, just like with anything Apple, if you and your network of friends and family also use Apple software. If not, there can be hitches. In terms of security, full back up encryption has been dropped though, and it has been reported it is because of law enforcement pressure.

Reuters is reporting that Apple made the decision not to let users create and store personal encryption keys for iCloud Backup under pressure from the US Federal Bureau of Investigation.

(Via: https://tidbits.com/2020/01/21/apple-allegedly-dropped-full-icloud-backup-encryption-under-fbi-pressure/)

 

OneDrive   

Microsoft cloud storage, One Drive, aims to be as permeating as other products of its parent company. Thus, for those who work extensively with MS Word, Excel, …

If You’re a Victim of Data Hacking, Here’s What You Should Do

It’s only the first months of the year 2020, but the number of cybercrimes that has happened this year is already alarming. In the third week of February, MGM Resorts declared that personal information of its close to 11 million guests who have been into one of their hotels and resorts was dumped and released on a hacking forum. Published in the hacking site were millions of complete names, addresses, contact numbers, and birthdates. Members of the tech press were quick to confirm the accuracy of the released information by getting in touch with the published names in the forum and true enough, the information is accurate.

A security incident occurred in summer 2019, as a cloud server containing information of previous guests was accessed without proper authorization. If it’s any consolation, no credit card or financial information was published. So far, the resort giant has only released a statement saying that they have taken steps to improve their network security. For everyone’s reference, MGM’s facilities include the Mirage, Excalibur, Bellagio, Luxor, and the MGM Grand in Las Vegas, as well as the Borgata in Atlantic City, golf courses in Las Vegas, Mississippi, and California, and other properties in New England and China.

With this massive data breach occurring months ago and only made known now, it seems that everyone involved in the digital, online times (that’s almost all of us unless you’re living out of the grid) are at great risk. Are we helpless about this situation? What can we possibly do if we have fallen victim to a data breach? We investigate ways on how to cope with data breaches.

Has your data been leaked?

You need to know whether you have been victimized first. Just because you have transacted with a website that has been hacked isn’t a 100% guaranteed that your information has been compromised.

The first step is to find out if your information was a part of the latest data hack. One of the most efficient and fastest ways to check is to use the site haveibeenpwned. The site works by using your email address to see which data breaches your information was a part of and if you were affected.

(Via: https://www.forbes.com/sites/nicolemartin1/2019/09/19/what-to-do-if-your-data-was-breached/#37aa5b976012)

 

What has been stolen from you?  

If you are now 100% certain that your data has been leaked, it is time to determine what information about you has been leaked. Leaked information can be classified as least sensitive (your full name, street address), more sensitive (payment methods, email addresses), and most sensitive (security codes of your payment options, social security numbers).

An online-account password, combined with an email address, can be used to hijack online accounts. A card security

Get Your Apps to Help You Sleep

So many of us use our smartphones as alarm clocks, helping us wake up and get out of bed every single morning. But then, are most of us even aware that we can also use our trusty devices to get us more shuteye? App stores are filled to the brim with apps that are ready with sounds and music to lull us to sleep. Some even have timers so that they don’t have to be operated the entire time. Let’s have a look at these apps are and see how they can help us get that much-needed 8 hours of sleep.

Calm

The app Calm not only is effective when it comes to making its users sleep, as it also includes other subjects such as meditation and mindfulness. For those who want the app to do what it does best, it also contains a series of “sleep stories,” which is a sort of throwback for adults since it resembles night time stories they enjoyed as kids with their parents reading to them. These stories have been reviewed as effective in easing you gently into slumberville. There are some free stories, although more are included in a subscription for $13 monthly (although they are also free for a trial period). The stories are usually around 25 minutes, and it is hoped that before the story ends, you’re already off to dreamland.

Calm has also partnered with famous athletes to take their features and content a notch higher.

To that end, future Hall of Famer and current Los Angeles Laker forward, LeBron James, has partnered with meditation and sleep app Calm to shine on a light on mental fitness and the important role it plays in a successful athletic career, especially when a player has passed their prime and may need to rely on tools other than their athletic abilities.

(Via: https://www.forbes.com/sites/simonogus/2019/12/25/lebron-james-partners-with-unicorn-app-calm-that-focuses-on-your-mental-fitness/#483d293d37d3)

Pzizz

Pzizz has available sleep and focus sounds that aim to put users to sleep. These sounds are custom mixed, so you can have voiceovers, music, or other sounds. Initially available through a free trial, users who want to continue will need to pay a monthly subscription fee of $5.

Pzizz uses psychoacoustics (a.k.a., the psychological affects of sound) to treat insomnia.

(Via: https://www.womenshealthmag.com/health/g27045304/best-sleep-apps/)

Sleep Sounds

What users like about Sleep Sounds is that is very straightforward and simple, and as its name suggests, it is singular and focused on sleep. Available in the app are general sounds that can make you fall asleep, such as a creek or a cozy crackling fire, or you also have the option of creating your own mixes that can contain everything from instrumental guitar to rain calmly falling on the ground. …

Being on the Safe Side of Being Online

Oh, the world wide web, how fascinating our lives have been with it! It has opened is to a whole new dimension of information we have no access to before. But then, just like any other place that’s worth exploring, there may be dangers that lurk on the sides that if you fall victim to, will damage your entire experience. So, you need to be aware of these hazards and keep yourself safe when surfing online. What’s great is that you don’t really need to be a computer science genius to know how to amply protect yourself when exploring the internet. Minimize your risk by taking note of these tips to enjoy a safer web experience.

The Importance of Upgrading

Let’s admit it: Most, if not all of us, get annoyed when programs in our computer get upgraded without our permission. These silent upgrades are not done for no reason, though, as they play a key role in keeping everyone safe. Moreover, browsers and OSes have made it point to roll out their updates in a seamless fashion, making it a point to not bother users. It would be best to apply these updates on all applications and programs, not just on your browser or frequently used programs. Don’t allow old versions of programs to be left in your machine, as they are susceptible to attacks, not to mention that they may soon (or may have already) be without support.

Silent upgrades might occasionally be annoying (and costly), but they’re a big part of keeping you safe, which is why the updates for most OSes and browsers now happen seamlessly. Apply updates whenever you’re asked to on all your applications, not just your browser, and be wary of leaving older hardware gathering dust on your network.

Viruses and malware are constantly evolving to exploit vulnerabilities in your software and hardware. Software developers try to fix these flaws as soon as they are discovered. What many people don’t realise is that infections occur because people delay software updates that fix these flaws. In short, they could have protected themselves by installing the updates to fix the security holes as soon as they came out.

(Via: https://www.necl-it.co.uk/2019/03/08/the-importance-of-keeping-software-up-to-date/)

That Required Two-Step Verification

Users are pretty much exposed to two-step verification, with most tech firms giving users the option to set it up on their accounts. What it is, basically, is that users can have an SMS or code to supplement their usernames and passwords every time they log in on a new device. Google and Microsoft highly encourage two-step verification, while for Mac users, they call it 2FA, or 2 Factor Authentication. There’s a slight difference in the process but the overall …

Free Your Phone by Unlocking It

Let’s admit it: Not all of us can buy a phone outright. We would need to save and penny-pinch on some unnecessary expenses for months just to gather enough cash. By the time we have saved enough, it would be most likely that the phone we are eyeing to buy is already not the latest. Thus, it makes sense for most of us to rely on a monthly contract with a carrier to make the phone’s cost more manageable, not to mention you can get the phone the moment you sign the contract. But then, once the contract period is over, you may already legally own the phone, but do you still want to carry on with your carrier? There may be plans with better value on other carriers, so you may want to use your phone when you make that switch.

Of course, the biggest hindrance to your plans is that more often than not, phones that are given through contracts are locked to the carrier. After all, phone locking is a way for carriers to maintain their hold on their customers and prevent them from using the phone they acquired with their contracts to other carriers. However, recent legislation has made it easier and legal for phone unlocking to be done. Finally, not just because it has become easier and legal does not mean that you can DIY yourself through the process.

T-Mobile

Should you bother to unlock your T-Mobile phone? Yes, because they are GSM-based. This means that an unlocked T-Mobile phone can be used with other international carriers, including AT&T.

T-Mobile makes it pretty easy to unlock your phone, but there are just a couple things you need to do first.

(Via: https://www.androidguys.com/guides/how-to-unlock-your-t-mobile-phone/)

 

Sprint

An unlocked Sprint phone can be used as a prepaid phone and can also be used in mobile virtual network operator (MVNO) brands like Net10, Twigby, and Boost Mobile, among others.

For postpaid customers with SIM unlock-capable devices, Sprint has chosen to simply unlock active eligible SIM unlock-capable devices without requiring our customers to initiate an unlock request. Once you meet the requirements outlined in the Unlock Policy, Sprint will automatically unlock your active eligible SIM unlock-capable device.

(Via: https://www.androidguys.com/guides/how-to-unlock-your-sprint-phone/)

 

AT&T

AT&T is one of the world’s largest wireless service providers with subscribers. With over 150 million in their fold, they are attracting more subscribers, but surely, there are also current AT&T who want to escape its clutches.

AT&T’s phones operate on a GSM-based network which means they can theoretically work with numerous other carriers. The catch, of course, being that the handsets need to be unlocked first.

(Via: https://www.androidguys.com/guides/how-to-unlock-your-att-phone/)

 

Verizon

A Verizon phone operates on …

The Coronavirus Has Taken Its Toll on the Tech Industry

The coronavirus has been greatly affecting all areas of global society, the tech sector included. Some of the world’s biggest companies have closed stores, offices, and factories in China, with their employees being restricted from nonessential travel. The closure of stores throughout the country coincided with the Lunar New Year, a time when businesses close shop for everyone to observe the holidays. But then, the closures were extended until February 10. However, there are some provinces in the country that have advised companies to further delay their openings until March 1.

Many short and long-term effects are expected, from events being postponed to product launches not happening as scheduled. Looking deer into what’s happening, here are some of the ways that the coronavirus has been crippling global tech:

Employee travel restricted

Not just has the coronavirus stopped employees of the tech industry to cancel travel itineraries to China, Hongkong, and Macao, but travel plans to other parts of the world have also slowed down. LG, Facebook, Apple, and Amazon are just some of the companies that have stopped employees from traveling to China and telling those who are based in China to work from home instead.

The virus has already killed more than 630 people, infected 31,000, and spread to at least 25 countries, prompting many countries to warn against travel to China. But after the World Health Organization declared the outbreak a global health emergency, companies are becoming cautious of any unnecessary travel.

(Via: https://www.businessinsider.com/wuhan-coronavirus-apple-amazon-google-close-offices-travel-china-spread-2020-1)

 

Factories closed

The manufacturing of goods in China has come to a halt following the lockdown of the Hubei province, which has Wuhan, the epicenter of the virus. The province and surrounding areas also happen to be hubs of technology manufacturing, and with factories in the area expected to be closed until the next weeks of February to early March, global supply chains will feel the squeeze.

Wuhan, the epicenter of the epidemic, is home to many electronic suppliers. Provinces like Zhejiang, Guangdong and Henan are very important for technology manufacturing and are also the most affected by the virus.

(Via: http://emag.directindustry.com/how-is-the-coronavirus-affecting-the-tech-industry/)

 

Production paused

With factories in China crippled, a lot of tech accessories, particularly smartphones, headsets, and cars, among others are expected to be delayed in production. Of course, Chinese brands such as Huawei, Oppo, and Xiaomi will bear the biggest brunt.

For smartphone companies in China, the suspension of factory operations could lead to a snag in manufacturing processes and even supply shortages, according to analysts. This is especially so for companies who rely on factories and components in the province of Hubei – ground zero of the outbreak – where many cities are currently under lockdown.

How To Reset Your PC Password

Forgetting your password can be so frustrating. But it happens. Sometimes even more than we’d like. Fortunately, all hope’s not lost. There are a few methods you can do to reset your password and gain back access.

 

There are several ways to go about resetting your password in order to regain access to your account. But the methods will depend on whether the account you’re trying to gain back access is a local account or a Microsoft account. But whichever it is, as mentioned, there are many ways. So rest assured, you will get your account back.

 

Using a Microsoft account to sign in

If you cannot sign in using a Microsoft account to log in to your computer, go to Microsoft’s account recovery page and enter relevant data, or what the website is asking from you. Enter the security code from the choices given and enter it in the verification.

If you use a Microsoft account to log in to Windows 10 and find yourself locked out, head to Microsoft’s acount recovery website and enter your email address, phone number or Skype name, then click ‘Next’.

Choose how Microsoft will send you a security code, then enter the missing info and click ‘Get code’.

Once you’ve received the security code, you’ll need to enter it in the “Verify your identity” box. You’ll now need to enter a new password; re-enter it to confirm, then click ‘Next’ to finalise the process.

(Via:https://www.techradar.com/how-to/how-to-perform-a-password-reset-in-windows-10)

 

Using a local PC account to sign in

If you are using a local account and not a Microsoft account, then you can do this instead:

If you’re using Windows 10 version 1803 or later, select the ‘Reset password’ link under your username on the login screen.

You’ll need to answer your security question, then enter a new password. This will then be saved as your new password from now on.

Alternatively, if you’re signed in you can press Ctrl + Alt + Delete, then click ‘Change a password’. Enter the name of the account whose password you want to change, then enter a new password below.

(Via:https://www.techradar.com/how-to/how-to-perform-a-password-reset-in-windows-10)

 

Using a PIN to log in

A PIN is different from a password. If you used it to log in but forgot what it was, then this is how you do it:

If you’re already signed in to your account and want to change your PIN, that’s simple enough. First of all, make sure you’re connected to the internet. Now, click Start, then the Settings cog and go to ‘Accounts > Sign-in’ options.

Click ‘I forgot my PIN’, then enter your account password and click ‘OK’. You can then enter a new

How Do You Partition A Hard Drive?

Drive C and D are part of the hard disk drive (HDD) or more commonly known as hard drive. If you find drives C and D in your PC, then it means it already has one partition. But can you make more partitions? Yes, you can. Computer users do this if they want to separate data and programs, or if they want to have another operating system on their computer.

Drive C is the main partition that contains the operating system, system files, applications, programs, and data related to them. Drive D, on the other hand, is used only for back up storage. Why C and D though? What happened to A and B?

 

But first things first. Keep in mind that HDDs along with SSDs (Solid State Drive), DVDs (Digital Versatile Disc), CD-ROMs (Compact Disc-Read Only Memory) are physical storage devices. And they have two volumes. Now that we got that out of the way, what did happen to A and B?

 

A and B were letters assigned for floppy drives and the older tape drives back then. And since such things no longer exist (well, technically, they still do but they are no longer in use), the letter assignment was awarded to the next line: C and D. Succeeding letters will be for other storage drives both internal and external.

 

But again, before we proceed with the partition, you might want to take extra precaution when it comes to your data and files.

 

The first thing you want to do is have backup. Back up as many files as you can: photos, music, videos, documents, and other important files.

Make a full image backup of the entire drive if you don’t already have one. Disasters happen.

(Via:https://www.pcworld.com/article/2066191/how-to-partition-a-hard-drive.html)

 

Ensure that there is enough space.

Make sure you have enough free room on the existing partition to create the new one.

You might also want to empty the recycle bin.

If you still don’t have enough room, you can move files to an external drive. Once the partitioning is done, you can move them back to a new partition.

(Via:https://www.pcworld.com/article/2066191/how-to-partition-a-hard-drive.html)

 

Next, open or run the partition tool.

Open Windows partitioning tool. Windows comes with a reasonably useful partitioning tool. It will probably serve your needs, and if it doesn’t, you’ll know soon enough. To open it, type partition into the search bar, then click on Create and format hard disk partitions. (In Windows 8, type partitions—yes, you need the s).

(Via:https://www.pcworld.com/article/2066191/how-to-partition-a-hard-drive.html)

 

Shrink the current partition.

Right-click the partition and select Shrink Volume.

Then wait. It may take a while Eventually, a dialog box will ask how much