Your slogan here

entertainment gist




  Well, sure thing the great machine (Computer) opens up a world of endless possibilities for young and old alike.

  With a computer, you gain access to endless information both online and offline.

  In this IT era, it sure doesn't come unexpected, that computers are unrarely used in almost all fields. You'd agree with me that the world at this stage, would be doomed if this great machine (computer) ceased to exist.

  Since the advent of this great machine, life has been easier. entertainment gist

But, hey!!

  Loosing private details to unknown people have also never been easier.

  While this is most likely to happen online, it happens offline too.

  Now, there are people who go through sleepless nights, trying to steal private details of computer users. These guys are called "black hackers".

  Believe me, one of the scariest things that can happen to any computer user, is having these guys possess your private details.

  Like I aforesaid, "Loosing private details to unknown people have never been easier". There are things you do innocently every day, that can get your private details to these guys easily.

Anxious, right?

Well, read on.


Here are possible ways your private details in your computer, get leaked to unknown people and how to stop them:



  As you know, since the creation of this wonderful technology, communication has never been better. You can easily keep in touch with your friends, family and even meet new people.

  There are numerous social media platforms today; facebook, whatsapp, twitter, instagram and more.

  While you can get your details leaked in all these platforms, I'll be talking more about the "white F on the blue screen".

Hope you understand...

  The possibility of your private details getting to unknown people on this platform (facebook) is significantly higher.

  This is so, especially for people who accept random friend requests from unknown people all the time, and reveal way too much about themselves in their public posts.




·         Consider friend requests carefully. Especially friend requests from unknown people.

·         Mind the private details you disclose in your public posts.                                                                                                                                        Just a little of your details won't hurt, right? Of course, just a little won't hurt but, mind you, with that post being "public" that little detail might turn out to be a step taken too far already.                                                         

·         Avoid any untrusted software, game (both online and offline), or website, that require access to any of your social media accounts.        Trust me, few of these are owned by these guys (black hackers).                                             Now, they tell you they only have access to a little amount of your details.                                 Believe me, It's a lie. They actually possess way more of your details than you think.

·         Consider deleting old posts that reveal way too much about you because, these guys use these to guess your passwords and do other stuffs with some computer programs.






  In the computer world, there is what we call a "Trojan horse".

  These are malicious computer programs that appear harmless, but lets an attacker access a victim's computer, and all the data in it remotely.


  No one would install such a program, right?

Remember, "they appear harmless".


  Skilled hackers or better still attackers, merge these Trojans, with unsuspecting files like, software, games, or even email attachments.

  In cases like these, if you install or open this kind of software, game, or email attachment, you unwillingly install these Trojans in your computer background.

  Now, with the right software in the attacker's possession, and these Trojans running fine in your computer background, they can remotely crack into your computer, access your login details, your bank accounts, online accounts, credit card accounts, and even more.

  The list can grow even more dangerous, depending on the skill level of the attacker.




·         Install firewalls and good anti-virus programs in your computer.

·         Avoid downloading strange email attachments from unknown people.

·         Use trusted and well recognized browsers.

·         Avoid downloading computer programs from untrusted sources or websites.





  We are all guilty of this...Having over 20 online accounts with only three or four passwords, spread across all.

  While we do this because we won't possibly remember the passwords if these accounts all had unique ones, it is unsafe.

  By doing this, if someone gets hold of one of your passwords, he/she will automatically gain access to many of your online accounts.

  These accounts can range from shopping, social media, to even online banking accounts (Too Bad).




·         Create more unique passwords. That is, about 10 passwords for an average of 20 online accounts for a start.

·         Avoid saving your passwords in your computer. Especially in text, word, or excel formats.                                                                 You can write the passwords or better still, their hints in your secret diary, and keep it safe in your secret locker.

·         Avoid using stuffs like date of birth, names, or mobile numbers as your passwords. That is, mixtures of your name and your date of birth, mobile number or stuffs like that.


  These "black hackers" try these first, before using some advance tools  to search for your passwords.


  So far, so good, I think that'd be all.







 "No sooner had I concluded this article than I realized I'd forgot my last advice".





·         Do not save your login details in your browser.

·         Do not save your CV/Resume in your computer (you can save it in a flash drive).

Always update your firewall and anti-virus programs.


·         Avoid visiting your online accounts on "public" connections (especially public wifi).


  In all, I hope you stay safe.



This article was written by:

Adutomvie .B. Iyokorogha

This website was created for free with Would you also like to have your own website?
Sign up for free