Safe Use of Mobile Phones

Safe Use of Mobile Phones
The new phones have great economic value and are a temptation for the "friends of the alien". Does not lose it sight, as you do with your handbag or purse. Says the IMEI, the "registration" of the terminal, to unsubscribe if you need it. Notify your carrier if they steal it. You can also install a software that will allow its location and erasing your data private in case of theft.

If you buy a phone outside the official channels of sale invoice asks the seller to claim. Be careful because behind these sales can hide fraud (stolen phones blocked by IMEI, damaged, non-existent...).

Modern terminals allow the protection of its contents, keyboard and applications and release the same password, numeric or touch. Active protection and do not let anyone use your mobile. Do not share the password to protect your privacy and that of your communications. Avoid too or intrusion of unpleasant consequences. If you lose or steal you the smartphone from the PC changes passwords for access to email, social networking, e-commerce applications, very... that you had installed on your phone.

Be aware of the possibilities that give these phones to their owners and partners. And not become normal actions that may pose an excessive control of your privacy or lead you to a commercial bombing: used with prudence geolocation allowing instant messaging and social networks.

Attention to make, store or send yours pictures compromising or, worse still, others as well as redistribute outside images can damage the image of the protagonists. Before sending it or share it instantly on social networks make sure that it will not pose a problem for anyone, neither now nor in the future. Wanting to delete it then or expect others to do so is not the solution.

The sexting - take pictures of erotic character and/or share them - is a blunder. In the case of minors can cause situations of blackmail or sexual cyberstalking or harassment in the school environment (grooming and bullying) know many cases of people who has repented when it was late. Redeploy these images of others to hurt them is a crime.

The smartphones and tablets are, like the rest of computers and computers that are connected to the Internet, attacked through what is known as "social engineering" techniques: emails or messages posted on profiles on various social networks, distributed in bulk through accounts "abducted", incorporate links containing supposedly very attractive... and that hides under a link shortened, spam or malware. Not access links provided via unsolicited SMS: ignores these messages and, in case of possible fraud attempt, send to the national police.

They are at risk of being very effective vehicles of transmission, both for the sending of advertising spam and infect with Trojans smartphones and tablets.

Users are very aware with the prevention and protection against viruses on personal computers, but only 32% of the Spanish owners of smartphones has a program antivirus. Always use platforms, pages, updated and official firmware and software.

Periodically back up the contents of your mobile or tablet. If relevant, duplicates that content in various computer storage media (USB, domestic or Professional computers...).

Do not you connect to WiFi networks your property you idea and be prudent with the operations that you perform on public wireless networks. And, of course, not cracked the protected networks security key outside.

If you use the smartphone to buy on the Internet follows the same guidelines of safety and prevention than with the computer, but extreme caution with regard to the applications that you use and the authenticity and reliability of the web seller (that the web address begins with "https" indicating that it is a secure connection), as well as the privacy conditions of the seller or broker.
 
© 2013 Mobile Phones Reviews | Mobile Phones Prices | Cell Phone Tracker . Designed by Making Different , provided by All Tech Buzz, Powered by Blogger