What Are Cookies?

A cookie may be defined as a small file stored on a computer, capable of holding a moderate amount of data related to a particular website or user. As a result of the presence of cookies, the server is able to deliver pages custom-designed for specific users. Technically speaking, cookies are effectively small lookup tables … [Read more…]

How to Get Internet Access In Iran?

Following the recent protests over a sharp increase in fuel prices, the Iranian authorities decided to enforce a nationwide internet shutdown on last Saturday. As the internet blackout approaches a week, the incident has already triggered widespread concern all over the world. The internet shutdown has been particularly disturbing for the Iranians living or travelling … [Read more…]

Unlocking Vs. Jailbreaking

Unlocking and jailbreaking are two terms used frequently these days by many mobile phone users. However, these individuals have a lot of confusion with regard to the exact meaning of these terms. It is important to remember that these two are completely different things, though both relate to the usage of modern-day mobile devices. What … [Read more…]

How to Choose Good Security Questions?

Security questions are an integral component of safe internet usage that serves as a back-up measure to authenticate an application or website’s user, in case the user is not able to remember his or her password and/or username. Along with their respective answers, the security questions function as important pieces of information that are used … [Read more…]

Tips to Stay Safe from Hackers

In today’s technology-savvy world, most of us are familiar with smartphones, tablets, computers, and wireless internet. Many of us regularly connect our smart devices such as home security cameras and televisions to the internet for better user experience. However, in this highly internet-dependent world, we often come across scary stories about hacking. In simple words, … [Read more…]

Can Bluetooth Be Hacked?

Nowadays, almost all of us have a Bluetooth enabled phone. While this technology provides us loads of useful functions, it may also expose our phones to hacking attempts. Bluetooth hacking takes place when a hacker uses his or her own Bluetooth connection to connect to your phone. However, this can only happen if your phone … [Read more…]