Solve WiFi connectivity issues – Use 5Ghz frequency

The primary differences between the 2.4 GHz and 5GHz wireless frequencies are range and bandwidth. 5GHz provides faster data rates at a shorter distance. 2.4GHz offers coverage for farther distances, but may perform at slower speeds.

If you live in a condo or an apartment, for example, you probably don’t need 2.4GHz WiFi frequency. I have a lot of IoT at my home and I used to have issues when I used 2.4GHz frequency on those devices.

Typically, WiFi routers come with two frequencies. Make sure that you connect your phones, tablets, and laptops to 5.0Ghz. Here is how I did:

1. Connect to both 2.4Ghz and 5Ghz
2. Set 2.4Ghz to “auto join” off — this way your devices will not auto-join it.
3. Set 5.0Ghz to auto join” ON — this way your devices will always auto join to 5.0Ghz frequency

wifi Netgear router

If you think some devices are far enough to catch 5.0, then set 2.4 for those particular devices to ensure that they are still online.

Ever since I made the changes above, all my Internet of Things devices, phones, tablets, laptops always keep connected.

If you have better suggestions, please comment below and we will discuss.

Monetize YouTube Videos

Did you know that the videos you are uploading to YouTube can actually pay you? Yes, with YouTube’s earning program, you can actually make money! All you need to do is enable monetize YouTube videos.

How can you start earning with YouTube?

Once you have uploaded videos, you can monetize your videos by having an approved AdSense account. At certain point it will ask you to connect the AdSense account with YouTube. Once this is done, you have enabled the AdSense on YouTube. Next step is to choose videos that can are eligible for money making.

Go to your video manager console and choose the videos that you think are eligible. Once you have chosen the videos to monetize they will get submitted for review.

How does monetized videos work?

After all the above process, whenever your videos are viewed by YouTube viewer s, the ads are displayed on the video or around it. And whenever user clicks on it OR for some 1000 impressions, you get paid. The earnings or the traffic report can be monitored in YouTube’s admin console.

Learn how to make interesting videos that can make you more money.

Remove Qvo6 Unwanted Default URL from IE Chrome Mozilla browser

I struggled to remove unwanted default URL qvo6.com from my default page when any of IE, Chrome or Mozilla browsers were opened. Many sites talked about getting rid of software like Office Desk 365, etc. However, I already had uninstalled that software and still was unable to get rid of Qvo6.com from the browsers.

I also tried to check config settings 100 times but nothing was working in favor of removing Qvo6.com.

If you have also tried in the settings pane of Chrome, IE or Mozilla browsers already, try the following steps to quickly get rid of qvo6.com.

I have updated the post to include removal of the crappy bug from tiles on start menu screen of Windows 8.

Remove the shortcut

If you have shortcuts in your taskbar, simply remove it. If you want the shortcut to be present in taskbar, add a new one.

Edit the shortcut properties

If you have the shortcut on desktop, right click the icon and select Properties. Then from the Target field, remove the additional URL that is appended e.g. http://www.qvo6.com. This will get rid of the ugly url immediately. You can add this shortcut in your taskbar by dragging the icon on taskbar. This is shown in the image below.

edit properties of program

removing unwanted default url in browser

As you see in the screenshot above, ensure that there is nothing in the Target field after the ending double quotes.

Add shortcut on Taskbar or Desktop

To add the shortcut back on Taskbar or Desktop, simply find the exe program (like C:\Program Files (x86)\Google\Chrome\Application\chrome.exe, etc) in Program Files, select and right click on the exe file, then in the right click menu, click Copy. Now go to the desktop, right click in an empty area and click Paste Shortcut.

Further you can move this shortcut to taskbar by dragging.

In Windows 7 or Windows 8, you can simply open the program and then in taskbar right click the icon and select Pin this program to taskbar.

pin IE program to taskbar

Remove Qvo6 from Start Screen Tile of Windows 8

Open the Start Menu by pressing “Windows” button on your keyboard or click/tap in the left bottom of your Windows screen.

Navigate to the browser icon in the Start screen of Windows 8 and right click on it. You will see some options at the bottom of the screen as shown below.

Click/tap on “Open the file location”. Once the file location is opened, do the same exercise of editing the properties and removing the unwanted part as discussed in the earlier part of this post.

If that doesn’t help, open the file location first keep it aside for a while and in the meantime go to start again, right click the icon and unpin from task bar and start menu. Then edit the properties. Once the properties have been edited, re-add to your start screen or task bar (just how you had removed it).

unpin windows8 tile start menu taskbar

remove Qvo6 windows8 tile

Hope that helps?

This will help you remove Qvo6 from your browsers. If you have any problems, put a comment below.

Hacked Account Case

My friend Sam’s Gmail account was hacked, neither him nor me had any idea. One day the hacker was google-chatting with me through Sam’s accountPassword hacked :( and was asking me for my credit card information. I would have given the number and other information if I would have had the card that time as he is one of close friends who I can rely on and trust. Fortunately, my credit card was not with me so I referred him our other close friend John (this is his nick name) and hence I was saved from being cheated.

Hacker did not contact John!
John, who is the one I referred to hacker, was not contacted for either of the two reasons: He was not online. Or Hacker did not know who John was! John is my friend’s nick name and hence hacker did not find anything specific to John.

How could have the hacker got that I was his one of the best friends?

I am one of the regular chatters with Sam. Google saves all the chats in the chat history. For sure, hacker must have gone through the chat history to see our previous chats and from the content of our chat he guessed that we are close. Normally, when you ask your friend to do a favor, the friend if he is close won’t really think much and just do it. However, you should be alert all the time.

What may have caused the Account hacked?
All these companies like Google, Yahoo, MSN, etc cannot be blamed for this security smash. It’s the user responsibility for maintaining the security of the passwords and keeping them strong.

The reason that his password was hacked could be that he accessed it from some local cyber caf’. Hackers can read the sensitive information using some software installed on the users machine that reads every key which is fed through the keyboard. And hence he was able to crack it even when the password was strong. Sam had no way to change the password later this incident because all the account details were modified by the hacker.

It was a nightmare for me. Thankfully, neither me nor John were the hunts!

I hope these emailing companies find some better solutions like fingerprint authentication or alike to be used world wide on internet so that it would not just rely on the passwords.

Cheers,
Steve

Related Articles:

Vishing

What Is Vishing?
Vishing is a combination of Voice and Phishing that uses Voice over Internet Protocol (VoIP) technology wherein fraudsters feigning to represent real companies such as banks attempt to trick unsuspecting customers into providing their personal and financial details over the phone.

 


How The Fraudsters Operate?
A typical vishing attack could follow a sequence such as this:

  • The fraudster sets up an automatic dialler which uses a modem to call all the phone numbers in a region.
  • When the phone is answered, an automated recording is played to alert the customer that his/her credit card has had illegal activity and that the customer should call the recorded phone number immediately. The phone number is with a caller identifier that makes it appear that they are calling from the financial company they are feigning to represent.
  • When the customer calls the number, it is answered by a computer-generated voice that tells the customer they have reached ‘account verification’ and instructs the consumer to enter his/her 16-digit credit card number on the key-pad. A visher may not have any real information about the customer and would address the customer as ‘Sir’ and ‘Madam’ and not by name or the prefix ‘Mr….’ or ‘Ms…’.
  • Once a customer enters his/her credit card number, the "visher" has all of the information necessary to place fraudulent charges on his/her card. Those responding are also asked for the security number found on the rear of the card.
  • The call can then be used to obtain additional details such as security PIN, expiry date, date of birth, bank account number, etc.

 


Tips To Protect Yourself From Vishing

  • Your bank would have knowledge of some of your personal details. Be suspicious of any caller who appears to be ignorant of basic personal details like first and last name (although it is unsafe to rely on this alone as a sign that the call is legitimate). If you receive such a call, report it to your bank.
  • Do not call and leave any personal or account details on any telephone system that you are directed to by a telephone message or from a telephone number provided in a phone message, an e-mail or an SMS especially if it is regarding possible security issues with your credit card or bank account.
  • When a telephone number is given, you should first call the phone number on the back of your credit card or on your bank statement to verify whether the given number actually belongs to the bank