Skip to main content

Posts

Showing posts with the label phone

Phone-Do not do this mistake while charging or else the phone may be dead.

These days everyone does a lot of phone calls due to which the phone gets dead quickly and we leave it on charging.everyone wants fast chargingBut it has a lot of disadvantages due to which the phone can be dead. Fast charge also makes a battery prone to overcharging as the charging chip on the charger or phone, sometimes may not respond in time to cut off the current. Putting all of the above factors leads to faster battery degradation and a shorter battery. advantages of fast-charging Less down time between work or entertainment sessions. One of the biggest advantages of fast charging is reduced downtime. ... Better overall portability. Reduce outlet clutter. Helps overcome low-capacity batteries. What is the difference between fast charging and normal charging? Fast charging won't damage your battery A conventional charger has an output of 5 to 10 watts. A faster charger can improve that by up to eight times. For example, the iPhone 11 Pro and Pro Max come with an 18-watt...

How is ATM and phone hacking? such hackers steal passwords .

Hacking- There are many ways of hacking. Different methods are adopted to hack from the phone's password to the ATM's PIN. Different names have been given to these methods of hacking. Let's know how hackers steal people's passwords and PINs.What if your password is leaked because of some of your mistakes? Or can someone guess your password because of your habits? Since people need passwords for everything from social media accounts to office mail. In such a situation, sometimes these passwords have to be update every few days. people use only old passwords (with minor changes) to protect their data. Their new passwords are based on the old pattern or common theme.  What does the report say? According to the latest report by Swedish password management and authentication solution vendor Specops Software , 93 percent of passwords used in brute force attacks are 8 or more characters long. At the same time, 54% of organizations do not have any tool to manage work passwo...