iPad Tips And Tricks Infographic

It’s amazing, sometimes, how long you can have a device like an iPad and still not know some of the most useful tips to help you get the most out of it. So… Here’s an infographic to help you out. Some of these tips can apply to your iPhone as well.

(click the image to enlarge if you have problems reading it)

Infographic courtesy of Kensington. Do check out their product line after bookmarking this page.

Concerned About Network Security? Hire a Hacker

If you’re worried about your network security, then you may think the last thing you should do is to invite someone to hack your network. However, one of the types of cyber protection you may not know about involves hiring teams of so-called “ethical hackers” to discover your system’s vulnerabilities.

Beware of Cute Cats

What is it about cat pictures or videos people find so irresistible? The Wall Street Journal reported that an ethical hacking company called PhishMe, co-founded by Aaron Higbee, put together a phishing email that featured a picture of a Turkish Angora cat with a purple mohawk. The email promised that clicking a link would lead the user to more cat pictures. Instead, the link led the employee to a warning from the tech department.

PhishMe designed another fake phishing email designed to prey on employee competitiveness. He sent an email to employees that appeared to come from the company CEO. The email had an attachment that claimed to contain figures for potential bonuses for many company employees. PhishMe then sent a second email attempting to recall the first. Many employees clicked the attachment, which again sent them to a warning page.

Higbee says that cute cats are to employees like kryptonite is to Superman. Of the 3.8 million employees that PhishMe has worked with, 48 percent have clicked on the cute cat phishing email. PhishMe’s work reveals vulnerabilities to “social engineering,” which are attacks designed to capture sensitive information from employees.

Common Vulnerability Points for Networks

In addition to attacks that prey on human frailty, hackers can capitalize on a number of vulnerable network points, including:

  • Wi-Fi networks. When employees do work over wireless, they can expose the company to a hacker. A “man-in-the-middle” attack, for instance, can use a computer with two wireless cards near a Wi-Fi hotspot to lure employees into logging onto a fake network. One wireless card connects to a legitimate network while another generates a fake network. Employees log onto the company intranet through the fake network, giving their credentials to the hacker.

  • USB drives. Imagine an employee using a USB stick to take work from the office to his or her home. The employee’s personal computer downloads a virus, which then transmits itself to the USB drive. When the employee returns to work and inserts the USB drive into a corporate computer, the virus could penetrate the corporate network. The Stuxnet worm, which took down the network at an Iranian nuclear facility, was probably delivered by an operative using a USB drive.

  • Weak passwords. Many employees use obvious passwords like “123456,” “iloveyou,” “password” or their names. Sometimes, they write their passwords on sticky notes and stick them to their monitors or the undersides of their keyboards. Also, many employees use the same passwords for multiple accounts. For instance, if an employee gives away a company email password in a phishing email, and he or she uses that same password for online banking, the employee could face a serious problem.

  • Ethical Hacker Tactics

    Ethical hackers use multiple techniques to reveal network vulnerabilities. An ethical hacker may sit out in a company parking lot and attempt to launch a man-in-the-middle attack on the company’s wireless network. Also, some ethical hackers drop rigged thumb drives in company bathrooms, which employees often pick up and insert into their USB ports. Some ethical hackers go so far as to conduct in-person breaches. For example, a hacker may dress up like a package delivery person or a fire marshal to gain access to restricted company areas.

    Look for an ethical hacker who holds the Certified Ethical Hacker (CEH) credential. A CEH has training in subjects like virus creation, buffer overflows, social engineering, policy creation and intrusion detection. CEH students aren’t allowed into training centers without undergoing a thorough background check. After completing training, a CEH has to pass an examination to earn his or her final credential. CEH’s also sign legal agreements stating that they will not use their training for illegal or malicious purposes.

    If you’re concerned about data loss or network vulnerability, you can find an ethical hacker who can determine your network’s weak spots. These hackers do an important service for consumers, businesses, not-for-profits and government agencies.

How Replace A Motorola Droid RAZR Maxx HD XT912 Screen

Using a spudger (or guitar pick), carefully release all the clips around the edges. The back is affixed to the phone with double-sided adhesive tape. Carefully pull from each corner and edge until it comes away from the phone.
With the battery revealed, remove the three screws along the bottom , the two on the sides, and two on the top corners with a T4 bit. Beware. There is one more screw under the top plastic cover.
Use a guitar pick or similar pry tool to get underneath the camera panel. Be careful around the rear camera.
Remove the final T3 screw.
Use a guitar pick or similar pry tool to release all the clips around the edge of the bezel. Be careful around the buttons and the sim card slot. I released everything I could on the top, bottom, and around the sim card slot. Then I pried loose the sim card slot and the side with the buttons became much easier.
Using tweezers, remove the battery lead cover shown here. Be careful to not connect the two leads with your tweezers or screwdriver. Remove both T5 screws.
SLowly and carefully pry up the battery. Do not use the pull tab as the batter will be taped down pretty securely. Work your way around the edges of the battery until it feels loose enough to pry up and remove it.
Remove the three T3 screws shown here and remove the battery casing.
After removing the battery frame, remove the yellow tape shown here. Now gently release the three black ribbon clamps as shown. In this photo, the first is released and I am about to release the second.
Using a guitar pick or pry tool, release the four clips that hold the camera housing in place. There are two on the top edge of the phone and one on each side. Once those have been released, use a pry tool under the center of the top edge (even with the screw hole) to pry it up slowly. When loose, carefully pull the camera housing away while unplugging the ribbon cables.
Now remove the cable shield as shown here. In this photo, you can see that I am prying it towards me to release a sticking point. There are cables under here, so be careful and use a safe prying tool!
Once the shield is removed, gently pry up the cable connections as shown. Do all three. The section will be able to raise up a little, but do not pull it out.
Starting in the corners, pry around all the edges of the board. Pry only the edges and be very patient. The board is expensive and you can break it if you’re not careful.
Once you’ve removed the broken screen and bezel, you can now put the new one in place. Don’t forget to attach all three ribbon cables. Be patient and line them up if they don’t connect easily.
Remove the two cameras from the housing and first get the rear-facing camera (on the left) in place and attach its ribbon. Then put the housing in place, and finally add the front facing camera and attach its ribbon cable.
Now put the cable cover back in place the same way you got it out.
Replace the battery housing and secure it with the three screws you removed earlier. Then re-attach the battery cable with the screws the match it.
Now replace the plastic outer bezel and make sure all clips snap into place.
Replace all 7 screws in that hold the bezel and camera housing in place.
Now replace the camera lens and flash cover and the antenna on the bottom.
Finally, replace the back cover and give it a little pressure to get it to stick again and you’re done.
If you’ve done everything correctly, you’ll end up with a working phone and a new screen.