Mobile Device Guide: How to Encrypt an Android Device

Mobile Device Guide: How to Encrypt an Android Device

This is a guide describing step by step directions on how to encrypt an Android device. There are several reasons to encrypt your smart phone. It keeps your data protected and secure from hackers, law enforcement and anyone else who has no business seeing it. When you think about what we all use our phones for the argument for encryption is amplified. I use my smart phone to do my banking, take all of my pictures, store medical files and important tax information. Beyond that your phone is constantly tracking you, it knows where you are every moment of your life, it knows where you live, where and when you work and go to school. Much like Santa even knows when your sleeping and awake. Every personal text conversation and email you receive is on your phone as well. Encryption is key to keeping all of this personal private data actually personal and private. I love the idea of encryption because strong encryption is mathematically impossible to break. There is not many things so full proof in life. Encryption has become so important all newer Android devices come with encryption on by default. To write this article I had to use that old nexus 5 I rooted because its running an old enough version of Android that it isn’t encrypted by default. As a side note if you are using a rooted device you must first unroot to encrypt. Encryption was not on be default on any version of Android earlier then Android 6.0 Marshmallow. Before you start the encryption process make sure your battery is fully charged and...

How to create LinkedIn profile for IT Computer Support

LinkedIn is an extremely modern and effective way of marketing yourself to employers. It allows you to present yourself along with accomplishments, skills, qualifications, and recommendations to employers. You simply need to make connections with fellow co workers as well as employers. There are a lot of recruiters on LinkedIn looking for qualified candidates, so it is important to make your profile stand out. LinkedIn helps you find people that you may have never come in contact with otherwise. Your network can become very expansive and useful. You may be talking to people in other states or even countries that you never would have come in contact with otherwise. LinkedIn is an amazing tool to help you expand your network. Expanding your network has many positive benefits. These benefits include, but are not limited to: more job opportunities, knowledge sharing, making business connections, and sharing endorsements. To have the most effective profile possible, it is important to fully fill your profile out in addition to learning the ins and outs of LinkedIn. A professional profile picture is an important first step to making a good impression. You should look professional and ready to go. LinkedIn gives you a 120-character headline to work with. Your headline should be straight to the point. Many just use their job title, but that is the bare minimum. You can expand on this and add key words along with a small description of good qualities you have and what you do. Next is your summary; this is where you include your greatest achievements and what interests you. You want to grab the attention of...

How to create professional resume and cover letter for IT Computer Support Job

Creating an Effective Resume and Cover Letter”]Creating a resume is not to be taken granted of. Without a good resume you likely will not get an interview at all; hence the resume is the most critical part of the job search. It is your job to sell yourself to the employer, to demonstrate your value to them; a cover letter can help make a good first impression. Listing skills and accomplishments will not mean much if they are not relevant to the job in which you are applying. A well written and precise resume can make all the difference in achieving an interview that you are striving for. It does not take any special talents or expertise to write a good resume, one can learn how in a short period of time if the wish to. There are a few tips, tricks, and rules that anyone can learn to help them sharpen their resume writing skills. A cover letter will be your first impression. In any field of work the first impression is usually the most important. In fact, they may decide whether you are still going to be considered for the position you are applying for depending on their first impression of you. This is why a good cover letter can be so important. You want to ensure that your cover letter gives in depth information that shows you are qualified for the job which you are applying for. Make sure you fully understand the job requirements and grab their attention by making yourself appear to be a great match. This clearly needs to be different for each...

How to prepare to complete job application and pass skills test for IT Computer Support Job

Preparing for a career in the Information Technology field is rather straight forward. There is preparation you can do to make it even smoother. When filling out a job application it is important to know everything that is going to be asked on the application and how to fill it out. There are online (email or upload) applications as well as physical applications. Most will just ask simple questions about you and have a response section. Some require a resume to be submitted along with an application. Often times, employers will deploy skill tests to make sure you are as qualified as you claim in your resume and meet their requirements. It may be useful to take practice tests or lookup sample questions on the internet. They will give you technical skill tests along with personality tests, so it’s important to understand your strengths and weakness technically and personally before you begin the application process. Job applications or ads will usually have skill requirements; it is important to understand these and make sure that you include them in your application or resume. Every application that I have ever filled out has had a reference section. Make sure you choose references carefully and ensure that they will give positive feedback. Applications are the first test or wave of screening to see who gets the job, so it is important to be as prepared as can be.   Q: Do you prefer working as an individual or a team? (Personality Test) A: Both. I work great with people, but some tasks are better left to an individual. Q: What is the...

How to negotiate salary and benefits for IT Computer Support Job

There is a lot to take into account when negotiating for job salaries and benefits these days. The expected salary range can almost always be found on the internet, but there is more to it than that. You need to compare and contrast the benefits, such as health care, paid vacation, signing bonus, 401k, stock options, and retirement options. When all is taken into consideration, sometimes the job with the higher salary is not the better job, and sometimes it is. The company’s goal is to pay you the least they can, and your goal is to get paid the most you can. It is important to learn some tips and tricks, as well as doing some research to be prepared for salary negations. The first thing I do when looking for a job is check the internet to see what the low, high, average, and median salary is for the job I am looking for (www.payscale.com is a good place to check). Payscale will show salaries in particular locations as well as nationally. This is important because it protects you from being low-balled if you have an idea of how much you should be paid. It is important to not be overly aggressive if you care about getting the job, as an offer can always be rescinded. One thing that can ruin your chances of negotiating a better salary, is offering too much compared to what they are asking. You absolutely must be realistic. However, by no means take the job if they are not offering you an adequate amount. Once you have the salary figured out the...

Microsoft Windows 10: Key Differences Between Edge and Internet Explorer Browsers

Internet Explorer 11 VS Microsoft Edge: User Interface The visual difference between Microsoft Edge and Internet Explorer 11 isn’t all that much. There hasn’t been a vast overhaul of the UI, or any drastic changes to the page layouts, and even the logo is similar. Instead, Edge features a host of minor tweaks that somehow add up to something much more impressive than IE. The interface is much more minimalist, with the navigation buttons reduced to their bare minimum. The whole experience feels sleeker and more streamlined than IE’s indefinably clunky navigation. It’s a much more pleasant browser to use, and on a par with the aesthetically gorgeous Chrome. Internet Explorer 11 VS Microsoft Edge: Features Microsoft’s venerable browser is not exactly renowned for its additional functionality. The company has taken steps to remedy this with Edge, and the new browser features a host of new applications. Most interesting of these is the annotation feature. A button at the top places a OneNote style overlay onto the current web page, allowing users to add text boxes, handwritten notes or drawings, highlight sections and copy areas of the page. These can then be shared via various channels or saved to OneNote for future reference. At present, the sharing options are limited, but expect these to increase as Windows 10 matures. It’s a surprisingly useful feature, and one that will prove invaluable to students or those that do high levels of internet research. Also present is a Pocket-style Reading List function. Any web page can be saved to a separate list from within Edge, to be read at your leisure, as...

Windows 10: Difference between Internet Explorer and Microsoft Edge Browsers

Microsoft Edge became the new updated browser about for Windows newest updated operating system Windows 10 replacing Internet Explorers browser about 2 years ago. The new browser was said to be named Project Spartan however due to its rendering engine it was called Microsoft Edge, the engine for edge is EdgeHTML. Microsoft edge engine was developed from scratch. Even though Edge is a small app it has powerful features that are huge. Microsoft edge is much faster than Internet Explorers browser, Internet Explorer had an older engine(Trident) that was slowly loading pages. It is said that Microsoft Edge promises more security, better, and faster loading than Internet Explorer for personal and business use. Blocking third-party cookies is possible in both Internet Explorer and Microsoft Edge, however only Internet Explorer allows whitelisting sites from the location in where you want to accept cookies. Internet Explorer has more user control customizing options than Microsoft Edge. You have to use internet options in Control Panel in order to prohibit sites and add restrictions. If you are utilizing Microsoft Edge you have to allow all sites to store cookies or block all third party cookies at this time until Microsoft Edge is updated to control these options further. Until then you may use a third-party program to restrict usage from some sites. Going with “Open DNS” is the best way to go setting up restricted sites. Open DNS is a cloud based service program providing protection against phishing attempts also providing faster internet browsing. Microsoft Edge is said to be better on security, protecting us from phishing sites plus more. Microsoft Edge has...

Salary Negotiation Tips and Tricks for IT Computer Support Specialist Jobs

As this is a second to last project, I find it to be one of the most important. Negotiating a salary and the benefits that come along with it to be of the most paramount of facets involved in advancing my career. In order to develop a consistent style in how I will approach salary negotiation, just as important as all of the energies that I put forward as far as resume and interview strategies. In order to develop a technique that will work consistently, I must establish a paradigm of how to work best with the available resources that are at my disposal. In looking at several of the websites indexed I amongst Google results I find statements with varying degrees of difference, ranging anywhere from loose thoughts on monster.com to extremely technical descriptions of negotiating styles available on sites that are specifically designated for the different levels of employment. As this has been a year where even the executive office of American politics is concerned with an individual that stresses negotiation as a definitive aspect of any deal, I find some inspiration in knowing that the employer seldomly comes forward with is best offer right off the bat. The necessity of negotiating is as demonstrated by several members of the professional community I necessity in gaining greater wages and benefits. As has tended to be the response of employers to finding individuals who negotiate their salaries actually more valuable than those who do not, I find it necessary to develop a style of negotiation that can serve me best when working with very employers. The importance of...

Microsoft Windows 10 Fall 2017 Creator Update: Ransomware Protection

There have been many new features that have been introduced with the new 2017 Windows Creator Update. Some features pertain to social aspects, others are for creativity, but Microsoft has also mentioned that it had hardened security, and add protection against ransomware in the new 2017 Fall Creator Update.  This new feature is called the “controlled folder access” feature. This feature prevents suspicious applications from changing the contents of selected protected folders. The main goal is to safeguard data from any ransomware infections that manage to get by third-party antivirus software. In order to activate the feature, you have to enable it through the Windows Defender Security Center App. You can access it by opening the virus and threat protection screen within Defender. From here, the user can switch on the controlled folder access option to make the feature active. Enterprise users, and administrators, can also be activate the feature through PowerShell, Group Policy, and MDM configurations. When the feature is active, essential directories such as the documents folder, are locked off from any malicious application that wants to encrypt files to hold them ransom, or even destroy them. By default, the usual folders such as Documents, Pictures, and Videos, folders will be protected by the controlled folder access feature, but it is not just limited to these folders. Other folders besides the document’s folder can also be protected using this feature. Microsoft explained, ” This feature protects your files from tampering, in real-time, by locking folders so that ransomware and other unauthorized apps can’t access them. It’s like putting your crown jewels in  a safe whose key only you...