How to Jail-break your iPhone and the Pros and Cons of doing so.

Adam Zamora Tutorial on how to Jail-Break an iPhone and also the advantages and disadvantages of doing so. Jail-Breaking an iPhone is a lot more difficult then it seems and is a relatively fast process. Below I will show a step by step process showing how to Jail-Break an iPhone with iOS 10. First you need to connect your iPhone with a Thunderbolt cord and have the USB end connected to a Macbook or Mac computer, with iTunes loaded. You then need to download Cydia Impactor which is a GUI tool that works with mobile devices. With this tool you can install IPA files on iOS. Then there is a jailbreak IPA file you need to download off of https://yalu.qwertyoruiop.com/ called Yalu 10.2 Beta 7 . Then with your iPhone still plugged in you need to drag the Yalu IPA file onto Cydia Impactor. A new window appears where you need to login with your icloud ID and also the password. Click Enter after filling out your credentials. It will then begin jail-breaking your device. Once that is complete. You want to unlock your iPhone and look for the program Yalu.10.2 Clicking on it will bring up a disclaimer that says “Untrusted Developer”, you want to then double click cancel. Afterwards you want to go to your settings, then scroll down to “General” then scroll down to Profiles & Device Management. Under “Configuration Profile” you click “iOS Beta Software profile” and then double click “Trust”.. This is the IPA file that allows the phone to jail-break. In conclusion there are probably a few different ways of jail-breaking an iPhone...

Options that are available for data encryption in Windows 8.1

Adam Zamora The options that are available for data encryption in Windows 8.1 Encryption is a system of mathematical algorithms that encodes user data so only the person who encrypted it, can read it. These algorithms are the key to encryption, without them the encryption would be useless and the data would be compromised. Algorithms are key for the security in encryption, Having a good algorithm in any encryption that you use, is important. Encryption can stop the access of people that you don't want seeing the personal data, you may have. People from all walks of life use encryption like spies who collect secret information, businesses with secret recipes, and also everyday normal people. Encryption is important to all our lives. Below I will show you the options for data encryption in Windows 8.1. If you have some personal data anything from personal pictures of a loved one, social media passwords or videos of a vacation. You are going to want too encrypt these files, doing so can spare you the possibility of embarrassment or other consequences. Even though on a personal computer you can have the settings to only show the controversial files when you are logged in under your name. There is another option you can take that is built into Windows 8.1. That option is the (EFS) or Encrypting File System, this provides another layer of protection for your personal information. Using EFS can be rather easy and worth the time and effort in using. To use EFS on a folder or file, right click and scroll to the Properties box. Afterwards you click the...

7 mistakes you should avoid when searching for a IT Support Job in the Milwaukee Area

Adam Zamora 7 mistakes you want to dodge when looking for a IT Support Job in the Milwaukee area. After all the countless hours spent studying and attending class your time and hard work has paid off, you have an Associate's degree as an IT computer specialist. Sometimes all this happens rather quickly for many students and you come to the realization I have to take all the knowledge and skills I have obtained and use them to further my career. But first you have to realize that finding the right IT Support Job is extremely important if you want to have a successful career. Having a really good interview or having a referral from someone who already works there are givens when it comes to trying to get an IT Support job at someone place you see yourself working at and advancing at over a period of time. In order to have this dream of one day having that dream job there are seven mistakes you want to dodge. Not networking is a mistake you do not want to make. Networking is when you ask if anyone in your family, family friends, friends and other people in your social circle for any jobs leads to a position. You could be surprised and possibly get a lead from someone who is a friend of a friend, so to speak. If you did you could possibly get a referral if the current employee working there trusted you and your word. Referred candidates are also 40% more likely to be hired According to The Federal Reserve. Not doing your research is...

How to validate your router is not compromised.

Adam Zamora How to do validate that your router is not compromised In this day and age routers are everywhere whether it be at a household, small business or large business. People depend on routers heavily for their everyday routines whether it be a student using it to help with their homework or a businessman checking out stock prices online. Routers are constantly on all day and night usually and go unnoticed throughout a person's day for the most part. The problem with a router being on constantly is that sometimes problems can arise that disrupts the router and thus makes the WIFI no longer function. When this happens many people that are on the WIFI network have their lives disrupted in a sense. A router and the WIFI it provides is extremely important for anyone from all walks of life. Although sometimes the security aspect of a router can be overlooked when it comes too routers. So much data goes through every household's router whether it be the internet tv your dad uses to watch sports and the news, the tablet your daughter uses for art college or a guest on their smartphone ordering pizza for the whole family. With all the online activity of everyone on your router's network it's important to make sure it is not compromised. One of the more prevalent ways to compromise a router's network is DNS hijacking. This can occur when malware effects any of the devices on the network and allows a hijacker to change the DNS settings on your router and redirects towards a rogue DNS server they created. Your...

How to share Dropbox Files

Adam Zamora How to share files using Dropbox Having a Dropbox is pretty useful these days in the IT work place or even out of the work place. Being able to share files such as pictures,videos and even work memos with friends or work colleagues quickly and easily with Dropbox is very useful and a time saver for everyone involved. Below I will show you how to share files with friends and colleagues alike in a step by step process. 1st You need to have a Dropbox account. To do this you need to go to www.dropbox.com and create an account. 2nd Once you are on the home page of Dropbox on your browser. “www.dropbox.com/home . You have to upload the files to Dropbox. 3rd you find the Upload button and double click it. 4th A window should pop up that says “Upload to Dropbox” with the options of “choose files” or “cancel”. You want to double click “choose files” 5th A windows pops up showing everything on your computer. You want to scroll to whatever file you were trying to share with a friend. You can also add more than one file, if you double click add more files it allows you too do so. But Dropbox does have a limit on space unless you are willing to pay money to have more space, your space will be limited. 6th Once the file is finished loading, which should take five to ten seconds. There should be a share option to the right of the name of the file you uploaded. Double click the share option. 7th Once the...