Friday, March 18, 2016

Thursday, March 28, 2013

Quad-Core Gadgets at a budget

Cherry Mobile is a local company in the Philippines selling rebranded China phones and tablets at very affordable prices. And by affordable it mens like more than half the market price of wht well-known brands have to offer similarly.

Saturday, September 29, 2012

Learnings from a Paypal Hacking Experience: Part Two - What to do after your Paypal gets hacked

In Part One you were shown what a Paypal hacker might do to your account. This part gives you advice on how to proceed after you get hacked.

Learnings from a Paypal Hacking Experience: Part One - What the hacker does to a PayPal account he hacks


   For most of us especially those who sell online like on eBay, PayPal is very important. It enables buyers to have the security of paying online and for sellers to have the opportunity to receive payments fast and across international borders. However the occasional bad hacker (yup, there are good hackers also) comes along and mess with your happy online existence.

   Our store Paypal account was the hacked recently and we've thought it best to narrate the experience here in order to help and warn other people. The article will be divided into 3 parts to explain what the hacker does to an account he has hacked (Part One), how to deal with it immediately (Part Two) and precautionary steps to avoid it from happening (Part Three).

Monday, August 27, 2012

How does a PayPal hacker use or turn the Paypal balance he hacked to real cash?


1) Trading the PayPal account balances

    The hacker will sell the PayPal money to a willing buyer. If the hacker is selling Paypal balance in dollars then it would be at a low exchange rate and / or less the service fee. Selling in dollars is less suspicious as they can just justify that it was something earned from providing services to foreign clients who pay in dollars.

Sunday, August 26, 2012

Here are tips in knowing how to make a strong password

Upon learning about the pitfalls of password creation in a previous post you should next learn about how to create strong passwords.