It’s remarkable how the trend of this [modern] age has changed the mode of life to a near-utopia and it is because of technology – the influx of electronic gadgets for use in almost all aspects of our day to day life.
In every place around this country, you will certainly find a computer of some kind; it could be a cell phone, a laptop, a wearable or just a desktop. Computers are the way to live, and now the problems of this computer age are likewise fresh and giving our privacy and even safety a hell of a time.
A few years ago the stripped pictures of well known Cinderella Sanyu aka Cindy, a dancehall music sensation got published in the tabloids, only to leave fans and culture in awe. However, the criticism was not as much because of why the pictures were taken as opposed to how they had got to the media!
In other words, keeping one’s own “nudies” is tolerable as contrasted to giving public access to them.
After the Cindy saga, nude pictures of several other celebrities have since inundated the media for everyone to see. What we know though is that no victim of such circumstance ever admitted to ever willingly publicized their nakedness; the excuse they front is that a malicious crook accessed their gadgets and stole their private “property”.
About their genuineness we are not in position to judge, however, their excuse is undeniably valid. In this information age everyone is on their toes worrying about the possibility of someone finding their “secret data” on phone or other computerized device. Entire lives are on these gadgets and entire lives could soon end just by a click of a button.
Is it even news that marriages have broken because a spouse haphazardly stumbled across the partner’s phone and fumbled with it! Office secrets have always leaked, classified files stolen and the most worrying part is the children!
Computers and smart electronics are irresistible to kids. Unfortunately, kids tend to like pushing buttons rather randomly which might lead them to materials you might never like them to see until a certain age. It is part of the reason why kids lately know too much for their little brains and that’s the greatest carelessness parents should never want to make on their kids. It is hitherto the most exact reason why parents as every other computer user should find a reason to have their gadgets a little harder to access.
Obviously the protection of private data is inspired by reasons ranging from moral, strategic to combating criminal intent. Chatting with Information Technology [IT] expert, Peter Peak, in Mukono, we managed to learn more than a few ways by which you can hide away classified information from public infringement.
The most obvious way to prevent public access to personal property is the use of password locks. This is perhaps more familiar to phone users than other gadget users. However it is a tool that laptop owners and desktop users should find strictly important as a means to block intruders from accessing private information.
It is worthwhile noting though that in the present times, not just any password will do the trick as a strong password would. Malicious and well-skilled individuals might need a password which has, for example, both upper case and lower case characters, with figures, symbols and it must be as long as possible; only this you might call a strong password although it is also not invincible.
Relatedly, it might be not totally impossible to lend your phone. The loose end here is if it uses what is more commonly referred to as a memory card. To conceal the information on it, you might consider adding a password lock to it since it’s very possible.
Secrecy can also be maintained through the installation of Computer Applications like Microsoft Folder Lock which can be employed to lock specified folders from being accessed by your kids.
As for users who own gadgets that have the Android Operating System, they can make use of a lock of a GMAIL Account whose password is private in order to ensure confidentiality of your information. This way no intruder can install or uninstall your applications/files except they open your email account.
All computer/phone users ought to beware of the network on which they connect their gadgets; these are normally wireless network such as Wi-Fi and Network hotspots which are for public consumption. Apparently bad users including hackers can easily enter into your gadget system and access private information.
Relatedly, ever after using your computer, it is very important not to leave it on internet connection because this is very easy for any hackers to break into your system and access your information – needless to say, you should always log off, sign out your email accounts or blue tooth every after use and shut down the whole system after use.
As for those whose computers are used communally, the Operating Systems such as Windows 7, allow [through the SETTINGS tool or control panel] to create different user accounts. This means that the different people can only access information on their specific accounts by means of a password.