Showing posts with label How To's. Show all posts
Showing posts with label How To's. Show all posts

Sunday, November 18, 2018

Pokémon: Let’s Go - how to transfer your pokémon Go collection

Pokémon: Let’s Go - how to transfer your pokémon Go collection

'Pokemon: Let's Go' game

Pokémon:  Let’s Go was recently launched and lot of pokémon fans are seeking how they can move their pokémon Go collection to the latest.
One awesome feature of the pokémon: Let’s Go is that it integrates with the pokémon Go mobile game. Synchronizing these two games is slightly not difficult. However, there are some tips you should be aware of before executing the sync.
Note:  Be decisive, especially beginners, once you transfer your pokémon Go to the new pokémon: Let’s Go game, you can’t send it back to pokémon Go.  Also, not every Pokémon Go collection is transferable. However, you can only transfer first generation pokémon because Let’s Go is a modified version of the original Game Boy called Yellow.
Special pokémon event, like a santa hat or Pikachu wearing sunglasses, also can’t be transferred. Meanwhile, the brand-new monster – Meltan – new to pokémon Go can be transferred to Let’s Go game.

Google is giving away free play store credit worth $2-$5 to some Android Users... Read how to check whether you already have gotten the free credit...

Simple steps to transferring your Pokémon Go Collection to the latest Pokémon: Let's Go 

Take your first step by sync your devices. You can do this by going to the main menu in Let’s Go and select Open pokémon Go settings. Immediately after that is done, the game will begin a search for your pokémon Go account. During the search, open your pokémon Go and first tap the big poké ball displaying in the center of your screen and then “settings” in the top right corner. Scroll down to the bottom and tap Connect to Nintendo Switch and here comes a notification that a pokémon Go account has been found – Choose ‘YES’ to sync and that’ll be all.

How to transfer your creatures

You may want to reinforce your pokémon party with monsters (creatures) you already had in pokémon Go. It is possible to have this done, but it won’t be a straightforward procedure. For you to access the transfer feature, you should head to the “Go Park Complex” in the game, which can be found in Fuchsia City. It’ll cost at least a few hours before you can be able to perform any transfer – Being that Fuchsia City is a dwelling pace to the fifth of the game’s eight gyms.

We would love to know your experience with pokémon Go – pokémon: Let’s Go collection transfer in the comment box below. Thanks for visiting

Friday, September 28, 2018

How to recover lost or deleted files on your Android phone

How to recover lost or deleted files on your Android phone

Should you lost your important files on your Android device? Here’s how you can regain access to them.

If actually you landed on this page from a search engine result, probably one of the following keywords brought you here;

  • Recover lost files on Android phone
  • How to recover lost files in Android
  • Recover lost android files
Well, now that you are here, I'm going to show you the simple ways you can recover your deleted files on your Android phone

Initially, recovering lost files could be executed on PC, but now it has made its extension towards Android smartphones. Losing relevant files on your smartphone is somewhat painful to experience and may be thinking that gaining access back to those files are nearly impossible. You actually need some useful apps/tools to work on your Android phone; this should prevent you from losing your documents or files even if they were unintentionally deleted.

These tools I'm gonna be sharing with you are available on Google Play. You should search any of the tools’ name on Google Play or rather follow the link I’ve provided.
Just a few seconds away from knowing these tools and how to use them; keep reading.

Must Read: How to Secure Your PC From Hackers


ES File Explorer File Manager available on Google Play Store

This is one of the oldest and trusted file manager or explorer available to every Android devices.
Apart from setting ES File Explorer as your default storage manager (if you wish to) or music player, there's so much task you can handle with it and one of them is what you are about to learn.

If you've ever deleted and recovered a file on Windows PC then you should be familiar with the desktop app known as “Recycle Bin”.
It may interest you to know that ES File Explorer has it also.

Without wasting much time, let's discuss how you can regain access to your lost or deleted Android files with ES File Explorer

Step 1. On your Android device, Download ES File Explorer, preferably from Google Play to avoid malicious attack.

Step 2. After installing the app, launch (open) it and push a slide from your left screen corner and click on “Tools” from the displayed menu

Step 3. Navigate down the menu and there you will find “Recycle Bin” already activated, just click on it and you will find all your deleted files.

A screenshot of ES File Explorer sliding menu with Recycle bin feature

#2. Dumpster

Retrieve your lost or deleted Android files using Dumpster; download from Google Play

This is another amazing tool available on Google Play whose main function is to retrieve deleted files of any format (Mp3, Mp4, txt, jpg, png, doc, and many others), as well as applications.

How To Use Dumpster to Recover Deleted Android Files

Step 2. Open the app and swipe from the left side of your screen to draw out the menu.
Step 3. Go to Settings»»Recycle Bin Settings and select the kind of files you want dumpster to save for you; preferably choose “All” kind of files.

How to setup dumpster recycle bin to help you retrieve deleted contents on Android

Should you ever delete any file from your Android device while Dumpster is installed, you can decide to either permanently delete or retrieve the file. Your decision can only be made in Dumpster app.

An illustration on how you can restore or permanently delete a file in dumpster recycle bin

Must read: How to effectively recognize Phishing attacks and stay protected

#3. Use Droid Backup

Download and install droid backup from Google play and your relevant files will always be available even when they get lost    

From the name you can easily tell that it’s a backup app which allow you to backup any type of file you do not want to lose. These files include applications, doc files, contacts, SMS, and even call logs.

How To Backup Files Using Droid Backup For Android

Backing up and retrieving files with Droid Backup is very easy. You manually choose what to be backed up and incase you accidentally lose it, Droid backup will always reverse the file into your file storage when you demand for it.

Step 2. Launch the app and click any of the logo belonging to a respective type of file. Assuming you wish to backup an app, for example, you will have to click on the android logo seen at the right end (see screenshot below)

Step 3. Click “backup” and then select the file you want to backup

If your backed up file happen to wipe off from your phone, you can restore it by repeating step 1 and then click “Restore”, then you'll see your backup files, choose the one(s) you want to restore and you're done.

Please share this tips with your friends using the share buttons provides below.

Tuesday, September 11, 2018

Best 10 Ways You Can Secure Your Gmail Account From Being Accessed By Cyber Criminals

Best 10 Ways You Can Secure Your Gmail Account From Being Accessed By Cyber Criminals

Read the Top Best Methods To Secure Your Gmail Account From Being Accessed By Cyber Criminals

Gmail security

I have come across several methods that can be performed to prevent your Gmail Account from getting hacked.

Gmail accounts which are controlled by Google Inc are now vulnerable to hackers and the rate at which Gmail accounts are being hijacked by hackers is to a very high extent. We all know the usefulness of Gmail accounts being one of the best Email hosting platforms that can be used to access all Google Products with all in one username and password, yet all of a sudden it's gone. Sad as it may sound but do you know that we are actually the one creating room for hackers to access our accounts?

Let's go into the proper business for today.

Top 10 Tips To Employ To Secure Your Gmail Account From Cyber Threats

1. Avoidance of Phishing Mails.

Avoidance of phishing emails

Try never to open any phishing emails which are usually found in the Spam folder. You know, spam messages are automatically moved into the spam folder for safety purpose. Though if you think the messages are not really spam, then you can view the mail and follow the link. But if the mail doesn't attract any sign of trust from you please don't try clicking on the link as it may be a way of accessing your Gmail account.

You may receive an email carrying the following headlines...

Your BVN has been deactivated.
Your Amazon Shopping has been shipped.

WARNING>>> Do not click on the provided link.

Recommended: See how to recognize phishing Emails

2. Using Ugly Email

This is the type of Gmail usually used in recognizing tracking emails. To get this;
Just make a search for “Ugly Email“ in your  Google Chrome browser ( i recommend you should make the search in Chrome Web Store). Having seen the Ugly Email from your search result, just click “Add to Chrome” and a new tab will be opened.
This Ugly Email will be added to your Chrome and you can find it at the top right corner of your Chrome browser.

Now to know if your Ugly Email is rocking well, log into your Gmail account and open existing emails or even new emails and if you should ever see a nasty eye that is somehow devilish in any of the mail you opened, then you should know it is a tracking email.

3. Try Using A Secure Connection

This a very important task you must carry on when logging in your Gmail account.

Try using the secure connection that is seen as HTTPS usually before the web address.

To do this:

Go to Setting»»General»»Browser Connection or better still, you should try using VPN like UltraSurf or VPN Robot for login.

To get UltraSurf on your browser, it's an extension so just go to Settings»»Extensions, scroll down to the end and click “add more extensions”, from the displayed interface make use of the search bar by searching for UltraSurf and from your result click “Add to Chrome”.

So whenever you are browsing with the browser, your connection becomes anonymous, though you can disable the UltraSurf if you wish not to use it for some websites.

4. Always Check Filter Forwarding and POP/IMAP

You really need to take this so serious as hackers may try adding filters to your Gmail account. These filters can secretly pass on emails so long the filter remains in your Gmail account.

To be on a safer side, try getting rid of any filters that look suspicious to you.

5. Try Using Incognito.

Chrome incognito mode

This may sometimes be useful most especially when you are surfing the internet with public devices found in places like Cyber Cafe, hotel and/or others. The usefulness of this Incognito or Private browser is to help you secure your connection so as not allowing cookies to store your web activities.

Recommended: How to Protect Your Android Smartphone From Hackers

6. Google 2 Step Login Verification

Google 2-step verification

This is one of the best security provided by Google. Each time you try to log in from another device, having given your login credentials, you'll be asked to take any of the following google login verification process;
  • Text me a code
  • Provide your backup Gmail account ( if any)
  • Using google authentication app and others.

But I'm only in support of the text code as it is the safest means of verifying you are the one trying to log in. Of course, the hacker can never provide the security code sent to your device to log in.

7. Track your Account Activities

Google - My activity

This is a very important task you should always do. You should always keep an eye on your Gmail account to track every activity going on in your account.

To do this, just log in to My account and at the lower right corner of the platform, you will see “Last Account Activity” just click on details. There, you will see the devices accessing your account as well as the time and location they logged in. So if you notice any unauthorized login, all you have to do is change your password at that moment before the hacker does something else.

8. Avoid ignoring Gmail security alert.

Most of us usually make this nasty mistake of ignoring security alerts sent by Google. You should know that Google only send those security alerts when they feel it's necessary for you to update your security. It may be that they noticed something fishy concerning your account and to make sure it's not hacked, they'll send you an alert to update your security.

9. Try removing apps connected to your account

Do you know that apps are connected to your Gmail account? Whenever you use your Gmail to sign up for any third-party app, they are automatically connected to your Gmail account. Hackers can even try to connect an app to your account via play store and other means. So I recommend you should always remove unauthorized apps from your account by logging into

10. Always update your number.

Never forget to always keep your mobile number up-to-date and if you should ever lose your phone number then try getting a new one and link it to your Gmail account because that's what google will always use to send you a security code.

Other Tips include:
  • Do not disclose your password.
  • Use a recovery email, that is, a secondary email.

So above are the methods of securing your Gmail account from getting accessed by hackers. I hope I've been able to provide adequate security tips for securing your Gmail account.  Please kindly share this post with others using the share buttons provided below.

Monday, September 10, 2018

How To Effectively Recognize A Phishing Attack

How To Effectively Recognize A Phishing Attack

In the technology world today, cyber fraud is the most occurring activities performed by so many people who claim to be a computer guru. It's now as if being a black hat hacker is what tells one to be a computer wizard which is absolutely wrong.

So many devices’ users have fallen victim to this cybercrime. There are many ways to which these attacks come into your devices,  but one of the methods is via Phishing.

The phishing attack is the most used method for hackers to gain access to one's social login credentials or even your bank account details.

You might have received emails from scammers containing links such that when visited, will automatically redirect you to a scam web page that looks similar to an existing popular website. For example, the redirected webpage might seem to be facebook login page, asking you to input your facebook email, or phone number or username, and password associated with your Facebook account, claiming to be partners of the Facebook team.  And immediately you input those credentials of yours, it will automatically find its way to the attacker, thereby granting the hacker access to your facebook account and might steal any relevant information found on your Facebook account. The same thing is applicable to Emails, where you will be asked to renew your email via a link that will be sent to you.

So for this, I’ve published this discussion and reading it through will help you prevent yourself from all these cyber attacks. All you have to do now is to read them carefully.

You may be wondering, what is Phishing attack?

The phishing attack is a type of cyber attack in which an attacker sends a spam link such that when visited, will open a webpage that will look the same as an existing and popular website page, it may even be social websites or any other.

Now haven known what Phishing attack really is, you now need to know how to detect their spam message whenever you see them.

How do I identify Phishing attack?

Identifying them is quite easy and needs no technical procedure. Read the methods below.

Identifying their emails:

Identifying phishing emails is very easy. At first, you will need to do the following.

» Check the source of the email, I mean their email address, their addresses are never real. Most times they use email addresses that are similar to a popular email address owned by a company ( it may be a bank, Place of work ) or a social network.

For example, you may receive an email from the email address >>>> or instead of  which is said to be the official email address for GTbank Nigeria.  You can only identify their fake email address only if you know the actual address they tried to copy.

» Most times their messages contains forceful language which is the number two proof to detect phishing attack. These scammy and forceful languages can be seen in their emails, forcing you to input some kind of your details in relation to what they are trying to steal from you. But these forceful languages are often seen on their webpage where they redirected you to, they mostly use pop up messages forcing you to input your credentials.

So you have to be aware of this!

Recommended: How to protect your Android from hackers

Check if the email contains grammar mistakes and misspelled words.

Most of their emails contain grammatical misspelled words, though not all are perfect phishing attackers does this mistake often.

Note: You may also receive phishing link via your phone message inbox. Like the one I received some time ago, I was told that my BVN has been deactivated, and a link was provided to reactivate it and I was threatened that if it exceeds 72 hours, they will have my BVN permanently deactivated. Isn't that a scam?  Yes, it is because only the bank you are operating on has the right to send such message with no threat, and if they were to give you a link, then it should be their official website and not others.

So be aware of these tricks used by phishing attackers to keep you and your credentials protected.

Recommended: How To Secure Your PC From Hackers

Please share this with others too using the share button given below.

Saturday, September 8, 2018

How To Temporarily Lock your PC If An Unknown User Tries To Guess Your Password

How To Temporarily Lock your PC If An Unknown User Tries To Guess Your Password

Still on privacy protection matters, today we shall be revealing to you some ways of securing your PC from physical access by an unknown user. Last week on this blog, we dealt with some security tips on how to protect your PC from floating malware/viruses and other malicious content which may download itself into your PC from the internet and I mentioned about subsequently downloading of your System (PC) update and setting up a strong antivirus.

But what if the bad egg you are trying to prevent from bursting into your PC is designed by a neighboring friend near you? This is why you need not to only employ cyber (internet) security but also setting up a physical privacy of your PC like what this post is talking about.

Set up your PC to automatic lock when someone tries to guess your password. There could be many ways to achieve this, but this post governs two safe methods.

How To Temporarily Lock Your PC From Unknown/Unwanted Users

Method 1. Command Prompts (CMD)

The Command Prompts (CMD) is always there to help you communicate with your PC on what you want to be configured, and this is done by serving it some command lines.

Step 1. Launch the Command Prompt Windows on your PC; to do this, go to startup menu and search for Command Prompt (CMD) or from your desktop interface press Windows Key + R simultaneously to pop up the “Run Window” and input “CMD” in the text field and hit “Enter” from your keyboard

NOTE: CMD or Command Prompt window is always dark, be sure you are running Command prompt window before proceeding to the next step.

Step 2. In the CMD window, type in the command “net accounts”. This command would list your current password policy of your PC. By default, the password policy is set as “lockout threshold: Never”; this implies that your user account will remain unlocked regardless of how many times you filled your password incorrectly.

You can modify these default settings by implementing the below commands on your Windows PC

Step 3. Exit the previous command prompt and relaunch (re-open) a new one and input the command “net accounts/lockout threshold:3”. This is an example, if you input exactly the command, it would set up the incorrect password filing limit to 5 times and once it exceeds 3 failed trials, your Windows PC would be locked.

Step 4. At default, the lock duration after exceeding the number of incorrect password fillings is set to 30 minutes. To change this, you should open and type in the command prompt the following command “net accounts/lockout duration:15”. This would set your PC to lock for 15 minutes after exceeding the configured number of trials. You can change the “15” in the command line to whatever number you may find comfortable.

NOTE: The set time is always in minutes.

Now you are done configuring your PC to lock after a limited failed user login attempt. This would help lock out spies/unwanted users from your PC.

Should you come across any difficulty prior to this method? Look down for the next method👇👇👇

Method 2. Using Local Security Policy

The Local Security Policy could help you accomplish the command on your PC. Follow the below steps to get it done.

Step 1. Open your start menu, type “local security policy” and open the app. Note that it's a system (desktop) app

Step 2. Navigate to Security Settings>>>Account Policy>>>Account Lockout Policy

Step 3. Doubleclick on “Account lockout threshold” and enter the number of invalid login attempts you wish to set and click OK. By default, the account lockout duration is set to 30 minutes, so click OK again to save the change in lockout threshold.

Step 4. If you wish to modify the lockout duration, go back and double-click on “Account lockout duration” and modify the time.

You are done!
I believe this second method is much easier to execute than the Command Prompt which seems much like you are writing a program, hahaha….

Well, the above are the two best methods that can be used to set a temporary lock on a user account on windows PC after exceeding the configured number of invalid login attempts. Cheers...