Advances in information technology makes mobile phones increasingly
diverse and sophisticated features. Through the phone, you can not
just call and sms air-only, but also can
be used to access the Internet, photos, record video, check e-mail, even
chatting. sophisticated era, as now, did not rule out the entire contents of
the data is on your cell phone revealed
the contents. Here are some tips you can try
to apply to maintain the security of your phone's data, at least to minimize
the possibility of theft of your data.
1. Make sure always check the status of mobile connectivity, such as bluetooth or infra-red.
Better not let the feature is active because it allows other people into your phone. Make sure the connectivity is always turned off after use. Then if there is demand for connection to the phone and you do not know that anyone, there's nothing wrong if you had rejectnya for security.
2. Take advantage of existing security features on your phone.
Generally mobile phone equipped with one or more security codes to protect it against unauthorized use. This code is commonly known as PIN (Personal Identification Number) and PUK (Personal Unblocking Key), which is intended to protect the SIM card (simcard) .- The PIN code adalan the most commonly used code. This PIN code can you set yourself, can also be enabled or disabled .- In addition to the PIN code, is also called the PIN2 code is a PIN code that serves as a second layer of protection for certain features on your phone. This code works the same as the PIN code several times .- If you enter an incorrect PIN code, usually your phone will ask for the PUK code. PUK is a code consisting of 8-digit code provided by the operator or your mobile service provider.
3. Backup all important data on the phone to the computer.
If the fear of existing data on your cell phone revealed its contents, there's nothing wrong if all important data is on the phone in a backup to the computer. The goal is that when important data is on the phone is lost or damaged, you do not need to be alarmed because the data is also stored in the computer.
4. Do not forget to unplug an external memory device such as memory card (MMC) or SD card, if the phone is going in-service.
Often the phone owners forget that there are confidential data on his mobile, when the phone will 'stay' in place of service. Yes if the officer service is not nosy. If he is idle, it could be your secret data from being copied and exploited by him. To keep unwanted things, you should unplug the external memory of your phone before entering the 'garage' HP.Sekedar information, technology has now been able to reread the entire contents of the data that had stopped at the phone. As ever reported earlier, the company Trust Digital, based in McLean, Virginia, United States (U.S.) managed to bring back the entire contents of SMS and e-mails on the phone. Unfortunately, employers are reluctant to disclose what software is used.
5. For camera phones, do not use for the benefit privasi.Ponsel been regarded as an identity and confidential.
Not preclude that other people will find ways to mengkesploitasi contents. For that reason, do not occasionally use your cell phone for personal use of confidential and sensitive. For example, take and store photos or personal records of 'vulgar'.
6. Do not indiscriminate lend your phone to others. Friends can sometimes be the opposite, especially if your friend had evil intentions towards you. It could be important data, whether it be a photo 'vulgar' or secret video clip, copy and spread by your friend.
1. Make sure always check the status of mobile connectivity, such as bluetooth or infra-red.
Better not let the feature is active because it allows other people into your phone. Make sure the connectivity is always turned off after use. Then if there is demand for connection to the phone and you do not know that anyone, there's nothing wrong if you had rejectnya for security.
2. Take advantage of existing security features on your phone.
Generally mobile phone equipped with one or more security codes to protect it against unauthorized use. This code is commonly known as PIN (Personal Identification Number) and PUK (Personal Unblocking Key), which is intended to protect the SIM card (simcard) .- The PIN code adalan the most commonly used code. This PIN code can you set yourself, can also be enabled or disabled .- In addition to the PIN code, is also called the PIN2 code is a PIN code that serves as a second layer of protection for certain features on your phone. This code works the same as the PIN code several times .- If you enter an incorrect PIN code, usually your phone will ask for the PUK code. PUK is a code consisting of 8-digit code provided by the operator or your mobile service provider.
3. Backup all important data on the phone to the computer.
If the fear of existing data on your cell phone revealed its contents, there's nothing wrong if all important data is on the phone in a backup to the computer. The goal is that when important data is on the phone is lost or damaged, you do not need to be alarmed because the data is also stored in the computer.
4. Do not forget to unplug an external memory device such as memory card (MMC) or SD card, if the phone is going in-service.
Often the phone owners forget that there are confidential data on his mobile, when the phone will 'stay' in place of service. Yes if the officer service is not nosy. If he is idle, it could be your secret data from being copied and exploited by him. To keep unwanted things, you should unplug the external memory of your phone before entering the 'garage' HP.Sekedar information, technology has now been able to reread the entire contents of the data that had stopped at the phone. As ever reported earlier, the company Trust Digital, based in McLean, Virginia, United States (U.S.) managed to bring back the entire contents of SMS and e-mails on the phone. Unfortunately, employers are reluctant to disclose what software is used.
5. For camera phones, do not use for the benefit privasi.Ponsel been regarded as an identity and confidential.
Not preclude that other people will find ways to mengkesploitasi contents. For that reason, do not occasionally use your cell phone for personal use of confidential and sensitive. For example, take and store photos or personal records of 'vulgar'.
6. Do not indiscriminate lend your phone to others. Friends can sometimes be the opposite, especially if your friend had evil intentions towards you. It could be important data, whether it be a photo 'vulgar' or secret video clip, copy and spread by your friend.
trends mobile