Diftrak

Contact information, map and directions, contact form, opening hours, services, ratings, photos, videos and announcements from Diftrak, Information Technology Company, Enugu.

Your professional, responsive, and visually appealing website with a promise of positive brand exposure at very affordable price

Professionalism and flexibility guaranteed

Dm now to get started

27/05/2023

๐๐ˆ๐ˆ ๐š๐ง๐ ๐’๐๐ˆ๐ˆ
In cybersecurity, PII (Personally Identifiable Information) and SPII (Sensitive Personally Identifiable Information) are terms used to classify different types of personal information based on their level of sensitivity and potential risk if exposed or compromised.
1. Personally Identifiable Information (PII):
PII refers to any information that can be used to identify an individual. It includes but is not limited to:
- Full name
- Social Security number (SSN) just like NIN in Nigeria
- Date of birth
- Home address
- Phone number
- Email address
- Driver's license number
- Passport number
- Financial account numbers (e.g., credit card, bank account)
- Biometric data (e.g., fingerprints, retina scans)
- Medical information
The exposure or unauthorized access to PII can lead to identity theft, fraud, or other malicious activities.
Protecting PII is crucial to maintaining individuals' privacy and preventing personal harm.
2. Sensitive Personally Identifiable Information (SPII):
SPII refers to a subset of PII that requires additional protection due to its highly sensitive nature.
It typically includes information that, if disclosed, can cause severe harm, financial loss, or reputational damage to an individual. Examples of SPII include:
- Social Security numbers
- Financial account numbers (e.g., credit card, bank account) in combination with other identifiers
- Health records
- Personal information of minors
- Criminal records
- Tax identification numbers
- Genetic information
- Trade secrets or proprietary information
SPII requires stronger security measures, such as encryption, access controls, and stricter handling procedures, to minimize the risk of unauthorized access and potential harm to individuals.
Organizations and individuals handling PII and SPII have a responsibility to implement appropriate security measures to protect this information from data breaches, unauthorized access, and misuse.
Compliance with relevant data protection regulations, such as the General Data Protection Regulation (GDPR) or the California Consumer Privacy Act (CCPA), is also crucial in safeguarding PII and SPII.
Stay Liquid

23/05/2023

๐—œ๐—ป๐˜๐—ฒ๐—ฟ๐—ป๐—ฒ๐˜ ๐—ผ๐—ณ ๐—ง๐—ต๐—ถ๐—ป๐—ด๐˜€ (๐—œ๐—ผ๐—ง)

IoT, or the Internet of Things, is a concept that describes the connection of everyday objects to the internet so they can send and receive information.


Think of it like this: imagine if your regular objects, like your fridge, your car, or even your watch, could have the ability to communicate with each other and with you through the internet.


They could collect and share data, perform tasks, and make your life easier.


By connecting these objects to the internet, they can become "smart" and gain new capabilities.


For example, a smart fridge could let you know when you're running out of milk and automatically order more for you.


A smart thermostat can adjust the temperature based on your preferences, even when you're away from home.


The main idea behind IoT is to make our physical world more interconnected and intelligent. It enables devices to work together, share information, and make smart decisions, all with the goal of improving our lives and making things more convenient.

Stay Liquid

08/05/2023

๐’๐ฒ๐ง๐œ๐ก๐ซ๐จ๐ง๐จ๐ฎ๐ฌ ๐š๐ง๐ ๐€๐ฌ๐ฒ๐ง๐œ๐ก๐ซ๐จ๐ง๐จ๐ฎ๐ฌ ๐ฉ๐ซ๐จ๐ ๐ซ๐š๐ฆ๐ฆ๐ข๐ง๐ 


Synchronous programming is like waiting in line at a grocery store. You have to wait for the person in front of you to finish before you can start scanning your items.

Similarly, in synchronous programming, the computer executes one line of code at a time, and it has to wait for each line to finish before moving on to the next one.


Asynchronous programming is like ordering takeout. You place your order, and while the restaurant is preparing your food, you can do other things like check your email or read a book.


In asynchronous programming, the computer can execute multiple lines of code at the same time, so while it's waiting for one task to finish (like waiting for data to be fetched from a server), it can move on to another task.


The main advantage of asynchronous programming is that it can make your programs more efficient and faster.


By allowing the computer to do multiple things at the same time, you can avoid wasting time waiting for tasks to complete.


However, it can also be more complex to write and debug, so it's not always the best choice for every situation.


I hope that helps explain the difference between synchronous and asynchronous programming!


Stay Liquid

24/04/2023

Tried out few things on html css and javascript yesterday. ..

Seems like I'll use it as my portfolio. ..

What do you think guys ..

P.S: I do not have copyright to the music
Artist: Simi..

Stay Liquid

Send a message to learn more

15/08/2022

Do you want to learn how to split your screen?

Then this video will help you.

PS: it will work perfectly for Samsung users

22/07/2021

๐‘๐„๐’๐๐Ž๐๐’๐ˆ๐•๐„ ๐—ช๐„๐ ๐ƒ๐„๐’๐ˆ๐†๐โฃ
โฃ
Before tablets and mobile phones, web pages were designed only for computer screens, and it was common for web pages to have a static design and a fixed size.โฃ
โฃ
โฃ
Responsive web design (RWD) is a web development approach that creates dynamic changes to the appearance of a website.โฃ
โฃ
โฃ
This appearance depends on the screen size and orientation(Potrait/Landscape form) of the device being used to view it. โฃ
โฃ
โฃ
It is one approach to the problem of designing for the many of devices available to customers, ranging from:โฃ
โฃ
๐˜š๐˜ฎ๐˜ข๐˜ญ๐˜ญ ๐˜ฑ๐˜ฉ๐˜ฐ๐˜ฏ๐˜ฆ๐˜ด ๐˜ต๐˜ฐ ๐˜ฉ๐˜ถ๐˜จ๐˜ฆ ๐˜‹๐˜ฆ๐˜ด๐˜ฌ๐˜ต๐˜ฐ๐˜ฑ ๐˜”๐˜ฐ๐˜ฏ๐˜ช๐˜ต๐˜ฐ๐˜ณ๐˜ดโฃ
โฃ
๐‘๐—ช๐ƒ uses so-called breakpoints to determine how the layout of a site will appear: one design is used above a breakpoint and another design is applied below that breakpoint.โฃ
โฃ
โฃ
Just like stacking of plates on each otherโฃ
โฃ
โฃ
The breakpoints are commonly based on the width of the browser.โฃ
โฃ
โฃ
๐—ช๐ก๐š๐ญ ๐ข๐ฌ ๐๐ซ๐ž๐š๐ค๐ฉ๐จ๐ข๐ง๐ญ?โฃ
โฃ
โฃ
In responsive design, a breakpoint is the โ€œpointโ€ at which a website's content, layout and design will adapt in a certain way in order to provide the best possible user experienceโฃ
โฃ
โฃ
A similar HTML/content is served to all gadgets, utilizing CSS (Cascading Style Sheets, which decides the design of the site page) to change the presence of the page. โฃ
โฃ
โฃ
Maybe than making a different site and comparing codebase for wide-screen screens, work areas, workstations, tablets and telephones, all things considered, a solitary codebase can uphold clients with diversely estimated viewports.โฃ
โฃ
๐—ช๐ก๐š๐ญ ๐ข๐ฌ ๐š ๐•๐ข๐ž๐ฐ๐ฉ๐จ๐ซ๐ญ?โฃ
โฃ
โฃ
โฃ
Viewport is the user's visible area of a web page. The viewport varies with the device, and will be smaller on a mobile phone than on a computer screen. โฃ
โฃ
โฃ
In responsive design, page components reshuffle as the viewport develops or recoils. A three-segment work area configuration may reshuffle to two sections for a tablet and a solitary segment for a cell phone.โฃ
โฃ
โฃ
๐.๐’ It is very important that your site is responsive for a good user experience and to avoid people running away from your sites.โฃ
โฃ
Till write to you againโฃ
โฃ
โฃ
Stay Focusedโฃ ๐Ÿ“ธ
โฃ

See You at the Topโฃ
โฃ
Diftrak

We got you covered in any kind of web design

15/07/2021

๐€๐๐€๐“๐Ž๐Œ๐˜ ๐Ž๐… ๐€ ๐—ช๐„๐๐’๐ˆ๐“๐„โฃ
โฃ
๐๐€๐‘๐“ ๐Ÿโฃ
โฃ
It's natural to start with ๐ฐ๐ฐ๐ฐ. once you consider an internet site and to finish with .๐œ๐จ๐ฆ/.๐จ๐ซ๐ /.๐ง๐ž๐ญ. โฃ
โฃ
โฃ
Web addresses are everywhere. โฃ
โฃ
โฃ
But what does it all mean and why is it important? โฃ
โฃ
โฃ
If you Stay With Me--- โฃ
โฃ
You're close to find out!โฃ
โฃ
๐—ช๐ž๐› ๐€๐๐๐ซ๐ž๐ฌ๐ฌ is the layman's term for the technical term ๐”๐‘๐‹, which stands for ๐”๐ง๐ข๐ฏ๐ž๐ซ๐ฌ๐š๐ฅ ๐‘๐ž๐ฌ๐จ๐ฎ๐ซ๐œ๐ž ๐‹๐จ๐œ๐š๐ญ๐จ๐ซ.โฃ
โฃ
Let's use the URL of this online document as an example:โฃ
โฃ
http:// www. infopathways .com /documents/WhitePapers/ web-address-makeup.pdfโฃ
โฃ
http:// stands for ๐‡๐ฒ๐ฉ๐ž๐ซ ๐“๐ž๐ฑ๐ญ ๐“๐ซ๐š๐ง๐ฌ๐Ÿ๐ž๐ซ ๐๐ซ๐จ๐ญ๐จ๐œ๐จ๐ฅ. โฃ
โฃ
โฃ
http:// tells the pc to transfer a webpage (hypertext) from the web to your computer.โฃ
โฃ
Now a days, you do not need to type "http://" before the remainder of your web address because computers assume it. โฃ
โฃ
However, it's often necessary to make a properly working hyperlink (a clickable link on a webpage or during a digital document). โฃ
โฃ
โฃ
You'll also see https://, which represents a secure, encrypted webpage, often for sites that contain or collect confidential or sensitive data like credit cards, passwords.โฃ
โฃ
โฃ
Stay Focused ๐Ÿ“ธโฃ
โฃ
โฃ
See You at the topโฃ
โฃ

28/05/2021

๐€๐‘๐„ ๐˜๐Ž๐” ๐•๐ˆ๐’๐ˆ๐๐‹๐„ ๐ˆ๐ ๐“๐‡๐„ ๐Ž๐๐‹๐ˆ๐๐„ ๐’๐๐€๐‚๐„?โฃโฃ
โฃโฃ
๐€๐‘๐„ ๐˜๐Ž๐” '๐†๐Ž๐Ž๐†๐‹๐„๐€๐๐‹๐„'?โฃโฃ
โฃโฃ
Making yourself visible in the online space is one of the thing that is not only recommended but necessary for you as an entrepreneur โฃโฃ
โฃโฃ
In this short clip I will show how to been seen on the google when your name is been searchedโฃโฃ
โฃโฃ
Enjoy!!โฃโฃ
โฃโฃ
โฃโฃ
See You At The Top

27/11/2020

STEP BY STEP INSTRUCTIONS TO DO HANDFREE VOICE RECORDING ON WHATSAPP

Voice recording has been one of the feature of whats app we all use and enjoy everyday.

The problem we face in voice recording is holding the microphone icon at the bottom and start talking.

You can record your voice for as long as you're able to hold the icon, this can be overwhelming most times๐Ÿ˜Ž.

Cause it prevents you from from doing another thing till you're done with recording.

Imagine you're required to record your voice for like 30 Mins, you'll have to hold your microphone icon for 30 Mins doing this.

The good news here is ๐Ÿ’ƒ๐Ÿ’ƒ๐Ÿ’ƒ, there is another way of doing such without the stress of holding the microphone icon and you're free to do other things when you're recording.

--------------------------------------------------------------------------

THIS OPTION IS HAND FREE MODE

This is achieved by, Longpressing the microphone icon and slide it up. This method will lock the recording until you click on send or delete icon at the bottom right.

With the method above you can do other things while recording.

Excited right?๐Ÿ˜„ Now go and enjoy your whats app recording.

Did encounter any problem let me know in the comment section

27/11/2020

SECURE YOUR FACEBOOK ACCOUNT NOW!

Hacking of facebook account have been one the re-occuring activities in recent times.

It might interest you to know that only your password cannot save you from been hacked.

So how do I prevent my account from been hacked?

Stay with me, I will show you in a moment............

2FA

Two-factor authentication (2FA) is a security feature that helps protect your Facebook account in addition to your password.

If you set up two-factor authentication, you'll be asked to enter a special login code or confirm your login attempt each time someone tries accessing Facebook from a browser or mobile device we don't recognize.

With 2FA you get alert an unauthorized user tries to login from a browser or mobile device not recorganozed by facebook.

How do I use this feature for my advantage?

Simply by turning on 2FA in your settings

-------------------------------------------------------------------------

Steps to turn on 2FA:

1. Go to Settings and Login Settings

2. Scroll down to Use two-factor authentication and click Edit.

3. Choose the security method you want to add and follow the on-screen instructions.

When you set up two-factor authentication on Facebook, youโ€™ll be asked to choose one of two security methods:

a. Login codes from a third party authentication app.
b. Text message (SMS) codes from your mobile phone.

You'll need to have at least one of these set up in order to use two-factor authentication.

Once you have added either text message (SMS) codes or a third party authentication app on your account.
I normally advice people to go with the second option.

Was this helpful? Let me know in the comment section

Do you face any difficulty setting up yours? Let me know also in the comment section

To our continued safety...

17/11/2020

SSl AND ITS IMPORTANCE TO YOUR SITE

In a world where most of us do transactions online, its important we know how secure our data is in the internet world.

Whether as a web visitor, web designer e.t.c. There's need for us to be aware of the site we visit on daily bases and how secured it is.

What is SSL?
SSL - Secure Sockets Layer, is the standard of security technology, encrypted communication between Web server and browser. This standard operates and ensures that the data transmitted between the server and the user's browser is private and complete.

SSL is also currently the security standard for millions of websites around the world, It is used to encrypt data sent over the Internet between a client (your computer) and a server (a website's computer).

This automatically prevents many types of attacks: if a hacker intercepts encrypted data, the hacker can't read it or use it without the private decryption key.

After finishing SSL installation on your web server, a website URL begins with โ€œHTTPS://โ€ instead of HTTP// that means a secure connection established between a server and browser via an encrypted link.

A web browser informs visitors that the website is SSL secured and no worry about their online transactions.

Why use SSL?
You register a domain to use website services, email, there are always security holes hacker attacks SSL to protect your website and customers.

โœ” Data security: data is encrypted and can only be deciphered by authentic recipients.

โœ” Data integrity: data is not altered by hackers.

Advantage of SSL Certificate

โœ” Letโ€™s users to complete a successful transaction without any risk of data loss

โœ” Increases userโ€™s trust and confidence

โœ” Encrypt website and secure communication between browser and server

โœ” Protects userโ€™s sensitive information

โœ” Eliminates browser warning and alerts

โœ” Boost up business conversation and helps to generate maximum
revenue

โœ” Increases Organizationโ€™s reputation over the internet

โœ” Google also gives ranking benefits for SSL enable website

โœ” Eliminates risk of phishing and other cyber attacks

P.S: SSL does not make your site to be completely free from hackers. it is mainly for data security when performing online transactions. There is more website owners need to understand if they want a truly secure website.

Photos from The Developer Me's post 17/06/2020

nice tips for web designers

Mobile uploads 17/06/2020

This is really amazing for web designers

Want your business to be the top-listed Computer & Electronics Service in Enugu?
Click here to claim your Sponsored Listing.

Videos (show all)

Do you want to learn how to split your screen? Then this video will help you. PS: it will work perfectly for Samsung use...

Telephone

Website

Address


Enugu
400

Other Information Technology Companies in Enugu (show all)
Digital Dreams Limited Digital Dreams Limited
No 1 Chime Avenue New Haven Enugu
Enugu, 400002

Digital Dreams Limited is the foremost information technology company in the southern Nigeria.

V-Tech Services Limited V-Tech Services Limited
45 Chime Avenue (Opp First Bank) New Haven, Or 143 Nike Road Abakpa Nike Opposite Chicken Republic Restaurant
Enugu, 400213

V-tech Services Limited is an ICT company poised to render the best ICT services. We specialize in w

TLP-TechFund TLP-TechFund
Enugu

TLP Techfund we offer life changing services like investment trainings and portfolio management(Forex, Stocks, Real-Estate) and Idea generation. We deal on Forex trading, stock tra...

Jeco Tech Jeco Tech
113 Corporative Layout, Upper Housing Ext. , Enugu East
Enugu, 400213

We're a company that offers digital solutions ranging from Content Management and other Tech services

Bizyjoe skills Bizyjoe skills
3B Asata Mine Road
Enugu, 400211

This page is for tech and tech related information.

Tech-Serv Africa Tech-Serv Africa
No 36 Zik's Avenue, Uwani
Enugu

Soft purse Mobile App

Blockchain Connect Enugu - fttdao Blockchain Connect Enugu - fttdao
Vee-Ai-Pee Event Centre Enugu
Enugu

This is a Publicity page for our upcoming Blockchain Event in Enugu.

Imadehub Imadehub
No2A O'Connor Street Martina Chukwuma House Opposite Eastern Shop
Enugu, 400001

We @Imadehub ict empowers startups, businesses, and corporation to leverage the power of technology

Okomba Okomba
Enugu
Enugu

Custom Writing & Designing | Bills Payments | Web Development | Social Media | Health | NEWS

Greenrays Solar Technologies Greenrays Solar Technologies
101 Forestry Road Before Dawson Junction, Benin City
Enugu, 300102

GREENRAYS ENERGY LIMITED is a Nigerian engineering company in the business of sales, design, installa

OKC TECH OKC TECH
Obollo
Enugu

OKC TECH. PROVIDES THE SOLUTION TO BASIC COMPUTER APPLICATIONS AND LATEST UPDATE ON NEW TECHNOLOGY