SmileTech.ICT Center

Contact information, map and directions, contact form, opening hours, services, ratings, photos, videos and announcements from SmileTech.ICT Center, Science, Technology & Engineering, Sokoto.

17/06/2022
Windows 10 vs. Windows 11 Performance Test 26/10/2021

https://www.techspot.com/article/2349-windows-11-performance/

Windows 10 vs. Windows 11 Performance Test Today we're talking our first real look at Windows 11 performance to see how much difference there is when compared to Windows 10, but also to establish...

Windows 11 Available for Free Upgrade on Window 10 PCs, Others 22/10/2021

https://www.thisdaylive.com/index.php/2021/10/21/windows-11-available-for-free-upgrade-on-window-10-pcs-others/

Windows 11 Available for Free Upgrade on Window 10 PCs, Others Nosa Alekhuogie Microsoft has announced the availability of Windows 11 around the world, through a free upgrade on eligible Windows 10 PCs and on new PCs pre-installed with Windows 11. A few of the…

Everything you need to know about Windows 10 version 21H2 19/10/2021

https://www.windowscentral.com/windows-10-version-21h2

Everything you need to know about Windows 10 version 21H2 Even though Windows 11 is now available, Microsoft still plans to support Windows 10 for several more years. In fact, Microsoft is gearing up to release a new feature update for Windows 10 before the end of this year that will include minor enterprise grade features and under the hood enhancements a...

Photos from SmileTech.ICT Center's post 13/02/2021
Photos from SmileTech.ICT Center's post 09/12/2020

Obiora Paschal one of our favorite corp member has finished his course on web designing & development. Congratulations. Paschal obiora Art

Microsoft starts rolling out Windows 10 update with Edge browser enhancements 21/10/2020

https://www.cnbc.com/2020/10/20/microsoft-starts-rolling-out-windows-10-20h2-october-2020-update.html

Microsoft starts rolling out Windows 10 update with Edge browser enhancements This is the second fall release of Windows 10 that focuses on performance and quality, rather than introducing major new features for users to figure out.

20/10/2020

How to protection yourself from social Engineering Harking

Photos from SmileTech.ICT Center's post 20/10/2020

Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software–that will give them access to your passwords and bank information as well as giving them control over your computer.

Criminals use social engineering tactics because it is usually easier to exploit your natural inclination to trust than it is to discover ways to hack your software. For example, it is much easier to fool someone into giving you their password than it is for you to try hacking their password (unless the password is really weak).

Phishing has evolved. Learn 11 ways hackers are angling for your data and how to protect yourself in this guide.

Security is all about knowing who and what to trust. It is important to know when and when not to take a person at their word and when the person you are communicating with is who they say they are. The same is true of online interactions and website usage: when do you trust that the website you are using is legitimate or is safe to provide your information?

Ask any security professional and they will tell you that the weakest link in the security chain is the human who accepts a person or scenario at face value. It doesn’t matter how many locks and deadbolts are on your doors and windows, or if have guard dogs, alarm systems, floodlights, fences with barbed wire, and armed security personnel; if you trust the person at the gate who says he is the pizza delivery guy and you let him in without first checking to see if he is legitimate you are completely exposed to whatever risk he represents.

What Does a Social Engineering Attack Look Like?
Email from a friend
If a criminal manages to hack or socially engineer one person’s email password they have access to that person’s contact list–and because most people use one password everywhere, they probably have access to that person’s social networking contacts as well.

Once the criminal has that email account under their control, they send emails to all the person’s contacts or leave messages on all their friend’s social pages, and possibly on the pages of the person’s friend’s friends.

Taking advantage of your trust and curiosity, these messages will:
Contain a link that you just have to check out–and because the link comes from a friend and you’re curious, you’ll trust the link and click–and be infected with malware so the criminal can take over your machine and collect your contacts info and deceive them just like you were deceived

Contain a download of pictures, music, movie, document, etc., that has malicious software embedded. If you download–which you are likely to do since you think it is from your friend–you become infected. Now, the criminal has access to your machine, email account, social network accounts and contacts, and the attack spreads to everyone you know. And on, and on.

Email from another trusted source
Phishing attacks are a subset of social engineering strategy that imitate a trusted source and concoct a seemingly logical scenario for handing over login credentials or other sensitive personal data. According to Webroot data, financial institutions represent the vast majority of impersonated companies and, according to Verizon's annual Data Breach Investigations Report, social engineering attacks including phishing and pretexting (see below) are responsible for 93% of successful data breaches.

Using a compelling story or pretext, these messages may:
Urgently ask for your help. Your ’friend’ is stuck in country X, has been robbed, beaten, and is in the hospital. They need you to send money so they can get home and they tell you how to send the money to the criminal.

Use phishing attempts with a legitimate-seeming background. Typically, a phisher sends an

MSI Commits to Zen 3 Support for All 400 Series Motherboards 20/10/2020

https://www.pcmag.com/news/msi-commits-to-zen-3-support-for-all-400-series-motherboards

MSI Commits to Zen 3 Support for All 400 Series Motherboards Owners of MSI's 400 series boards will get to upgrade to Zen 3 no matter what model they own.

Should You Upgrade to the iPhone 12? 20/10/2020

https://www.pcmag.com/news/should-you-upgrade-to-the-iphone-12

Should You Upgrade to the iPhone 12? If you already own an older model, you're probably wondering whether it's time to upgrade to the iPhone 12. We're here to help you decide not only if it's time for a new iPhone, but which model is your best option.

Asus Website Lists Laptop With Intel's First Dedicated Graphics Card 20/10/2020

https://www.pcmag.com/news/asus-website-lists-laptop-with-intels-first-dedicated-graphics-card

Asus Website Lists Laptop With Intel's First Dedicated Graphics Card According to the computer code on Asus's website, the GPU is named 'Intel Iris Xe Max graphics.' However, it remains unclear when the laptop will actually launch.

The Best Laptops for 2020 20/10/2020

https://www.pcmag.com/picks/the-best-laptops?test_uuid=01jrZgWNXhmA3ocG7ZHXevj&test_variant=b

The Best Laptops for 2020 Shopping for a notebook is more than just poring over spec lists. Whether you want a simple budget PC, a productivity workhorse, or a screaming machine for gaming, our guide has the advice you need to find the best laptop to fit your needs.

18/10/2020

1. The Blue Screen of Death
The “Blue Screen of Death” is a Microsoft Windows-related STOP error. Usually, it indicates a serious problem, most likely hardware- or driver-related.

It’s often accompanied by an error code that you can reference to find out what happened. In fact, many places offer a list of these error codes for you to look up.

2. Missing DLL Files
Another standard system issue — again, with Windows-based operating systems — is a DLL error. This means a DLL file is either missing or corrupt. Files ending with “.DLL” are dynamic link library files.

They hold many codes, procedures, and instructions for programs. They exist to tell the OS how to deal with certain apps. Several programs can also open them at once, improving memory conversion.

These are necessary system files, and when they’re missing or corrupt, bad things happen. This is unfortunate, and common because there are so many of them.

3. Applications Running Slowly
When applications slow down or hang, it could be due to any number of causes. But the most common relates to processing power and memory.

Computer memory — or random access memory — is used to store data temporarily while programs are running. The recommended amount for Windows users is 2GB or more, but a higher number is ideal. In fact, the more memory you have, the more programs you can run concurrently.

RAM doesn’t necessarily speed up a computer, but it can make applications and programs run better. So, yes, it’s commonly associated with performance and speed.

4. Malware
Malware is a type of software that can damage or disable computers and related systems. It has to be installed on a computer before it can cause problems. However, this can happen much more quickly than you think.

For example, just downloading a file from a website could result in malware on your computer. Once opened, it can damage files, and it can even slow down your computer by using up valuable resources.

5. Internet or Network Connectivity Issues
Internet or network connectivity issues can stem from many problems. First, there could be something wrong with your ISP, or internet service provider. Then, there are DNS servers you must connect to, which can also encounter issues. Finally, there’s your local hardware, which includes your router, computer and network software.

Luckily, Windows has a troubleshooting tool that can help identify network connection issues.

6. Hard Drive Failure
A hard drive failure can lead to serious problems. The good news is that hard drives are easily replaceable. The bad news is that the data stored on said hard drive can become corrupt or lost forever.

This isn’t a big deal if you’re talking about program files that can be easily recovered. But when it comes to personal documents, photos, and important data it’s a huge problem. This is all data you can’t easily duplicate.

It’s recommended that you keep backups of your most important files. A hard drive can fail at any time, and it can happen with both old and new drives. Worse yet, failure rates differ depending on the type, capacity, and brand of a drive.

Translation: You never know when a hard drive failure will happen, so preparation is essential.

What Will Scientists Discover Next?
Science news delivered weekly!

[email protected]
7. Frozen Screen
During a severe failure — usually related to hardware — a computer can freeze or lock up. But this can also happen due to software problems, too, so never rule it out.

Most of the time, you can remedy this by opening the Windows task manager and force-closing the problematic application. Other times, the computer will lock up completely, and the only way to fix it is to reboot the machine.

8. Strange Noises
Computers are never silent. At any given time, multiple functions take place that can cause noise. Mechanical hard drives and optical disk drives, for instance, make a distinct noise when powering up and when they’re in use. Cooling fans can also make noise as th

18/10/2020

No one likes it when your computer suddenly stops working, so we’ve listed the top most common computer problems and explain how to fix each one.

ASUS announces world’s thinnest ZenBook FlipS laptop | ITPulse.com.ng 18/10/2020

https://itpulse.com.ng/2020/09/03/asus-announces-worlds-thinnest-zenbook-flips-laptop/

ASUS announces world’s thinnest ZenBook FlipS laptop | ITPulse.com.ng ASUS announces world’s thinnest ZenBook FlipS laptop By ITPulse - September 3, 2020 210 0 Share Facebook Twitter Pinterest WhatsApp Linkedin Email Print Telegram ASUS, manufacturer of motherboards, PCs, monitors, graphics cards and routers today announced ZenBook Flip S (UX371), which is touted an...

The best gaming PC in 2020 18/10/2020

https://www.pcgamer.com/best-gaming-pc/

The best gaming PC in 2020 Upgrade your home setup with one of the best gaming PCs this year.

Want your business to be the top-listed Engineering Company in Sokoto?
Click here to claim your Sponsored Listing.

Telephone

Address

Sokoto

Other Science, Technology & Engineering in Sokoto (show all)
Sajjad Hausa TV Sajjad Hausa TV
Sokoto

YouTube Channel

Ecotech fuelless/NoiselessGenerator Ecotech fuelless/NoiselessGenerator
Sokoto
Sokoto

All Kinds Of Generator Ranging From The 8Kva-1000&Above KVA,For More Info WhatsApp 09133291759. ®️💯

Talented Cardboard cars Talented Cardboard cars
Tamaje
Sokoto, BAFARAWAESTATE

If you dont understand about something in this page you can comment

Abba umar  Tambuwal Abba umar Tambuwal
Yawu'ri Road Block 20ë Skt
Sokoto

GuroriTech Nigeria limited GuroriTech Nigeria limited
2, Mike Innegbesen Close, Victoria Island, Lagos
Sokoto

The name of the company is GURORI TECH NIGERIA LIMITED The registered office of company will be situated in Nigeria The business for which the company is established

SHEHU technology gallery SHEHU technology gallery
Gidan Igwai Sokoto
Sokoto

BrontoByte Analytica BrontoByte Analytica
Marmaron Nufawa Area
Sokoto

Our staff provide the knowledge and diligence to support your project through every phase of the pro

Yusuf Ecotech Fuelless generator Yusuf Ecotech Fuelless generator
Sokoto

We give you the best service at all cost your happiness is my priority

AMYAD Nigeria Limited AMYAD Nigeria Limited
No14 3rd Avenue Federal Housing Runjin Sambo Sokoto
Sokoto