Month: April 2021

  • Tips To Keep Your Eyes Healthy

    Tips To Keep Your Eyes Healthy

    Tips To Keep Your Eyes Healthy – Too busy with work, it often makes us forget about our health. No exception to our eye health. Working, which is often related to a computer screen, can make the eyes tired easily, so that the vision decreases slowly. It’s no wonder that in the end many people use glasses, because their eyes are no longer as sharp as they used to be. This means that the eye begins to show damage.

    For those of you who often work facing computer screens and still love your eyes, let’s be wise from now on. #Good is easy if we want to change and act. For that, you can do these four things to keep your eyes healthy.

    1. Always prepare water beside your desk

    Constantly working at the computer will make your eyes sting and water. Preparing water beside the work table can be a good alternative so that your health is maintained.

    Not only does it keep your kidneys healthy, water can also keep your eyes healthy. Consuming plain water can help in brightening the eyes, reducing panda eyes and sharpening the vision.

    2. Do light stretches

    Make light movements when you start to get tired while staring at the computer screen. You can get up for a moment from your seat and look away by looking at the environment around you. It would be better if you can stare at green plants, for example plants around your office so that your eyes are fresher.

    You can also lean your back for a moment or do some light stretches while closing your eyes for a while so that your eyes can rest for a moment. The point is you shouldn’t just be fixated on the computer screen, because that will speed up the damage to your eyes.

    Also Read: Some Viruses That Are On The Computer

    3. If the eyes are too tired, rest.

    Let your tired eyes rest for a moment. No need to sleep, just close your eyes so that the nerves around your eyes relax. If you still feel tired, try washing your face.

    Another way you can try is to prepare water on top of a container. Then fill the water into the container. Immerse your face in the water so that your eyes can touch the water. Then blink. Do it two to three times or according to your needs.

    4. Balance by eating vegetables and fruits

    After “draining” your eyes to work hard, don’t forget to balance it with eating fruits and vegetables. Not only does your body need food, but your eyes also need food to nourish it.

    You can eat green vegetables and fruits that contain vitamin A. Spinach, carrots and tomatoes are several types of vegetables and fruits that you can consume to keep your eyes healthy.

    How? #Good, that’s easy, right? You just need the desire to start. So, it’s time for you to act so that your life remains healthy.


  • Some Viruses That Are On The Computer

    Some Viruses That Are On The Computer

    Some Viruses That Are On The Computer – Most of us have experienced computer problems caused by viruses. Important files are lost, computer performance slows down, even resulting in hacking of our accounts in cyberspace.

    Fortunately, even though viruses are getting more sophisticated, the technology that is made to prevent them doesn’t want to be outdone. That is why massive virus attacks have rarely occurred recently, unlike before.

    Around the 2000s, there were many virus attacks in the world that caused a lot of losses. They are even dubbed the most dangerous viruses in history. Want to know what the story is like? Check out the following!

    1. SQL Slammer / Sapphire

    In January 2003, there was a new virus that spread throughout the United States internet network. Nobody is ready to deal with it so this virus manages to do all kinds of damage.

    This resulted in the shutdown of ATM servers, a number of airlines having to postpone departure schedules due to faulty online ticketing, jammed 911 phones, and blocking 27 million people from the internet.

    It turned out that all the “disasters” were caused by a worm type virus called SQL Slammer or Sapphire. He can control 75 thousand internet networks in just ten minutes. Uniquely, in 2016 this virus had appeared again in various parts of the world. However, the creator of this worm is unknown until now.

    2. Melissa

    Next is Melissa. A unique name for a computer virus. Is not it? Quoting a report from The Infographics Show, it turns out that “Melissa” was taken from the name of an exotic dancer from Florida, United States who was popular in 1999.

    This virus starts from a simple thing, namely a word file that is distributed via email. When someone opens it, the file will be sent again to 50 of that person’s email contacts. It might not sound bad, but it can make a big impact when it comes to large corporate emails.

    Microsoft to shut down email services so as not to suffer greater losses. It is estimated that Melissa has caused losses of up to US $ 1.2 billion. Fortunately, the creator of this virus was immediately caught and jailed for ten years.

    3. Anna Kournikova

    You may be familiar with the name “Anna Kournikova”. This worm-type virus has indeed taken the name of a world famous female tennis athlete. Again, this virus spreads from email to email.

    Not only that, virus creators use the athlete’s photo as a clickbait so that more people are interested in opening the email he spreads. But when you click on it, the virus will spread to all contacts in the email account.

    This virus, which was popular in 2001, managed to dominate the whole world and infected millions of computers in the world. According to data from CBR Online, the damage caused by “Anna Kournikova” reached US $ 166 thousand. The virus creator turned himself in upon learning of the harm he was causing and was sentenced to 150 hours of public service.

    Also Read: Simple Way A Computer Or Laptop is Easy To Hack 


    This one virus is spread by email with the subject “I love you”. Sounds romantic indeed, who isn’t curious when you get a message like that, right? But that’s how virus creators lure their prey.

    Because it made people curious, ILOVEYOU spread very quickly to 45 million users in a day in 2000. Not only that, this one virus also ransacked your computer. It will delete photos, audios, and various other important files.

    As a result, the Pentagon companies, the CIA, and the British Parliament disabled their e-mails to avoid data theft and infection with the virus. The losses incurred by ILOVEYOU were recorded at US $ 15 billion.

    5. Code Red

    From the name it sounds dangerous, huh. But actually the name was given because the creators were drinking Code Red Mountain Dew when they made the virus.

    Code Red appeared in 2001 and targets computers with the Microsoft operating system. People affected by this virus will get the message “Welcome to hacked by Chinese”. Yet everyone doubts whether the attacks were actually carried out by the Chinese or this was simply an act of inciting racism.

    Once the computer is infected, the virus will reproduce itself. In nine hours, he had attacked 250 thousand systems. The losses caused reached US $ 2 billion and almost damaged internet servers.


  • Simple Way A Computer Or Laptop is Easy To Hack

    Simple Way A Computer Or Laptop is Easy To Hack

    Simple Way A Computer Or Laptop is Easy To Hack – The internet and gadgets have become one of the main needs of today’s society. Whether we know it or not, 24 hours a week, we are still online. Moreover, we are now living in the age of the Internet of Things (IoT).

    It sounds lame, considering that we are no longer online while sleeping. Is not it? It turns out, without us knowing it, even without us using gadgets, our gadgets are still online. It is a fact like that that opens our eyes that even though we are not operating a gadget, the dangers of cyber crime are still lurking.

    Some people still don’t believe it. They think that only the upper class, such as businessmen to the government, are vulnerable to being targeted by hackers. In fact, your personal data has its own price that hackers can sell on the deep web. Worse, you don’t even notice!

    There’s no need to be afraid! You can prevent this. First of all, let’s start with 10 common mistakes that make computers or laptops, the media you use to work, play, or socialize in cyberspace, easy to hack without realizing it.

    1. Do not change the Wi-Fi password

    Apart from changing your computer / laptop password, you also have to change your Wi-Fi password regularly (unless the Wi-Fi belongs to the office, don’t try!). Your computer or laptop is connected to the Wi-Fi. If a hacker manages to hack into a Wi-Fi network, then you are also in danger of being hacked.

    Typically, a strong Wi-Fi password consists of a variety of 15 characters. Use it! How to change a Wi-Fi password is not difficult, here’s how:

    Open the router configuration page (type the default IP address which is usually or – check again on the side or bottom of the router).
    Log in to the router with your username and password – this information is also often found on the side or bottom of the router.
    Select “Wireless Security” or “Wireless” after logging in.
    Choose “Wi-Fi Password”.
    Enter a new Wi-Fi password.
    Click “Save”.

    2. Do not change the SSID

    When changing your Wi-Fi password, you can also change your Wi-Fi name or Service Set Identifier (SSID). The point is, hackers have a hard time finding out which connection you have.

    If the router contains more than one network, each network will have its own SSID. Don’t leave the SSID in the default mode as your network’s WPA2 encryption – which also contains the SSID – will be easier for big hackers to hack. As a result, you got hacked too!

    As a suggestion from us, if you specify an SSID, don’t give out your personal information and don’t use the same name as the Wi-Fi router as it makes it easier for hackers. How to change the SSID is similar to changing the Wi-Fi password, namely:

    Open the router configuration page (type in the default IP address which is usually or – check again on the side or bottom of the router).
    Log in to the router with your username and password – this information is often found on the side or bottom of the router if you haven’t changed it.
    Select “Wireless Security” or “Wireless” after logging in.
    Enter the new SSID.
    Click “Save”.

    3. Not handling threats to WPs

    One part of your Wi-Fi, the Wi-Fi Protection Setup (WPS), is very vulnerable to hackers. Just try to enter various PINs, hackers can hockey hack your network.

    Because of this, WPS must be turned off on all devices. Usually, WPS is on by default. Even if WPS is off, if your WPA2-PSK (Pre-Shared Key) encryption and password are strong, then your Wi-Fi network will remain strong.

    With WPA2-PSK, you can set passwords for routers and connected devices to protect your network from unauthorized access. It’s just that, if each device wants to connect, then you have to keep entering the password. WPS allows you to simply log into the network. Select which one?

    If you choose WPA2-PSK, here’s how:

    Enter the router configuration page.
    Enter the IP address of the router into the address bar of the computer / laptop browser.
    Enter the admin username and password.
    Open the “Wireless” section in the settings menu.
    Select “WPA2-PSK encryption”.
    Click “Apply”.

    As a side note, some routers don’t let you switch WPS to WPA2-PSK. If that’s your case, replace the router immediately! If necessary, look for those who don’t have WPS so you can go straight.

    Also Read: Tips for Using Whatsapp Web and Computer Software

    4. Has no cloud storage (cloud backup)

    Cloud backup is the best way to store data by encrypting data and the whole process is automated. In other words, cloud backup is a safe way to reduce the risk of losing or hacking data. The second way? Use an external hard disk drive.

    Cloud security differs according to the type of compute. SaaS (software-as-a-service), IaaS (infrastructure-as-a-service), and PaaS (platform-as-a-service) are the most common types of public cloud providers.

    Private cloud providers differ in that they provide services to only one customer and are operated by a third party. Of course, for personal use, a private cloud provider is the best choice. For each backup session, all software and data will be stored on a remote site that can be accessed at any time.

    In addition, other actions you can take to improve cloud security include installing a built-in firewall, an event log / viewer to predict hack scenarios, and an intrusion detection system (IDS) that will notify you when cloud defenses are breached.

    Google brings a service called Backup & Sync for your computer / laptop reliable cloud storage. To install, follow these easy steps:

    Connect your PC / laptop to a Wi-Fi network.
    Download and install “Backup and Sync” on your computer / laptop.
    Select the folders and files you want to back up.

    5. Enter a foreign

  • Some Unique Facts About the Computer Mouse

    Some Unique Facts About the Computer Mouse

    Some Unique Facts About the Computer Mouse – Mouse or also known as ‘mouse’ is a cursor pointing device on a computer screen. This device makes it easy for us to choose a command in computer software.

    The movement is on a horizontal surface, sometimes we do it by clicking the button on the surface. At this time, the computer would not be complete without a mouse.

    The device is also embedded in a laptop, but in the form of a touch screen or touchscreen which is commonly referred to as a touchpad or mousepad. Sometimes, we still need a mouse that is in physical form when using a laptop because it is unusual to use the mousepad.

    The importance of the mouse for computer users is also inseparable from unique facts and history

    1. Mouse was created by Douglas Engelbart, a researcher from Stanford University

    The use of a mouse on a computer was first coined by Douglas Engelbart, a researcher from Stanford University, United States. He also developed the first prototype of the device in 1963. Then, he officially introduced it at a conference on computers in 1968.

    His mouse is made of wooden blocks in which there is a ball that can roll. There is a cable on the mouse to connect it to the computer. The existence of a rolling ball has been the reference for making mice for decades, as reported by Computer History.

    Unfortunately, he did not get a dime from the patent on the mouse he created. This is because the patent validity period expires before the mass production of the mouse for use on all computers around the world. To be more precise, this was before 1983.

    2. The name ‘mouse’ is used because it looks like a mouse’s body

    You must be wondering where the name of the computer mouse comes from. Well, the device is called a mouse because it looks like a mouse’s body jutting down. Plus there is a mouse connecting cable on the computer which is likened to a mouse tail.

    However, early versions of the mouse were once renamed ‘turtle’ which means ‘turtle’. This is because there is a technology company that takes advantage of the resemblance of a mouse to a turtle shell.

    3. The existence of the mouse was never approved in 1984b

    Even though it is very practical to use to operate a computer, the mouse has received disapproval, you know!

    In 1984, a columnist from the United States, John C. Dvorak, wrote in The San Francisco Examiner newspaper in which one of his quotes is as follows:

    There is no evidence that people want to use these things (computer mouse).

    Of course this statement is very untrue today. This is evidenced by modern computer equipment, including laptops, which are accompanied by a mouse when it is produced at this time. We ourselves also feel awkward when we see a computer that is not accompanied by a mouse.

    4. Mouse Rage Syndrome is a syndrome of throwing the mouse when angry

    You will be amazed when you hear that there is a psychological syndrome caused by the mouse. The syndrome is called Mouse Rage Syndrome which causes a person to throw the mouse when he is emotional.

    Reported by Network Computing, the symptoms of the syndrome start from the heart beating rapidly and sweating a large amount that triggers a person to throw the mouse. The cause is often caused by a slow internet connection, annoying online advertisements, and other causes.

    So, don’t let you experience this syndrome. When there is a problem caused by your computer and internet, stay calm and think clearly to solve the problem.

    5. There are two written plural forms for ‘mouse’ in English

    The word ‘computer mouse’ has been included in the world’s newest English dictionary, The Oxford English Dictionary. However, we often get confused about the plural (plural) form of the word. Fortunately, the dictionary includes two plural forms of ‘computer mouse’, namely ‘computer mice’ and ‘computer mouses’.

    Both are equally true, so you can use one of them. However, some sources suggest that you write the plural form of the mouse on your English scientific essay with the word ‘computer devices’.


    How, are you unique and very interesting facts about the mouse in the list above? Hopefully your knowledge about technology will increase, huh!