What is Overclocking, How It Works and What You Need to Know About It ?

Overclocking is the action of increasing a component’s clock rate, running it at a higher speed than it was designed to run. This is usually applies to the CPU or GPU, but other components can also be overclocked. CPU Overclocking will make any computer perform more set of operations per seconds, or in simple words, multitask with greater speed.

What Is Overclocking?

Your computer’s CPU comes from the factory set to run at a certain maximum speed. If you run your CPU at that speed with proper cooling, it should perform fine without giving you any problems.

Before you learn how to overclock your CPU, there’s a few basic principles to get your head around. The first one is heat. Inevitably, the more voltage you add to your components, the more heat that component is going to produce.

Second, the higher the clock speed you’re trying to achieve, the more voltage you will need to power that attempt. Makes enough sense.

And thirdly, there’s only so much voltage your PC part can take before you start to see detrimental effects. These could be a drop in frame rates for GPUs, corrupting processes on the CPU, or even a failure to boot at all.

These, essentially, are the basic limits of overclocking. All chips are born equal, but some are more equal than others. You’ll often hear overclockers talk of “The Silicon Lottery.” In short, this is to do with the manufacturing process with each and every processor.

When should you Overclock your Computer?

The advantages to overclocking are clear: You get a faster CPU that can perform more operations per second. However, overclocking has become less critical over time — where overclocking once offered a more responsive desktop and faster performance in Microsoft Office, computers have become powerful enough that most users probably won’t even notice the difference. Your computer is likely bottle-necked by other things — perhaps a mechanical hard drive, if you don’t have solid-state storage — so you may not see a noticeable performance difference most of the time.

Gamers or enthusiasts that want their hardware to run as fast as possible may still want to overclock. However, even gamers will find that modern CPUs are so fast and games are so limited by graphics cards that overclocking doesn’t work the magic it used to. Overclocking a GPU may get you a small increase in performance, though, depending on your system and the games you’re playing.

How to Overclock Your CPU

  • Ensure Your System Has Proper Cooling: Your CPU comes with a heat sink and fan from the factory, which are designed to handle the amount of heat produced at the CPU’s standard speed. Speed it up and it will produce more heat. This means that you’ll probably need additional cooling. This can be in the form of an aftermarket heat sink that can dissipate more heat and/or a more powerful CPU fan that can blow the hot air away. You’ll want to have a good amount of free space inside your computer’s case so the air can move around and eventually be blown out by the fan in your computer’s case, which may also need to be upgraded. Air flow is very important for handling heat, as just having a heat sink or CPU fan won’t help if all that hot air stays trapped inside your case.
  • Consider Water Cooling: Hardcore overclockers may want to use a water-cooling system, which is more expensive. Water-based coolant is pumped through tubes inside of the case, where it absorbs the heat. It’s then pumped out, where the radiator expels the heat into the air outside of the case. Water-cooling is much more efficient than air-cooling.
  • Overclock in the BIOS: You’ll need to go into your computer’s BIOS and increase the CPU clock rate and/or voltage. Increase it by a small amount, then boot your computer. See if the system is stable — run a demanding benchmark like Prime95 to simulate heavy use and monitor your computer’s temperature to make sure the cooling is good enough. If it’s stable, try increasing it a little bit more and then run another test to ensure the PC is stable. Increase the amount you’re overclocking by bit by bit until it becomes unstable or the heat is too much, then drop back down to a stable level. Overclock little by little to ensure it’s stable, don’t just increase your CPU’s speed by a large amount at once.

Can Overclocking be dangerous?

When you overclock your CPU, you’re doing something you weren’t supposed to do with it — this will often void your warranty. Your CPU’s heat will increase as you overclock. Without proper cooling — or if you just overclock too much — the CPU chip may become too hot and may become permanently damaged.

This complete hardware failure isn’t as common, but it is common for overclocking to result in an unstable system. The CPU may return incorrect results or become unstable, resulting in system errors and restarts.

If you’re overclocking, you should slowly increase the clock rate and test every new level to make sure it’s stable. You should also monitor the temperature of your CPU and ensure that you have proper cooling. The cooling that came with your CPU probably won’t cut if. If you’re using a laptop without much space for additional air flow, don’t try to overclock — there’s generally just not enough space in a laptop to handle the heat.

Overclocking is never a bad idea for PC enthusiasts and gamers provided the overclocker does proper research about the system, tools, and components. Remember every CPU model behaves differently even having the same model number.

Each component of the computer reacts uniquely to this process depending on the manufacturer. No two same models of CPU can tolerate the same amount of overclocking. One may have more endurance than the other if they are identical in their model numbers.

How to tell if your phone or tablet has a virus

Smartphones have become ubiquitous; almost everyone carries one these days. Unfortunately, with the increase in the usage of smartphones, there has been a consistent increase in the number of malware attacks on smartphones.

Malware attacks can be pretty vicious leaving you with a series of problems ranging from inflated bills to stolen personal data or worse. The best way to avoid an infection on your smartphone is by being vigilant about these Android virus symptoms.

Here are a few well-known Android Virus Symptoms

There are a few sure-fire signs that your Android smartphone will show if it has been infected by a virus or some sort of malware. If your phone shows the following symptoms, it is time to look in deeper into what may be causing this.

1. A sudden appearance of pop-ups: If you see invasive advertisements and pop-ups on your phone, it is a certain sign that your phone has been infected with malware or adware. Pop-up ads that appear out of nowhere that link to dubious websites means you have unknowingly installed an app with adware on your device. Do not click on the ads.

Try to remember the last few apps you have downloaded and see which one of them brought the adware to your phone. Uninstall the app immediately.

2. Increase in data usage: When your phone is infected by a malicious bug, it will use the phone’s data source to show advertisements or send information from your phone. If you see a sudden unexplained spike in data usage, it could be that your phone has been infected with malware.

Go to settings, and tap on Data to see which app is using the most data on your phone. If you see anything suspicious, uninstall that app immediately.

3. Unexplained charges on your bill: Malicious viruses on your phone can use your phone to make calls and send texts to premium numbers. If you notice an unexplained charge on your phone bill, especially in the SMS section, take a look at your messages to try to pinpoint the cause. Contact your service provider for an explanation. If you can find out where the messages are coming from, delete the app immediately.

4. Fast draining battery: Viruses and malware on your phone use up your phone’s resources to fuel the infection. One of the signs of an infected phone is the sudden draining of the device’s battery. If your phone is running out of juice very often, it is time to evaluate the reasons for it.

Go to Settings and open the Battery section on your phone for an overview of which app is using up most power. Identify the offending app and analyze it to see if it is a genuine app or causing issues on your device.

5. Unexplained phone calls and messages: One symptom of virus infection on your Android phone is strange and unexplained phone calls and texts from your phone. Viruses replicate by spreading from one device to another via texts, emails etc. If your phone is infected, it may send strange messages, usually with a link, to all your contacts.

If your friends receive spam messages from you, it is likely that your phone has been infected with a virus. Ask your friends not to open any messages or click on the links. Install a good anti-virus program on your

Install a good anti-virus program on your device to scan and clean the virus. Antivirus software like Kaspersky, AVG, and Avast are great to clean your phone and remove all viruses.

6. Overheating of the phone and poor performance: When your phone is infected by malware such as viruses, worms or adware, they use up your phone’s resources to spread their malicious intent. It is no surprise then that your phone will start heating up under the strain.

If your phone has suddenly become extremely slow and laggy and heats up very fast despite not using it much, chances are it is infected by malware. The best way to clean your phone is to install a good antivirus program to scan and clean.

7. A sudden appearance of unfamiliar apps: This is a very common, but often overlooked Android virus symptom. Malware can make their way into your phone with apps that you download. They piggyback on apps and you won’t even know you have downloaded malware till you start to see the ominous signs.

It is important to download apps only from Play Store for your safety. Make sure the apps are rated well, and read reviews before downloading. If you see unfamiliar apps that you haven’t downloaded, uninstall them immediately.

8. The Internet connects on its own: Viruses and other malware use your phone’s data to spread its message. If you see that your phone is mysteriously switching your Wi-Fi and data connections on without your intervention, it could be due to malware. These programs can override your preferences and connect to the internet on their own. If you see unusual internet activity, scan your phone for viruses and clean using an anti-virus program

How can I keep my phone safe from viruses and malware?

There are many preventive steps to keep your phone free and safe from any of these Android virus symptoms. While most adware and viruses are easy to remove, there are some complex malicious bugs like spyware that are not as simple to eliminate. So it is always important to be safe and take preventive measures, rather than remedial measures.

1. Download apps only from Google Play Store. Every time you download an app, check the ratings and reviews first. If it has a low rating and a low number of downloads, it is best to avoid that app.

2. Do not download apps from third-party sources. The best way to make sure this is to turn off this function on your Android phone. Go to Settings on your phone and open up the Security section. Here, make sure Unknown Sources is disabled to avoid installation of apps from sources other than the Play Store.

3. Do not click on pop-ads while browsing the internet. While most of these pop-up ads lead to advertisements and websites, some pop-ups force you to install malware on your device.

4. Do not click on strange, unverified links in unknown emails, texts, and WhatsApp messages. Strange links from friends and contacts should be avoided too unless you have verified it to be safe.

5. Keep your operating system updated and take frequent backups.

6. Install a good antivirus security app, especially one that scans every app for malicious content before installing.

These steps will help you fight any Android virus symptoms you may encounter.

What should I do if my phone has been infected by a virus?

1. Put your phone in airplane mode so the malicious apps cannot send or receive data. Check your recently installed apps, battery activity and data activity to zero in on the malicious app. Check the app reviews on Play Store to confirm that it is the cause of infection.  Uninstall the app immediately.

2. Do a factory reset; reloading the software sometimes can get rid of the malicious code.

3. Install a good antivirus program to scan and identify the virus before deleting it.


The Strengths And Weaknesses Of Biometrics

Authentication is the process of determining whether a person is who he or she claims to be. This process can occur in one of two ways. Verification asks “Is this the person who he or she claims?” and consists of a single comparison. Identification makes a one-to-N comparison and tries to determine if the person is one of the N people. Several factors, such as what you know, what you have, or what you are can be used for authentication, with all three options having strengths and weaknesses. For improved security, it is advisable to use more than one factor, if possible.

Biometrics are fast becoming an integral part of online security. From the familiar fingerprint to cutting-edge retina scanning and facial recognition technology, it is increasingly the go-to mechanism for protecting and providing access to sensitive data including money and confidential account information.

Until recently, biometric authentication had been discussed on a largely theoretical basis. Today, significant advances have now made it a truly viable and secure alternative to traditional forms of security, offering the opportunity to improve usability of services for its customers.

Biometric authentication uses an individual’s biological data to verify their identity. Unlike the Personal Identification Numbers (PIN) and passwords, biometric data is nearly impossible to guess and is unique to a single person. Biometric systems can be extremely difficult to compromise, making them a favoured choice over other single-factor security methods or a welcome addition to multi-factor authentication for high security and enterprise security.

However, no one method is without limitation and there is still a way to go until biometric authentication methods become affordable and trusted enough for widespread adoption. Let’s take a look at some of the methods being used today and the strengths and weaknesses they bring to the table.

Authentication in Your Hands

The most established method of biometric authentication is fingerprints. While unique, there are concerns that they are one of the easier biometric parts to duplicate. We leave fingerprints on any surface we touch, and these can be lifted from smooth surfaces such as glass. It would never be advisable to write your password on a wine glass and hand it to a waiter, but if your fingerprint is used as a password, that is precisely what is being done. Another consideration is that, with fingerprint scanning, there are only as many password options as we have fingers.

Despite these weaknesses, fingerprints are far more difficult to guess than a password and their low-cost and high convenience makes them one of the most common authentication methods.

From fingerprint scanning, fingervein or hand vein scanning has naturally evolved. The method scans vascular patterns beneath the skin’s surface, that aren’t left on the surfaces we touch, making them a safer alternative to fingerprints. Despite this, the higher expense of the scanning equipment means fingervein scanning is a less common option.

The Eyes Have It

Another secure scanning method is iris recognition. Although widespread in movies, iris scanning has seen modest adoption. The security of iris scanners is typically reliable, with a very low chance of false positives as they tend to be very high detail, making duplicate irises hard to create. Even a close-up “selfie” is unlikely to provide the detail required to create a duplicate.

Despite their reliability, though, there are concerns about hygiene issues and accessibility. If scanning equipment is shared and requires users to position their eyes on sockets used by others, it could quickly become unhygienic unless cleaned after each use. To be completely clean may require chemicals that would irritate the eye, such as alcohol. If the shared scanner is static, it may be difficult for people of different heights to use it.

In terms of accessibility, iris scanning may be problematic for people with certain medical conditions. Diabetes, for example, can alter the appearance of the eye over time, which may cause iris recognition issues.

Hello, is it Me…

Voice recognition technology is another option that is becoming widely supported. Although the method has become more advanced in recent years, the methods to defeat it have advanced too. The voice is the easiest to duplicate of all the biometric options; even a recording on a good microphone could defeat cheaper systems.

Your Face or Mine?

Of all biometric methods, facial recognition is the latest to enter the market. While original iterations could be defeated using photos of the appropriate person, modern implementations map the structure and movement of the face to reduce the success of this kind of forgery. While the technology is new, if proven effective it could be a reasonable alternative to some of the other methods mentioned. However, with current attacks and false positives demonstrated against the Apple FaceID system, there is likely to be more advancement required in face recognition.

It’s clear to see that there have been some significant advances made in biometric security. In terms of the level of security it provides, there is still some way to go before most methods are likely to receive widespread adoption. Another barrier to adoption is the level of public discomfort with keeping physical details on record as, thanks to fingerprints, biometrics are commonly associated with identifying criminals.

For circumstances requiring higher security, biometric systems should always be considered as a single factor in a multi-factor system and should be combined with a strong truly secret asset such as a password. But for the average consumer, the ongoing progress in biometric authentication technology could soon secure some methods as standard in guarding against thieves, casual attackers and malicious individuals.

Changing your password frequently good or bad ?

How often do you change your password? We bet some of your credentials are more than a decade old.

In fact, most of us only change our passwords when a situation forces us to. Typically, that’s either when you can’t remember it, or an app or your company forces you to create a new one every few months.

The debate about whether frequent password changing is a good or a bad practice is raging.

“Change your passwords regularly” is a common piece of password advice, but it isn’t necessarily good advice. You shouldn’t bother changing most passwords regularly — it encourages you to use weaker passwords and wastes your time.

Yes, there are some situations where you’ll want to regularly change your passwords. But those will probably be the exception rather than the rule. Telling typical computer users they need to regularly change their passwords is a mistake.

The Theory of Regular Password Changes

Regular password changes are theoretically a good idea because they ensure someone can’t acquire your password and use it to snoop on you over an extended period of time.

For example, if someone acquired your email password, they could log into your email account regularly and monitor your communications. If someone acquired your online banking password, they could snoop on your transactions or come back in several months and attempt to transfer money to their own accounts. If someone acquired your Facebook password, they could log in as you and monitor your private communications.

Theoretically, changing your passwords regularly — perhaps every few months — will help prevent this from happening. Even if someone did acquire your password, they’d only have a few months to use their access for nefarious purposes.

The Downsides

Password changes shouldn’t be considered in a vacuum. If human beings had infinite time and perfect memory, regular password changes would be a fine idea. In reality, changing passwords imposes a burden on people.

Changing your password regularly makes it harder to remember good passwords. Rather than create a strong password and commit it to memory, you must attempt to remember a new password every few months. Users who are forced to regularly change their password by a computer system may end up appending a number — so they may use password1, password2, and so on.

It’s hard enough to change your password regularly for a single account and remember your new password each time. But we all have many passwords — imagine having to change your password regularly and constantly remember unique, strong passwords for a large number of services.

It’s already basically impossible to choose strong, unique passwords for every website and remember them — that’s why we recommend using a password manager like LastPass or KeePass. If you change your password every few months, you’ll likely end up using weaker passwords and reusing them across multiple websites. It’s much more important to use strong, unique passwords everywhere than to change your password regularly.

Why Changing Passwords Won’t Necessarily Help

Regularly changing your password won’t help as much as you might think. If an attacker gains access to your accounts, they’ll most likely use their access to cause damage right away. If they gain access to your online banking account, they’ll log in and attempt to transfer money out rather than sit and wait. If they gain access to an online shopping account, they’ll log in and attempt to order products with your saved credit card information. If they gain access to your email, they’ll likely use it for spam and phishing, or attempt to reset passwords on other sites with it. if they gain access to your Facebook account, they’ll probably attempt to spam or defraud your friends immediately.

Typical attackers won’t hold onto your passwords for an extended period of time and snoop on you. That’s not profitable — and attackers are just after profit. You’ll notice if someone gains access to your accounts.

Changing your password regularly is also essential if you use the same password everywhere, because it’s likely your password is constantly being leaked when one of the services you use is compromised. Rather than change that single password regularly, you should deal with the real problem here and use unique passwords everywhere.

When You Do Want to Change Passwords

Changing passwords can help if someone who isn’t a traditional attacker has access to your account. For example, let’s say you shared your Netflix login credentials with an ex — you’ll want to change your password so they can’t use your account forever. Or, let’s say someone close to you gained access to your email or Facebook password and used your password to spy on you. When you change your passwords, you’re primarily preventing this sort of account sharing and snooping, not preventing someone on the other side of the world from gaining access.

Regular password changes can also be valuable for some work systems, but they should be used with thought. IT administrators shouldn’t force users to change their passwords constantly unless there’s a good reason — users will just start using weak passwords, writing down passwords, or even switching back and forth between two favorite passwords.

Password changes in response to specific events are a good thing, of course. It’s a good idea to change your passwords on websites that were vulnerable toHeartbleed but have now patched it. Changing your password after a website has its passwords database stolen is also a good idea.

If you are reusing passwords for different websites, changing your password on all those sites is a good idea if one of those sites is compromised. But this is the worst thing you can do — the real solution here is using unique passwords, not constantly changing your shared password to a new one on all the services you use.

Focus on Useful Advice

The problem with advising people to change their password regularly is that it’s such distracting advice. Using strong, unique passwords everywhere is already almost impossible advice to do if you’re not using a password manager to remember them for you. Two-factor authentication is also helpful as it can prevent your accounts from being accessed even if someone steals your passwords. Rather than tell people to regularly change their passwords, we should be passing on useful advice like “use unique passwords everywhere” — something most people don’t presently do.

This isn’t the only piece of advice we disagree with. For most home users, writing down some passwords is actually not a bad idea — it’s definitely better than reusing the same password everywhere.

We’re not the only ones advising against regular, indiscriminate password changes. Security expert Bruce Schneier has written about why changing passwords regularly isn’t good advice, while Microsoft Research has also concluded that changing passwords regularly is a waste of time. Yes, there are some situations where you may want to do this — but passing on advice like “change your passwords every three months” to typical computer users is doing more harm than good.

What Is Private Browsing And How Can It Keep Your Information Safe?

Private Browsing (referred to as InPrivate in Internet Explorer, Private Browsing in Mozilla Firefox, and Incognito mode in Google Chrome) is a unique privacy mode where the browser doesn’t save browsing history, cookies and site data.

Privacy mode can offer you some protection from prying eyes. By using a secret browsing session, you can keep your search history and browsing data somewhat secret. Not only this! You can also minimize your personal search history, protect yourself when you’re not on your computer, block websites from collecting your personal information, sign into multiple accounts and search something private.

Other Uses for Private Browsing

  • Blocking sites from collecting your personal information: Your browsing history is so long and detailed that much of what you see online is targeted specifically for you. Amazon shows you products you may want to buy based on past purchases, and Google thinks it knows what you want to search for based on what you’ve looked for previously. If you’d like to “start fresh,” private browsing can let you do that.
  • Making sure you’re getting the lowest price: Online retailers may vary prices partially based on data such as your location and browsing history. This is particularly common in the travel industry — that plane fare you’ve eyeballed may jump the next time you look simply because the airline wants to give you an extra kick in the pants to book it. Or if you live in a higher-income area, you may be shown a higher price than someone who’s looking at the same product across town. Private browsing can level the playing field.
  • Override usage limits: Maybe you want to read another article on a news site, but you’ve hit your free-story limit for the month. Or perhaps you’re prohibited from downloading more than one set of grocery coupons. Private browsing may help you circumvent these limits if the sites use cookies to remember whether you’ve been there before.
  • Log in to linked accounts at once: If you have several accounts on the same site, you can use private browsing to bring them both up at once. I can use private browsing to check my work and personal Gmail accounts simultaneously — otherwise, I have to sign out of one to check the other, or use two different browsers, such as Safari and Chrome

But the Internet can be a dangerous place these days. The promise made to the user is that no trace will be left on the machine when the private browsing window is closed. Technically, It is next to impossible to be on the internet without leaving behind a digital trace of some kind. You must know that private browsing is far from a silver bullet if you’re genuinely concerned about keeping your data safe online.

hide-your-ip-address-735x400Also Read: why you must hide your IP address to secure your data

According to Jeff Bermant, the CEO of Cocoon – “People can use cloud browsers to protect their privacy. We have a cloud browser that protects users from being hacked, tracked, and attacked by keeping viruses, malware, ransomware, and hackers from penetrating a computer hard drive. Not only this! We also have a browser now focused on use in China to bypass the Great Firewall for free”.

Beyond Private Browsers: What are the Other Ways to Protect yourself online?

So if private browsing can’t keep you completely secure online, what can? Unfortunately, in the world of internet, there is no guarantee of total security, but there are few things which can help in keeping your digital information safe. Few of the recommended habits are:

Beware of phishing

You should be aware of the phishing scams. Don’t open or click links or attachments in the suspicious emails, or click buttons on questionable pop-up windows. And most importantly, do not download, install or run anything from a website you’re unaware.

Keep your systems updated

Developers use updates to “patch” security vulnerabilities, so it’s crucial to stay current. Your computer also has a built-in firewall that can help prevent some threats, but it can only do that if it’s on. Make sure by double-checking in your security settings.

A good antivirus software can scan your system for existing threats regularly and prevents from downloading new ones. Try to get an antivirus from a reputable dealer or site.

There are hundreds of Free antiviruses, but I would suggest, not to use a free antivirus. Free antiviruses programs offer no telephone technical support and often also include advertising. I recommend and personally use Kaspersky, which helps you in fighting against computer threats and viruses.

Use a VPN

A VPN, aka virtual private network, lets an external server act as a buffer between the user and the Internet. It creates a tunnel between both which means anyone who’s watching can only see the IP address of a VPN. After connecting to the VPN, your data is encrypted, and no one can spy what you do online. Perhaps more importantly, your digital data is encrypted going to and from the VPN server.

vpnkeyAlso Read: VPNs are not as private as the name suggests


If you’re using a public network and insist on doing online shopping, banking, or something else that could leave essential data vulnerable, pay careful attention to data encryption.

You want to see “https” instead of just “HTTP” at the beginning of a URL when you’re on a site where you will input any potentially sensitive information. You may also see a green bar pop up by the site’s URL with a lock icon. This means the site is the real deal and that your information will be encrypted when it’s sent so that hackers can’t see it.