Wednesday, October 22, 2025

ARTICLE 2: The Problem of Using the Same Password for All Accounts

Why Using the Same Password Everywhere Is a Big Security Risk?

Problem Description

Many people often use the same password for all their accounts and applications. They avoid creating complicated passwords because they are hard to remember and too long. While this might seem convenient, it significantly increases the risk of cyberattacks. If one of your accounts is compromised, hackers can use the stolen password to access all your other accounts, leading to identity theft, financial loss, and personal data breaches.

What is Password Reuse?

Password reuse is the practice of using the same password across multiple online services or accounts. This behavior is a major security risk because it makes it easier for attackers to gain unauthorized access to many of your accounts if one password is exposed.


Useful Links to Learn More About Password Reuse and How to Solve It


5 Tips to Avoid the Password Reuse Problem

  1. Use a Password Manager: A password manager securely stores unique passwords for every account, so you don’t have to remember them all.

  2. Enable Two-Factor Authentication (2FA): Even if a password is compromised, 2FA adds a second verification step to protect your account.

  3. Create Memorable Passphrases: Instead of complicated passwords, use longer but easy-to-remember phrases (e.g., "CoffeeSunshine2025!").

  4. Change Passwords Regularly: Update important passwords periodically to minimize the damage if they are stolen.

  5. Avoid Using Personal Info: Don’t use birthdays, names, or common words in your passwords—they are easy to guess.


Which Tip Do You Find Most Useful to Improve Your Password Security?

  • Leave a comment with your opinion and click here to vote in the questioner.

Voting Results (Pie Chart)

This chart shows the percentage of users who voted for each tip.

Tuesday, October 21, 2025

ARTICLE 1: Phishing Attacks

How to Spot and Stop Email & Message Scams ?

Problem: Emails and Messages That Steal Your Credentials

Recently, I’ve been receiving emails and instant messages that appear legitimate at first glance. These messages often contain URLs that lead to fake websites, asking me to input personal information like my email, password, or even credit card details. Once entered, this data is sent to hackers, allowing them to access personal accounts, commit fraud, or even steal identities.

 What is Phishing?

Phishing is a type of cyberattack where attackers impersonate trusted entities (like banks, companies, or services) to trick users into revealing sensitive information such as usernames, passwords, and credit card numbers. These attacks are most commonly carried out via email, SMS, or messaging apps.

 →Learn More:

 5 Tips to Protect Yourself from Phishing

  1. Check the sender’s email address carefully – Look for misspellings or unusual domains.
  2. Don’t click on suspicious links – Hover over the link first to preview the actual URL.
  3. Enable Two-Factor Authentication (2FA) – Adds an extra layer of security to your logins.
  4. Update your browser and antivirus – Security software helps detect malicious attempts.
  5. Report phishing attempts – Use your email provider’s “report phishing” button or alert your IT team.

 What do you think about the tips? 

  • Leave a comment with your opinion and click here to vote in the questioner.

 Voting Results (Pie Chart)

This chart shows the percentage of users who voted for each tip.

 


Stay alert. Phishing is dangerous because it looks so real. When in doubt, don’t click!

Monday, October 13, 2025

MY BLOG IS READY!

 Requirements I have completed on my blog:

  • I have published my blog and made sure it works correctly.

  • I have already sent the blog link to the teacher.

  • I chose a template that fits my style and the topic of my blog.

 👈MY BLOG  👈THE TEMPLATE
                                                                       
  • I went into the settings and changed the language to English.

  • I have published several articles on my blog.

 
 



  • I included labels (tags) in my posts to keep them organized.


  • I added a custom favicon and a nice header with a photo.

 

  • I created a post that includes photos and links.

Friday, October 10, 2025

PC TOTAL PRICES

How to Build Your Own PC: Complete Guide with Prices and Reasons for Each Component

Building your own PC is a rewarding experience that allows you to customize the machine to your exact needs. In this guide, I'll explain each essential component, why I chose it, and provide prices with links where you can buy them. Let's get started!

Wednesday, October 8, 2025

PERIPHERALS - OUTPUT

Output Peripherals: How Printers, Monitors, Speakers, and Headphones Enhance Your Computer Experience

When you build your own computer, it's not just about the internal components like the CPU and motherboard. Output peripherals play a crucial role in how you interact with your system and enjoy its capabilities. Output devices are responsible for delivering information from your computer to you in various forms such as visuals, sounds, and printed documents.

1. Monitor: Your Window to the Digital World

The monitor is the most essential output device, showing everything from your desktop environment to videos, games, and software interfaces. Choosing the right monitor depends on your needs — whether it's for gaming, professional work, or general use.

  • Resolution: Higher resolutions like 1080p (Full HD), 1440p (QHD), or 4K offer sharper images.
  • Refresh Rate: Important for gamers, higher refresh rates (120Hz, 144Hz, or more) mean smoother visuals.
  • Panel Type: IPS panels have better color accuracy; TN panels offer faster response times.

  • Want to learn how monitors work? Check out this video:

Monday, October 6, 2025

PERIPHERALS - INPUT

Building My Own Computer – Input Peripherals

Introduction

When creating my own computer, I realized that the input peripherals are just as important as the internal components like the CPU or GPU. These devices allow us to communicate with the computer, control applications, and interact with the digital world.

Input peripherals include devices such as the keyboard, mouse, scanner, microphone, camera, and joystick. Each plays a unique role in how we send data and commands into the computer system.

In this post, I’ll explain the main input peripherals I selected for my custom PC build and why each one is essential.


1. The Keyboard

The keyboard is one of the most fundamental input devices. It allows the user to enter text, commands, and shortcuts.

Types of keyboards:

  • Mechanical Keyboards: Use physical switches for each key. They are durable and provide a satisfying click sound.
  • Membrane Keyboards: Quieter and cheaper, but less tactile.
  • Ergonomic Keyboards: Designed to reduce wrist strain.
  • Wireless Keyboards: Offer more flexibility and mobility.

For my setup, I chose a mechanical RGB keyboard with customizable backlighting and programmable keys. It’s perfect for typing, coding, and gaming.



2. The Mouse

The mouse allows users to control the cursor and interact with graphical elements on the screen. It converts hand movements into pointer movements.

Main types of mice:

  • Optical Mouse: Uses LED light to detect movement.
  • Laser Mouse: Offers more precision and can work on various surfaces.
  • Wireless Mouse: Connects via Bluetooth or USB receiver.
  • Gaming Mouse: Includes customizable DPI, extra buttons, and ergonomic shapes.

For my computer, I picked a wireless gaming mouse with a high DPI sensor and programmable side buttons — great for both work and games.



3. The Scanner

The scanner is an input device that captures images or text from physical documents and converts them into digital format. Scanners are commonly used in offices, schools, and for personal use when digitizing papers or photos.

Types of scanners:

  • Flatbed Scanners: Used for documents and photographs.
  • Sheet-fed Scanners: Designed for scanning multiple pages quickly.
  • Handheld Scanners: Portable and ideal for quick scans.
  • 3D Scanners: Capture the shape of physical objects for modeling and 3D printing.

I plan to use a flatbed scanner to digitize sketches and notes for my computer design projects.




4. The Joystick

A joystick is a control device that allows users to navigate and control games or simulations. It typically consists of a stick that pivots on a base and sends direction or angle signals to the computer.

→Uses:

  • Flight simulators
  • Racing games
  • Robotics and drone control
  • 3D design applications

I included a USB joystick in my setup for flight and driving simulation games — it makes the experience much more immersive.



5. The Microphone

The microphone captures sound waves and converts them into digital signals for the computer. It’s a crucial input device for communication, content creation, and voice recognition.

Types of microphones:

  • Dynamic Microphones: Durable and great for live use.
  • Condenser Microphones: Sensitive and ideal for recording studios.
  • USB Microphones: Plug-and-play, perfect for podcasts or streaming.
  • Wireless Microphones: Provide freedom of movement.

For my setup, I use a USB condenser microphone for recording podcasts and video calls — crystal clear and easy to use.



6. The Camera

The camera, or webcam, captures images and videos that can be transmitted to the computer. It’s widely used for:

  • Video conferencing
  • Streaming
  • Facial recognition
  • Photography and content creation

Types of cameras:

  • Built-in Cameras: Found in laptops and all-in-one computers.
  • External Webcams: Connect via USB and usually have higher quality and features like autofocus and HD/4K resolution.

I chose a 1080p HD webcam with a built-in microphone for video calls and streaming.




Conclusion

Input peripherals are the gateway between us and the digital world. Each device — whether a keyboard, mouse, or camera — transforms our actions into data the computer can understand.

By carefully selecting the right peripherals, we can:

  • Improve efficiency
  • Enhance comfort and accessibility
  • Personalize our user experience

For my custom computer, combining these devices created a system that’s powerful, functional, and perfectly suited to my daily tasks — from gaming and studying to creative projects.

👉Click here to return to the main page of this blog: GENERAL PAGE

ARTICLE 2: The Problem of Using the Same Password for All Accounts

Why Using the Same Password Everywhere Is a Big Security Risk? Problem Description Many people often use the same password for all their a...