Flood waters caused by typhoon Ondoy destroyed a lot of computers. Most computers, monitors and printers will have to be replaced. But what about the data, all those important files stored on the hard drive?
Computers submerged in water are probably a total loss. But information stored on the hard drive may be so valuable that a recovery effort might be undertaken, particularly for businesses. Trying to recover information, the first thing to do is make sure the computer is unplugged. Do not turn on the computer if you want to save the data. Water and mud can cause circuits to blow out, destroying data permanently.
When water seeps into all parts of your home, it is easy to be overwhelmed by the mess. There are many questions to be answered and at times it can be difficult to decide where you would like to start. Although each situation with flood damage cleanup is different, there are some essential things to do, and if done, could save a lot of time and money.
The first step in flood damage cleanup is to make sure you document all of the damages. No water will only be around for so long, but to prove to your insurance company that specific items in your home were ruined by the floods and before the flood damage cleanup began, evidence is very important. If your camera has a date log in it, it is recommended to make sure the dates are correct and to stamp your pictures of the flooded areas with the date. You may then also want to write a short note to the insurance company about the flood damage cleanup that would be needed.
1. Remove your phone from the water the soonest time possible. DO NOT ATTEMPT TO TURN ON YOUR PHONE.
2. Remove the battery. Removing the power from the electrical components can increase the chances of saving your phone.
3. If you have a SIM card remove that as well. Place it on the towels and dab dry.
4. Remove any extra pieces, covers, accessories like memory cards, ear pieces, slot covers.
5. Dry your phone with paper towels or dry cloth.
6. Do not shake the device to shed the water off as this could allow moisture or water to seep in further into the layers of electronics inside your gadget.
7. Get a vacuum to suck out any moisture the towel could not reach. Use a small hose attachment and spend about 10-15 minutes vacuuming water out.
8. Do NOT apply direct heat from devices such as a hair dryer or heater as this can damage electrical components.
9. Place rice or salt in a bowl and place phone on top. This will help draw out any remaining water inside the phone. Let phone sit in bowl for at least 8 hours.
10. Let your phone dry out for a minimum of 24 hours! Once all components look, feel dry, Power on your phone, if it works you have successfully recovered your submerged device!
If this would not work, try to replace the battery. Try to borrow from a friend who has a similar working gadget.
Depending on the extent of the water damage, most electronic devices exposed to such moisture could still work after drying. If the device would not turn on, try to recharge the batteries as the power could have discharged when it was short-circuited by water.
If after the steps above, your phone still would not work, bring the gadget to a qualified technician and have it thoroughly checked. There is that slim chance that it would still function.
You can use the INSERT key as a handy paste shortcut, do the following:
1. Click “Tools”, selecting “Options”.
2. When the “Options” multi-tabbed dialog box appears, click the “Edit” tab.
3. Check “Use the INS key for paste”.
4. Click “OK” to close the dialog box.
1. Open My Computer
2. Click on the Tools menu and select Folder Options…
3. Under Folder Options select the view tab.
4. Uncheck the very first box that reads “Automatically search for network folders and printers”.
5. Click “Apply” or “OK”
Short for wireless fidelity, Wi-Fi is a technology that enables networking and connecting without all those messy, confusing, and often unsightly wires, cables, and cords. Mainly, Wi-Fi allows laptops and other devices to connect to the Internet. It also provides a reliable, high-speed connection between computers, printers, gaming devices, cameras, phones, and even home entertainment systems.
Wireless networking works by sending information over radio waves. That, in itself, makes it more vulnerable to outsiders. And, since you can’t physically stop someone from connecting to your wireless network, you need to take additional precautions in order to maintain security on a wireless network.
There are people out there that will steal your credit card information, your passwords, and eventually your money and identity while you’re shopping or browsing online. Someone could even gain control of your computer or send you viruses that could infect your entire network and spread to the people that you send email to. My suggestion is to take the side of caution and do everything you can, and use the tools that are available to you, in order to protect your data, your family, and your personal information.
Symantec, the global leader in Internet and PC security, shares the following tips for a safe Wi-Fi connection:
· Passwords Rule
The security software that comes with most routers normally provides several levels of password protection. Don’t use WEP (wired equivalent privacy) passwords, because the experts warn that those can be easily hacked. Use WPA Personal passwords, or an even more secure format, if it’s offered. Use strong passwords and change your passwords often.
· Secure the Network as well as every computer
Make sure that you secure each PC with its own firewall, so that even if an intruder breaks into your network, you still might be able to prevent access to the computers within the network. It’s like having double-locks on your door. Be vigilant and keep those locks on! Be sure to use the included security software that comes with your wireless router, and it’s also a good idea to rename your network to so you’re not using any generic or out-of-the-box names.
· Be Careful in Public
When you use Wi-Fi hotspots in public places, be extra careful. Reportedly, one popular ruse includes criminals who can ‘sniff’ Internet traffic and set up a fake hot spot that you might innocently log into. This “evil twin” is ready to steal passwords, financial info, or whatever else is transmitted.
· Update your software for best protection
Keep your security software current and active. Be sure to check out Norton Internet Security 2008, Symantec’s award-winning product that provides exceptional protection for wireless networks.