{"id":840,"date":"2017-01-08T18:53:25","date_gmt":"2017-01-08T16:53:25","guid":{"rendered":"https:\/\/community.virtono.com\/?p=840"},"modified":"2017-01-08T18:53:25","modified_gmt":"2017-01-08T16:53:25","slug":"top-6-myths-about-computers-and-laptop-debunked","status":"publish","type":"post","link":"https:\/\/www.virtono.com\/community\/knowledgebase\/top-6-myths-about-computers-and-laptop-debunked\/","title":{"rendered":"Top 6 Myths About Computers and Laptop : Debunked"},"content":{"rendered":"<p><strong>MYTH 1:<\/strong><\/p>\n<p><strong>Using a laptop on your lap will fry your *ahem* babies<\/strong><\/p>\n<p>I won\u2019t bore you with an anatomy lesson, but the short of it is that your swimmers move slower and are less potent the hotter it is down there. If you noticed, the underside of laptops tend to get pretty warm when in use, and that\u2019s with some breathing space between it and a flat surface. Remove that breathing space and you might as well be sitting in a tub on a fire pit.<\/p>\n<p><strong>MYTH 2: <\/strong><\/p>\n<p><strong>Antivirus software is the end-all and be-all of security<\/strong><\/p>\n<p>Just like your vaccines, antivirus programs can only detect and stop the common threats they were meant for. The problem is, the more malicious and extreme attacks were coded specifically to bypass these safeguards. Browsing sites, plugging in a flash drive, and even reading a PDF file can infect your system with a virus if the hackers are deviant and ingenious enough. When you\u2019re connected to the Internet, it\u2019s best to assume that you\u2019re going to get attacked.<br \/>\nEven international businesses get their servers hacked every once in a while. What can you do then to protect yourself? You can stop browsing the Internet\u2019s underbelly and stick with the obvious, trustworthy sites for starters. You won\u2019t win a new iPhone through those clickable ads. Trust me, I\u2019ve tried.<\/p>\n<p><strong>MYTH 3: <\/strong><\/p>\n<p><strong>Apple Macs are virus-free<\/strong><\/p>\n<p>Let me ask you something. If you were fishing and you had two spots to go to: one with tons of regular, easy to catch fish; and another with only a handful of seemingly special fish that aren\u2019t as easy to bait; then where would you throw your line?<br \/>\nYou\u2019d pick the first spot, right? It\u2019s the same with the Windows and Apple operating systems. Because the Windows OS, is more widespread, and has a wider user base, it makes sense to code a virus, malware, or spamware for the numerous Windows users. Think of it as the illegal way of dynamite fishing. You might not get them all with one stick, but at least you caught a significant amount in the blast.<\/p>\n<p><strong>MYTH 4: <\/strong><\/p>\n<p><strong>Ctrl+Shift+Del will completely delete data from a drive<\/strong><\/p>\n<p>We\u2019ve often been told that \u201cDel\u201d just sends files to the Recycle Bin, and \u201cCtrl+Shift+Del\u201d permanently deletes them from our computer. While seemingly true, these aren\u2019t fool-proof methods of erasing our data. Keying in these commands just causes our computer to hide the file entries on our displays but their remnants are still on the hard drive, retrievable using special recovery software.<br \/>\nThat\u2019s good news if you accidentally erase important things. If for whatever reason you\u2019re really keen on wiping data, you should create, copy, or download files on to the drive as to overwrite what you want permanently deleted.<\/p>\n<p><strong>MYTH 5: <\/strong><\/p>\n<p><strong>Computers are changing our sleep pattern<\/strong><\/p>\n<p>This is very true, and not just because we use computers until the wee hours of the morning, spoiling ourselves with Facebook posts and cat memes. We\u2019re able to sleep because our body creates the hormone melatonin, the production of which is slowed down by light. That explains why we\u2019re up and about when the sun\u2019s out. Advances in technology have made it so that we\u2019re never too far away from a light source, thus messing with our evolutionary programming where night time equals down time.<br \/>\nSo should we go back to shrouding ourselves in the dark for a good night\u2019s rest? Good one. There\u2019s no chance we\u2019d be putting down our gadgets for some measly sleep. We can, however, turn the screen\u2019s brightness all the way down, as well as change its hue in order to hurt our eyes less.<\/p>\n<p><strong>MYTH 6: <\/strong><\/p>\n<p><strong>I use Incognito mode. No one will ever catch me<\/strong><\/p>\n<p>False. If you read the fine print on the infamous incognito window of browsers\u2014which, let\u2019s be honest, no one really does\u2014you\u2019ll see that it only protects you from those using the same computer. While going incognito means that you\u2019re browsing history, cookies, and cache won\u2019t be saved on your system, it sure as heck won\u2019t protect you from your company\u2019s server and internet service provider who\u2019ll still receive information regarding your activities. To put it simply, incognito does not mean anonymous.<\/p>\n<p>&nbsp;<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"842\" data-permalink=\"https:\/\/www.virtono.com\/community\/knowledgebase\/top-6-myths-about-computers-and-laptop-debunked\/attachment\/google_chrome_incognito\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/Google_Chrome_Incognito.png?fit=918%2C516&amp;ssl=1\" data-orig-size=\"918,516\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Google_Chrome_Incognito\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/Google_Chrome_Incognito.png?fit=300%2C169&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/Google_Chrome_Incognito.png?fit=750%2C422&amp;ssl=1\" class=\"wp-image-842 aligncenter\" src=\"https:\/\/i0.wp.com\/community.virtono.com\/wp-content\/uploads\/2017\/01\/Google_Chrome_Incognito-300x169.png?resize=462%2C260&#038;ssl=1\" alt=\"\" width=\"462\" height=\"260\" srcset=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/Google_Chrome_Incognito.png?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/Google_Chrome_Incognito.png?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/Google_Chrome_Incognito.png?w=918&amp;ssl=1 918w\" sizes=\"auto, (max-width: 462px) 100vw, 462px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>MYTH 1: Using a laptop on your lap will fry your *ahem* babies I won\u2019t bore you with an anatomy lesson, but the short of it is that your swimmers move slower and are less potent the hotter it is down there. If you noticed, the underside of laptops tend<\/p>\n","protected":false},"author":3,"featured_media":841,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[5],"tags":[],"class_list":["post-840","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebase"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/39-google-incognito-window-meme.jpg?fit=450%2C476&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ISfL-dy","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":866,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/viruses-and-linux-and-linux-antiviruses\/","url_meta":{"origin":840,"position":0},"title":"Viruses and Linux and Linux Antiviruses","author":"Daniel Draga","date":"January 19, 2017","format":false,"excerpt":"Viruses and Linux Computer viruses are pieces of software that replicate themselves on a computer. The replication means a virus is distributing itself all over your computer, making it tough to get rid of. Viruses seem to understand that there\u2019s safety in numbers. Viruses can destroy data or send it\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/1364034317531-690x336.jpg?fit=690%2C336&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/1364034317531-690x336.jpg?fit=690%2C336&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/1364034317531-690x336.jpg?fit=690%2C336&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":861,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/debunking-mobile-device-myths\/","url_meta":{"origin":840,"position":1},"title":"DEBUNKING MOBILE DEVICE MYTHS","author":"Daniel Draga","date":"January 19, 2017","format":false,"excerpt":"Mobile phones, these things have made our lives awesome, and its a little wrong if we fail to understand the basics of how these devices actually works, and what's more worse is when we fail to differentiate facts from fantasy about these little devices, so today I will try and\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/myth.jpg?fit=620%2C350&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/myth.jpg?fit=620%2C350&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/myth.jpg?fit=620%2C350&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":844,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/securing-the-clouds\/","url_meta":{"origin":840,"position":2},"title":"Securing The Clouds","author":"Daniel Draga","date":"January 9, 2017","format":false,"excerpt":"Technology is massively integrated with modern business, but many of those businesses still lack a modern security solution which helps protect against vulnerabilities in each layer of organisation. With the Protection Service for Business (PSB), this changes everything. It is a unique breakthrough on technology which provides total protection yet\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/cloud-security.jpg?fit=767%2C538&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/cloud-security.jpg?fit=767%2C538&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/cloud-security.jpg?fit=767%2C538&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/cloud-security.jpg?fit=767%2C538&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":2836,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-plesk-on-ubuntu-20-04\/","url_meta":{"origin":840,"position":3},"title":"How to Install Plesk on Ubuntu 20.04","author":"George B.","date":"July 18, 2022","format":false,"excerpt":"What is Plesk? Plesk is a commercial web hosting and server data center automation software developed for Linux and Windows-based retail hosting service providers. Plesk Minimum Requirements The minimum amount of RAM required for installing and running Plesk on Linux is 1 GB + 1 GB swap. On Windows \u2013\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/1200px-Logo_Plesk.svg_.png?fit=1200%2C1200&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/1200px-Logo_Plesk.svg_.png?fit=1200%2C1200&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/1200px-Logo_Plesk.svg_.png?fit=1200%2C1200&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/1200px-Logo_Plesk.svg_.png?fit=1200%2C1200&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/07\/1200px-Logo_Plesk.svg_.png?fit=1200%2C1200&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":760,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/3-major-challenges-in-cloud-security\/","url_meta":{"origin":840,"position":4},"title":"3 major challenges in Cloud security","author":"Daniel Draga","date":"November 17, 2016","format":false,"excerpt":"Is your institution planning to leverage cloud computing and mobile computing in order to improve service agility, increase increase student and research success and lower costs of ownership, and lower capital expenses? If so, you are no doubt aware that your institution is also increasing its attack surface. Cloud-based technologies,\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":984,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/malware-detection-on-your-server\/","url_meta":{"origin":840,"position":5},"title":"Malware Detection On Your Server","author":"Daniel Draga","date":"June 26, 2017","format":false,"excerpt":"The term malware encompasses a large range of unwelcome software that is designed to damage a computer. A partial list of malware might, for example, include viruses, spyware, Trojan horses, and worms. The rapid proliferation of such software is enough to concern users of all levels, from novices to seasoned\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/06\/What-is-Malware.jpg?fit=600%2C300&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/06\/What-is-Malware.jpg?fit=600%2C300&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/06\/What-is-Malware.jpg?fit=600%2C300&ssl=1&resize=525%2C300 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/840","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/comments?post=840"}],"version-history":[{"count":1,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/840\/revisions"}],"predecessor-version":[{"id":843,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/840\/revisions\/843"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media\/841"}],"wp:attachment":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media?parent=840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/categories?post=840"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/tags?post=840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}