May 2 is the World Day of Bullying Prevention

Different non-governmental organizations and non-profit associations have managed to establish May 2 as the World Day of Bullying Prevention. It emerged in 2013 as an initiative of the organization Bullying sin fronteras in Argentina and has been celebrated since then. Some countries have formalized the commemoration of this day, as is the case of Spain, through this institutional declaration by the Senate.

El 2 de mayo es el Día Mundial contra el acoso escolar

The problem of bullying has worsened in recent years in an exceptional way. The expansion in the use of connected mobile phones and social networks among children and young people has made the problem considerably worse.

LEER MÁS

Google Grasshopper application to learn how to program in javascript

Google, through one of its subsidiary companies, has launched the Grasshopper application for mobile devices designed to facilitate the learning of javascript, one of the most interesting computer programming languages of the moment.

The company has the name of Area 120, but is part of the Google complex. We can see the presentation on its websitewhere we will find links to install the application on both Android and iOS devices.

 Aplicación Grasshopper de Google para aprender a programar en javascript

As it is usual in their creations, they have taken great care of the appearance and presentation of the application so that it is striking. In addition, its operation is very intuitive and easy to use. Through funny graphics where a small grasshopper shows us the evolutions, anyone interested in learning javascript programming can progress through the different exercises.

LEER MÁS

Defender Tips to keep Windows 10 safer. Check Windows Defender

Windows 10 is the most used operating system in the world to make our computers run. That is the main reason why it becomes a constant target for most cyber-attacks and will remain so while its hegemony lasts.

Microsoft has done a good job with the protection systems with which this version of its Windows has been provided. However, it is the user himself who has the ultimate responsibility that the system works under the safe guidelines with which it is defined and for that, he must take care to keep it as up-to-date and “sound” as possible.

Revisa Windows Defender

Let’s review the main security features of our Windows 10 and check that everything works as it should. In general, it will be sufficient for us to periodically look at the information provided by the Windows Defender security program.

LEER MÁS

Steps to eliminate information in the search engines

Today again we publish a post written by one of our readers. It is the second one that he sends us to share it in our blog. Remember that our readers can make use of the blog sectionWrite your post and we will publish it for you“.
We hope you find it useful.
We thank once again the “Independent Researcher” for his collaboration with this blog :)

 In this article we will try to explain how we can eliminate information published on the Internet over the years, some with permission and other without it. To begin with, I would like to say that what is presented here is intended for the countries of the European Union (EU) where a law of Data Protection governs more extensive than elsewhere in the world, especially the so-called ‘Right to Oblivion’. However, it should be noted that in some cases you can also request deletion when the website is hosted outside the EU. Finally, I will explain that there are websites that until the date of publication of this article it is not possible to contact the administrator of the page since the email address is protected thanks to applications that have that function.

LEER MÁS

Use the Wi-Fi network for guests of your router for security

Many current routers have the possibility of creating in our homes a special Wi-Fi network for guests. In addition to convenience, as we will see, the use of this function gives us above all security.

Utiliza la red Wifi para invitados de tu router por seguridad

With the arrival of fiber optics as a means of accessing the Internet and the new more sophisticated routers, some new functions that we should know and use can appear in our Wi-Fi networks.

LEER MÁS

Grindr ignites the gay community for having shared their data

Recently, another worrying case of international data leakage has been uncovered. On this occasion the company involved is responsible for Grindra social network aimed at facilitating contacts among the gay community through its popular mobile application.

Grindr enciende a la comunidad gay por haber compartido sus datos

It is focused on the male homosexual community and currently has more than 3.6 million active users around the world. The objective of this application is to facilitate dates in person among users from this community through shared information, chats, geolocation, photos, etc. It is available for both Android and iPhone.

LEER MÁS

How they use Facebook information to manipulate us

Facebook information has been used to manipulate its users. This is the emphatic assertion that we can draw when knowing the details of the scandal in which Facebook and the British company Cambridge Analityca have been involved.

Cómo la información de Facebook se puede utilizar para manipularnos

The personal information of the profiles of Facebook has been used in mass by this company to elaborate advertising strategies with the purpose of influencing in the past presidential elections of the USA, at least that is what emerges from the investigations published in some media as this article from Xataka.

What was it?

LEER MÁS

ThisCrush, an anonymous social network that encourages cyberbullying

Although ThisCrush is, according to its creators, a social network aimed at messages that seek to flatter and enamor the recipient, the truth is that the possibility of sending comments anonymously causes the messages of offensive type, insults, threats, etc. to rocket there.

The ThisCrush social network is not even two years old and is already a reference among 12 year old teenagers or even minors.

ThisCrush, una red social anónima que incita al ciberacoso

A meaning of the term “Crush” refers to those Platonic loves that are not reciprocated. The social network ThisCrush is based on this, on being able to send to another person messages to initiate a loving relation of anonymous form or, if it is wanted, showing the real name.

LEER MÁS

On Instagram fake shops are advertised that just try to rip us off

“Brand clothing down to 90% off,” is one of the recurring ads that appear lately on the Instagram social network. It directs us to a Web page where we can supposedly buy expensive clothes at suspiciously low prices.

The funny thing is that although the attempt to scam is obvious and the page clearly leads us to think it is a scam, Instagram admits to it and does not remove it, at least within a reasonable period of time.

En Instagram se anuncian tiendas falsas que solo intentan estafarnos

LEER MÁS

Beware of false job offers online

Although this type of scam had its peak during the worst moment of the last crisis, this system of deception, unfortunately, is still used today.

Cuidado con las falsas ofertas de trabajo por Internet

There are unscrupulous people who take advantage of the desperation of those who seek employment to profit from small scams. They offer job interviews or tempting false jobs to which, to gain access, they force us to disburse some amount of money in one way or another.

LEER MÁS