Skip to main content

How to customize the notification which arrives on our mobile screen and how to save the APPLE ID hacking?

Today our post on two topics how to customize notification and how to save the APPLE ID  hacking

LET'S DO THIS!!




HOW TO CUSTOMIZE NOTIFICATION!!
  1. Today the need for android phones has increased and there are some notification coming up all the time. Ever never ever email WhatsApp again, then never update. Many apps also send unnecessary notification. Sometimes there seems to be a slight tingling. Let us know that there is such a setting in the android phone though which you can set the notification according to your need.
 DELAY AND SNOOZE THE NOTIFICATION 


The notification snooze or delay option is available on the android phone, or as soon as you set it will receive a notification. For this all you have to do is leave the notification on the home screen slide left or right. With this, the settings and a clock logo will appear. Notification snooze time will come as you touch  the logo of the clock. You can set it according to your need. You can set 15 minutes, half an hour, an hour, or 2 hours time.


DISABLE NOTIFICATION DOT 


New android phone has notification dot option. The advantage of this is that if you get an email or message, then you show the dot on the icon of that app. Evan if there is some unread message, the notification icon will appear on the app icon. If you want to remove the notification dots. For this, go to the home screen and keep it in the vacant place for a while. Here the settings option will come down, click on it, a new window will open and this will get you the notification dot again. Disable notification dot from here. 




UNWANTED NOTIFICATION OFF 


You can set the app notification according to the need, that is, the more information you want, the same as on the home screen, otherwise you can close the rest. Go to settings for this and choose the notification from here. Here's the list of apps. You can turn off notification of those apps that are not needed.


SET NOTIFICATION PRIORITY 


In the notification settings, you will get the option to set priority right in the notification settings. You can set the notification preferences here. Someone can set someone general priority for high priority. High priority notification will appear first on the home screen.


HOW TO SAVE THE APPLE ID HACKING!!



Save like this with the APPLE ID hacking 

APPLE has been a platform where hacking of any user's ID  is the hardest task for hackers. By using APPLE ID, users access the IPHONE OR IPAD and MAC devices. If APPLE ID is scared of being hacked then read these steps carefully.

STEP 1: Sign in on your APPLE ID account page 
STEP 2: Change the password of the APPLE ID and try to set a password that is hard to hack.
STEP 3: Review the personal and security information of you APPLE ID carefully with all phone information and phone information associated with the APPLE ID, to ensure that no information is incomplete.
STEP 4: If you are unable to access the email ID attached to the APPLE ID, then immediately change the password for that email ID or use another email ID for the APPLE ID.
STEP 5: Set up the two factor authentication for you APPLE ID if your hacker knows your password then your account will still be safe. Users should note that if you are signing in on your APPLE account page and you are seeing a notification of the account block, then immediately reset the account. If you have trouble, contact APPLE support. 

HOW TO DETECT ID HACK!!

  1. If you get a notification that your APPLE ID has been logged with an unknown device.
  2. If you receive a confirmation email from APPLE that your APPLE that your APPLE ID  password has changed or information about your account has been updated, then such a request will not be able to do so on your behalf. 
These are the tips and tricks that your APPLE ID is being hacked or not.

THANKS FRIENDS TO READ THIS POST.

NEW TECH TIPS 

Comments

Popular posts from this blog

How Viruses are spread on our computer

Today I am back with my new topic which is based on How Viruses are spread on our computer Let's start !! A program that has the capability to infect other program and make copies of itself and spread into other programs is called Virus. A Virus can be identified if our system:    Takes a long time to load applications.     Has an inability to boot.     Shows unpredictable program behavior.     Has strange graphics appearing on the screen. The types of viruses are:   File Virus, which infects and replicates when it gets attached to MS-DOS program files with EXE or COM extensions. Boot Sector virus infects the boot sector of the floppy disk or hard disk.   Macro Viruses insert unwanted words or phrases in MS Word or Excel. How Viruses are spread? It seems to be a common belief that viruses are spread by games, by Internet file downloads or by Bulletin Board Systems (BBSs). The truth is more intricate. A physical disk has to be involved in case

How Internet Works and how much kind of it

Today I am back with an interesting topic which is how the Internet works. Let's Start! About Vinton Gray Cerf The Vinton Gray Cerf is an American Internet Pioneer. He was born in (June 23, 1943). Who is recognized as one of the fathers of the Internet? Sharing this title with TCP/IP co-inventor Bob Kahn. His acknowledge and lauded, repeatedly, with the honorary awards that include the National Media Of Technology, the Turing Award, the Presidental Medal Of Freedom, the Marconi Prize and membership in the National Academy Of Engineering.  If you want to read more about Vint Cerf then click on the link:  https://bit.ly/1je8u4g Wired Communication Media The data is physically transmitted from the source computer to the destination computer through the wired transmission medium. Bounded media are made up of the external conductor (Usually Copper) bounded by the jacket material. Bounded media are great for LABS because they offer high speed, good security, a

Safely browsing the web and using social networks

Today i am back with my new topic which is Cyber security. Let's start!! Internet is the most recent telecommunication technology,which has brought a technological revolution not only in offices but also in homes. Internet is the world's largest computer network, which connects several computers of different types belonging to various networks all over the world. Internet is not governed by a single authority. So, there are no official rules and regulations to control activities involving it.  This has many problems being associated with the internet. Individuals or organization use  their computers to store important and valuable data.Very often this data is kept confidential and needs to be stored securely. However, with the internet connecting all these computers, this security is now being threatened.   INTERNET APPLICATION  It is not that the Internet is used only for sending and receiving information. It has its commercial aspect too. Internet