Showing posts with label How to. Show all posts

How To Root Innjoo One Using iRoot and Use Fonts on The Device

The innjoo One is the latest flagship Android phone from innjoo mobile and it is been sold exclusively on Jumia. For some time now, I have come to realize that most people are having issues with rooting the device and I have come to proffer a working solution.
Based on inspection, loads of one click rooting apps like kingroot, framaroot and so on have been tried and they don’t seem to work but then, using a PC works and it’s very essential in rooting the innjoo One device.
root innjoo one and install custom font
Rooting the device uses same process as rooting the infinix hot x507 Android device. Instead of giving you link to the post which entails rooting the infinix hot x507 so you could follow same procedure, am just gonna make the work easier for you by stating it here on this page.
Steps To Rooting Innjoo One Using iRoot
==> First and foremost, you need to enable developer option on the device. To do this, simply go to SettingsAbout, Tap on the build number like 7 times till you get a notification saying ‘you are now a developer’.
==> Next, you need to turn on USB Debugging mode. On default, it’s enabled but you can go to Settings >Developer Options and confirm that USB Debugging is turned on.
==> Using a computer, Download PDANet+ here and install, you will probably get a notification stating if you’d like to install drivers or cancel. Choose to install and select Others.
==> When you get an error stating PDANet installation on phone, connect your innjoo one phone using a good working USB cable to your computer and the error should automatically clear and you should get some check marks.
At this point, PdaNet+ app should have automatically installed on your phone and you should get a complete installation notification on your computer.
==> Download iRoot here and install on your PC, install the application and choose to launch.
==> If you previously removed your phone from the computer, reconnect and your phone should be detected on iRoot software interface.
==> Click On Root and the process should commence. Wait for a while, watch your phone and you should see it reboot. When it reboots, you will probably see a notification stating ‘android is upgrading’.
==> At this point, do nothing till it’s stated on the iRoot software interface that Innjoo one root successed!
==> Click On Complete and you can choose to check root access via the iRoot software and you should get a notification stating ‘Innjoo one has root permissions‘. You can now disconnect your device.
T0 confirm root permission on phone, you can download Download Root Checker App from Google Play Store Here launch and choose to grant access, you should get a notification saying ‘ROOTED‘.
Installing and Using Fonts On Innjoo One
I wouldn’t want to set up a different post to talk on how to use fonts on the innjoo One device, hence, am just gonna state that here too.
To install and use fonts on the device, you will first of all, need to root the device. Follow the instructions above in rooting the device.
After successfully rooting the device, download ifont app from Google Play store and after installation, launch the app and choose to grant access. Choose and download your preferred font and choose to set. Your device may reboot. After rebooting is complete, the new font should take effect.

How to Avoid Being Hacked

How to Avoid Being Hacked

By  on 10 August, 2012
Technology journalist Mat Honan was hacked by an unknown attacker who managed to access his Twitter account even delete all the data on his iPhone, iPad and Mac. What lessons can be learnt and how can you avoid a similar fate?
Security Heading

 Strong passwords

Passwords are the key to your online world so make sure they are strong. Strong passwords should include:
  1. Upper and lower case letters
  2. Numbers
  3. Be over 8 characters long
  4. Symbols
Just as you wouldn’t want one key for your house and car, you should use a different password on each website. This may seem like a daunting task, especially memorizing them. In fact this can be relatively easy. Each site doesn’t necessarily need a completely different password; even one character different is the equivalent to a completely new password. You could therefore make up a rule, for example, that you will take the first letter of the website name and use that as the first letter of the password.

 Two-factor authentication

With two-factor authentication, security depends on two different things. A good example is chip and pin machines. You can’t use your credit card without your pin number. This same principle is used online with your password acting as the first factor, and something else , usually your mobile phone acting as the second. For example Paypal can send you a text message, containing a code, which is then entered along with your password to allow access to your account.
Although two-factor authentication is very secure it does have a few practical disadvantages. What happens if you don’t have or loose your phone? Also, two-factor authentication isn’t currently available for many online services, but you should always use it when possible.

 Don’t give away personal data

This may seem very obvious, but it is amazing how much personal information we leave online about ourselves. Take a look at your privacy settings on your social networking sites to help avoid giving hackers any information that could potentially be useful. For example, if you own a domain name, all your personal information is publicly available by default on WHOIS. This can be made private (for most extensions), either free or for a small charge to mask your details.

Protect your email account at all costs

With access to your email account a hacker could reset your password to all your online services. It is therefore essential to protect your email account with the highest level of security available. Setup security questions and make sure you use an encrypted connection (https). Also, provide a mobile number to be used should you forget your password and also setup security questions.

Good anti virus program

All of these ways to avoid being hacked are irrelevant if a virus infects your computer. It could send the creator your email address and password. It is therefore essential to have a good anti virus software installed on your computer.

Backup all online data

Don’t rely on online copies of your data, especially free services. For example, Flickr and Dropbox might be great but they won’t care if they loose your data so make sure you have an external local backup. Also, use services that allow remote wipes very very carefully (eg Find my Mac). What happens if this backfires?