214-207-4249 | Influencing Strategic Thinking steague@resourcedomain.com
Select Page

1. Magnets erase data.

Solid State Drives (SSD) and other forms of flash memory (found in laptops, smartphones and USB drives) wouldn’t be affected by a magnet because no magnetic field is necessary to record or store data. Hard disk drives (HDD), however, do use magnetic bits and therefore a magnet could technically disrupt the code. It would take an extremely strong magnet to destroy a PC’s hard drive though and definitely not one that you’d have just laying around the house. You can watch this video on Forbes to see just how powerful the magnet would need to be.

2. Closing smartphone apps saves you power.

This depends on the type of smartphone you have. For those using an iPhone or Windows phone, this is mostly false. While suspended in the background, your typical apps like Safari or Messages don’t use any battery power. The exception to this is a GPS navigation app that needs to run in the background. Android apps, on the other hand, do continue to run in the background and suck battery resources. Read more about phone battery myths and tips here.

3. Emptying your computer’s recycle bin permanently deletes files.

If you’ve recently cleared out your computer’s trash and are worried you’ve lost something important forever, have no fear. Emptying the trash or recycle bin just deletes your computer’s links to the files, allowing that space to be written over again. So, there’s still hope in recovering the files if the space has yet to be re-filled.

4. Password protected Wi-Fi networks are safe from hackers.

According to laptopmag.com, there are two types of password-protected Wi-Fi environments: your home network and a network you sign into to connect to the internet in a public place. Using a password to log in to your own Wi-Fi network at home is generally safe, as long as your network employs WPA or WPA/2 encryption. In a public Wi-Fi network, a password merely enables your entry into a hotspot and you are not as protected from hackers. For truly secure communications, at home or in public, a VPN (virtual private network) is recommended.

5. Private/incognito browsing means you’re anonymous.

Many people seem to think using private or incognito windows means safer internet browsing but this is false. Although “incognito” and “private browsing” automatically deletes browsing history and cookies off your computer at the end of every session, it does not make browsing safer or hide your identity online. Private browsing does not prevent ad trackers or various websites from recording your history, either. Again, the only real way to be sure your browsing is secure or to remain anonymous is to use a VPN.

6. Improperly removing a USB drive will delete all your data.

If you’re working with a USB drive and accidentally remove it from your computer without clicking “safely remove hardware” first, you’re probably fine. Although it’s best to go through the simple steps before removing it just to be safe and if you’re in the middle of transferring files you do run the risk of experiencing issues or lose.

7. You shouldn’t power off your computer every day.

While some may believe it’s harmful to shut down a computer every night and it’s best to instead put your laptop in sleep mode, this isn’t necessarily the case. Shutting down your computer when you’re not using it conserves energy and puts less stress on its components, which could contribute to a longer life. Lifehacker lists the pros and cons of powering down your computer here.

8. Macs don’t get viruses.

Up until a few years ago, Apple even advertised this on its website. That was until a Trojan affected thousands of Mac computers in 2012 and the company changed its wording. Now, one in every five Macs carry some sort of malware according to a study conducted by Sophos, an anti-virus software-maker.

Have one to add? Comment below.

 

Sources:

http://blog.laptopmag.com/tech-myths-true-or-false

http://www.business2community.com/tech-gadgets/common-tech-myths-debunked-01093216

http://www.businessinsider.com/most-common-tech-myths-2014-8

https://www.surfeasy.com/blog/google-incognito/?lang=0