The story behind the Ellp categories

ellp-categories
Written by Janice
Writer


July 13 - (4 Min Read)

Ellp’s latest update brings a number of new infrastructural changes, including a new navigation menu and a sharing facility. However, the most noteworthy of them all would be the redefined categories. So far we’ve introduced you to Ellp and its automation mechanism – the Ellp cards. Now, it’s high time that we go into detail about the Ellp categories themselves, without which Ellp would be a huge pile up of disorganized cards/ disaster in the making. It’s not the case! Yet knowing where we want to take Ellp in terms of variety of cards and functionalities, it just cannot make do without categorization.

At the beginning of it all, back in September 2016, Ellp started out with 6 categories and 8 cards which have now been redefined into 4, covering: Productivity, Performance, Security, and Entertainment, allowing for easy navigation of the cards, which now add up to almost 30 cards. This not only facilitates a better user experience but also increases the visibility of the Ellp cards you really need and want to make use of.

 

This is not a trial. It’s yours to keep!

download-cta

norton-seal

 

So what do these categories cover?

Taking care of your PC, whilst handling multiple tasks at one go can be a headache at times – to say the least! We’ve all been there, I’m afraid! With the help of categories, you can have peace of mind, as you can easily find and activate the cards you need to perform the tasks for you. Let’s take a look at the 4 categories:

1. Productivity

It is so easy to get stuck wasting time on menial tasks or just wasting time in general, especially on social media. Busted! However, work still needs to be done, and the reality is that with such a busy life we lead, we all wish we could be more productive and get more done in less time. As the saying goes, time is money, so why not get Ellp to help, this way you make better use of your time and believe me, you’ll find yourself soaring through your daily tasks in no time! Here are Ellp’s top 3 productivity cards to help you declutter and increase your productivity, and stay focused:

  • When I’m spending too much time on Facebook, ping me
  • When I download the same file twice, let me know
  • When I download a document, save it to my preferred folder

ellp categories-top-3-productivity-cards

2. Performance

Sometimes your lack of productivity may not necessarily be your fault, it could be affected by your PC performance. It’s frustrating to get work done when your PC isn’t cooperating – maybe it takes longer to start up and runs slowly or takes an infinite amount of time to perform even the simplest and easiest of tasks. Don’t you worry, Ellp’s got you sorted! These are our top 3 performance cards, but there’s more from where these came from, so go ahead, download Ellp and get the full range.

  • When an application is slowing down my PC startup, alert me
  • When my hard disk is getting full, free up space
  • When it’s time, check my internet speed

ellp categories-top-3-performance-cards

3. Security

I guess PC security and privacy is a number one priority on everyone’s list, especially considering the amount of cyber attacks the world has experienced in the past couple of months. No one wants to have their personal credentials, whether bank account details or personal emails or files circling the web for everyone to see. So if you’re worried about having your PC and online activities being compromised, why not try these 2 Ellp cards:

  • When my email is involved in a data breach, alert me
  • When it’s time, perform a privacy cleanup

ellp categories-security-cards

Best part – there’s no need for you to break the bank, as Ellp is completely free!

The production of security cards takes much longer as this is a more complex task. For the time being, we’ve perfected the 2 cards mentioned above and we’re working on new security cards to be released soon. Stay tuned as they’re going to be awesome!

4. Entertainment

Everyone has his or her own way of chilling out after a hectic a day – maybe a drink after work with friends just to ease that stress or simply chillax at home listening to some music or watching that last episode from your all-time favorite series. With this in mind, we came up with solutions to save you those extra minutes, and jump straight into relaxation mode! that after a busy day can make a difference.

Our reasoning behind the cards is to give the fastest access to whatever you want to do to relax, as those couple extra minutes can make a difference after a busy day!

  • When I plug in my headphones, open my favorite application
  • When I download a song, save it to my preferred folder
  • When I plug in my headphones, open Spotifyellp categories-top-3-entertainment-cards

This is one of those articles where we help you navigate through Ellp more effectively and proactively so that you can experience the full functionality of the product and ease your daily routine.

 

This is not a trial. It’s yours to keep!

download-cta

norton-seal

 

With Ellp you don’t need to worry about boring PC tasks as it takes care of them for you, so you can focus on the things that matter most.

At times even we are surprised how creative are our users with applying these simple rules in their everyday tasks, so if you have some tips for others, feel free to share them with us. Remember to share this article with your friends, so that they can save time and money and be forever grateful to you 😉

How to Protect your Online Privacy and Security

online privacy and security - data breach card
Written by Janice
Writer


March 2 - (2 Min Read)

In today’s information age, technology is absolutely everywhere! It’s at home, at the office, in the palm of our hands, it’s signaling traffic messages, at your local eatery, it’s in outer space – it’s practically all around us! As technology progresses and becomes so readily available to us, this means we end up using it more and more to get things done. As great as it is, however, there are some pitfalls. With significantly more time spent online we’re bound to be exposed to the dark side of the internet and all the dangers that lie within its grasp. Whatever information we use online, is at risk of being lifted by hackers, identity thieves and unscrupulous marketers. So just as you wouldn’t like your neighbor snooping around your backyard, online personal information is no exception. But what can you do to safeguard your online privacy and security?

The bad news

Even though we all take precautions to safeguard such data, it seems like not a day goes by without someone having to go through the ordeal of having one of their online accounts being breached or compromised. An email breach can be very distressing since emails can reveal plenty of sensitive data such as passport, or credit card details. Also, let’s not forget how often we use them, they’re not just for sending emails but we also use our email address to signup or login to multiple online accounts such as DropBox, Facebook, Twitter and the like. The daunting part of being involved in an account breach, is actually recognizing that your account has been breached. As such, no one alerts you directly to let you know, you eventually somehow find out when it’s plastered all over the news, and by then it’s probably too late.

The good news

To remedy this, Ellp has teamed up with HaveIBeenPwned.com so each time your email is involved in a data breach, Ellp will alert you. This Ellp card will safely check all the accounts which are linked to your email address for possible breaches.It is advised that once notified of a possible breach you should immediately change your password to safeguard yourself.

I bet you’re feeling a lot more relaxed now, knowing that Ellp can help you take care of your online accounts. Before you get too comfy, make sure this Ellp card is switched on. If you haven’t tried Ellp yet, what are you waiting for? Download Ellp and stay on top of your online security.

download-ellp

Update: 2 more Ellp Cards in the Bag

Written by Kristina
Customer Success


December 15 - (4 Min Read)

We asked, you answered, and now it’s time to deliver! Firstly, we would like to thank you for all the feedback we received. We’ve found it to be very helpful, so much so that we’ve already started working on the cards you suggested!

This year we saw some of the largest data breaches ever! With the most recently affected company being Yahoo, whereby a 3-year-old security breach compromised over 1 billion user accounts, making it the biggest breach so far! In light of the data breaches and cyber attacks that marked 2016, we felt the need to close off this year and kick off 2017 on a high note. Hence, we present you with two brand spanking new cards, to Ellp you safeguard your privacy.

Here’s what’s in store for you this month:

When it’s time, perform a privacy cleanup.

Worried about having your PC and online activities at risk of being compromised? You’re not alone. Seeing as this happens to approximately 1 out of 5 people, it’s terribly concerning! With Ellp in the picture, however, there’s no to need to get your panties in a twist. You can safeguard your personal data without having to lift a finger. How? Simply select your preferred time, and switch the activation toggle on. Ellp will then automatically perform a daily scheduled, safe and effective privacy cleanup, which will reduce the possibility of having traceable personal data, such as browser files and file thumbnails, which are vulnerable to theft and phishing. Smile and bring out those choppers, cause you can now enjoy browsing safely and secure both your online and offline worlds with this awesome Ellp card!

When my email is involved in a data breach, alert me.

It seems like not a day goes by without someone having to go through the ordeal of having one of their numerous online accounts (such as DropBox, Facebook, Tumblr etc…) in risk of being breached and compromised. The question on everyone’s mind is: How would you realize that one of your accounts has been involved in a data breach? Detecting this is very difficult, and sometimes the only way of knowing is if someone tells you about it. Besides the fact that it’s already very difficult to detect such breaches, constantly monitoring your accounts is also very time-consuming and just another daunting task. This is certainly yet another job for Ellp to take off your hands! Our new Ellp card will safely check all the accounts which are attributed to your given email for any breaches. Ellp will immediately alert you when any one of these accounts is at risk so that you can change your password and protect your personal information. This service is being provided through a safe and reliable system by our friends at HaveIBeenPwned.com.

We realize that Ellp is still a bit empty right now, but be patient! We promise you that we’re constantly striving to enhance and improve our product, with many more automation rules coming your way!

Ellp is the gift that keeps on giving! To spice things up a little, we have a nice surprise for you… With the Christmas festivities just around the corner, we’ve got something wrapped up just for you, hidden inside Ellp’s latest version (Ellp 0. 9. 4). So go ahead and install Ellp and keep your eyes peeled 😳😳

Stay tuned!

200-1

download-ellp

Tech topics such as storage, Internet, performance, social media, privacy, security, devices, multimedia, applications, power and more, are at the heart of our discussions. Stay on top of your device experience and get the latest how-to articles and top insights from our Ellpers.

How to Rock Passwords

Written by Kristina
Customer Success


October 7 - (4 Min Read)

When it comes to passwords I think we all have a love-hate relationship with them… Am I right?

There’s no denying that everyone gets a bit paranoid at the thought of having their devices and online accounts hacked. This is where passwords come in. They help keep prying eyes at bay and our information secure. And as good as that sounds, there’s that daunting realization that over time we’ll probably forget some or all of the passwords we create…and the more accounts we have, in turn the more usernames and passwords we have to remember. It really is a vicious circle!

On the sweet side, passwords hold immense value to us, they help keep all our files, photos, precious memories, video files and other sensitive information private. They are the most popular form of authentication today, and are the first line of defense against cyber criminals and hackers.

Passwords guarantee that your confidential information stays private. It’s by far the cheapest and simplest way of protecting your information. That is, if you stick to the rules! You can’t possibly have a password like; ‘Open Sesame’ and expect your accounts and info to be safeguarded. There’s a bit of science and fairy dust that goes into password creation. The idea is to make your passwords bulletproof and free from vulnerability!

So what makes a password safe and unbreachable?

Good question! Here’s how:

1. Think Length

The longer the password, the better! The probability is that hackers will find it more difficult to crack just because it’s longer. Ideally, create passwords that are at least 8 characters long. A password doesn’t need to be complicated. The more complex it is, the harder it will be to remember. Rather than complicating life even further, why not type in two more letters, numbers or symbols to spice it up a bit.

2. Mix it Up

Having a lengthy password is all well and good, however you still need to turn up the heat, otherwise all the effort would be in vain! It’s recommended that you create a password that requires great effort to crack, so don’t limit yourself and start thinking in terms of phrases. Also, don’t just consider the alphabet. Keep it weird and include numbers, lower and upper case letters as well as special characters. Example: 2BorNot2B_ThatIsThe? (To Be or Not To Be, That is the Question – Shakespeare)

3. Forget the Dictionary

If the password was chosen from a dictionary, chances are that someone will eventually guess it! Remember that most hackers make use of password cracking tools that are efficient, and have a proven track record at processing letter and number sequences in order to guess the correct combination and crack the code…Your code!

4. Never Use the Same Password Twice

Off the top of your head, can you recall how many passwords you have? If you have less than 5 different passwords, the probability is you’ve been using the same password over multiple platforms. Guilty?! Don’t worry, been there done that. However, speaking from experience this calls for a red card. Even if you’re forgetful and have problems remembering passwords, never ever double dip! A different password for each device, account, and service is required in today’s digital world as hackers will most probably take advantage of this.

5. Change your Password and Don’t Share

It’s recommended that every once in awhile, you change your passwords. You don’t need to change your password every day or month, it’s not required that you change them so often. If you change them regularly, you’re lessening your chances of actually remembering the password. Changing your passwords every 3 to 4 months should be enough.

Also, don’t leave your passwords available for others to see, for example on a sticky note on your desktop. If someone hacks your device you’re toast! You might want to consider a password-protection software, whereby you can store all your login details in one place. Such software even offers the possibility of generating strong passwords for you and automatically logs you in. All you would need to remember is one master password. Isn’t that sweet?!

6. Ignore Security Questions & Use Different Browsers

Why ignore security questions might you ask? Well, with all our personal lives laid out in plain sight on social media platforms, hackers find it easy to access such information, which is needed to reset your password, eventually leading them to taking control of your account or device. If you must answer the security question, try to deviate by answering the question with a completely unrelated answer. For example, if the security question asks for your pet’s name, your answer might be your favorite Shakespeare quote.

It is also recommended to use different browsers for different activities. The main reason for such a suggestion is so that if your browser gets infected by malware whilst checking out a particular page, your bank or other personal account is not necessarily exposed, just because you use a different browser for that kind of activity.

7. Extra Protection

In some cases a good password is enough, however just to be on the safe side, it’s always a good idea to layer up with other means of authentication to keep intruders out. You could always up your game with some 007 top secret cryptographic credentials, which usually take form of machine-readable keys and codes, or bio-metric identifiers such as fingerprint scanners for that extra security. This will certainly shake up hackers.

Keep in mind that a little attention to security goes a long way. Remember a rockin’ password keeps hackers away.

Topics such as space, Internet, performance, privacy, security, devices, multimedia, applications, power and more, are at the heart of our discussions. Stay on top of your device experience and get the latest how-to articles and top insights from our Ellpers.

The Dark Side of Social Media

Written by Kristina
Customer Success


September 22 - (5 Min Read)

Social Media today has become an essential and fundamental part of our day-to-day lives. It’s evolved into such an important channel of communication, that for most, it’s a can’t-live-without commodity.

Whether it’s keeping up with the latest pins on Pinterest, professionally networking on LinkedIn, following and keeping tabs on your favorite A-listers on Twitter and Instagram or staying in touch with family and friends on Facebook, Social Media (SM) is always present. SM has become indispensable. Almost all products, services, events, groups, and the people you know are connected to one or more social networking platforms. So even if you’re trying to escape the clutches of SM, you won’t get too far. We use SM for practically everything nowadays. We’re glued! There’s no denying the fact, that the first thing you do when you wake up is reach for your device to check your SM accounts. It’s difficult to imagine a world without them. Right?!

As great as SM can be with all its communication abilities and benefits, it also has its pitfalls.

So, what’s the issue?

The problem is pesky Privacy and Security Issues…let me elaborate.

Since the beginning of the Internet-of-Things, there has always been this Privacy/ Security Monster lurking in the shadows. And because living life disconnected from the digital world is not really an option in today’s day, such confidentiality and privacy issues will persistently keep haunting us. Sharing your life and experiences online means exposing private information to not only friends and family, but also to the rest of the world. Anything that is on the Internet, is never truly private. That means that whatever you post or share online is open to hackers, identity thieves, and the like.

There are a number of ways that Internet crooks can use SM platforms to steal your information. This includes:

– Hijacking your Account

Basically, this is when a hacker logs into your account using illegally obtained login details. Such details could be achieved by keyloggers, pieces of software that run in the background, taking note of every keystroke made. Once they have access into your account they would have all your information at their disposal.

– Profile Cloning

When another person creates a Social Media account by using unprotected information, photos and other details taken from your existing profile. Impersonating you, the cyber-criminal then sends out follow or friend requests to all of your friends, who most probably will accept the requests, giving access to a whole lot more of information, which is then used to clone more profiles.

– Cross Platform Cloning

Cross platform cloning takes cloning to a whole new level. This happens when the cyber-criminal takes the information from a particular Social Media profile and creates fake profiles across  a range of Social Media platforms.

– Phishing

This usually involves the scammer posing as someone you might know and asking you to give out sensitive information through a link and once clicked your PC would become infected with malware.

While numerous Social Media platforms offer privacy and security settings against such threats, many individuals are not fully aware of how to correctly operate them, providing hackers with easy access to their personal information and accounts.

So what can you do to ensure Security and Privacy on Social Media?

1. Understand what information the site needs from you and how they use it

  • Thoroughly read the platforms terms and conditions especially their privacy policy.
  • Do not give out any more information than needed especially sensitive information.
  • Never use a work email – it is advisable that you create a separate one for Social Media channels.
  • Make sure you that you create a strong different password for every Social Media profile and change it regularly.

2. Think before you share

  • Be cautious of what you post on such platforms, keep in mind that oversharing might even give access to burglars.
  • You might also want to limit post visibility so that only your friends can see them.
  • Remember just because you can post, it doesn’t mean you should!

3. Tag, you’re it!

  • Tagging might seem harmless but it can also lessen privacy levels and widen the scope. So the more people you tag in a particular post or photo, the more people can see your post.
  • Keep tabs on all your tags and mentions – privacy scanners can help you with this.

4. Control visibility of app activities

  • Third party apps connected with Social Media platforms often pose a threat to privacy as they ask to access your information. Limit what kind of information you want to share, and what you’d rather keep to yourself. When in doubt, it may be best to uninstall such apps completely! Unless you can’t live without it.

5. Privacy Settings

  • Most Social Media platforms constantly change and update their privacy settings, so ideally every now and again you might want to take a look at them again to make sure that all your previous privacy settings are still saved the way you like them.

Whether you were just looking to close a few knowledge gaps, or a complete novice to Social Media, we’re glad you stopped by our blog! Stay plugged- in for more Ellpful articles.

Topics such as space, Internet, performance, privacy, security, devices, multimedia, applications, power and more, are at the heart of our discussions. Stay on top of your device experience and get the latest how-to articles and top insights from our Ellpers.