Other

How To Get Free Cash (CASHBACK) While Shopping | Rakuten | Guide | Promo

Introduction

Rakuten.com is a well-known marketing business that is paid by companies to direct customers to their website. Rakuten supports many shops including: Bed Bath & Beyond, Samsung, Forever 21, Best Buy, Macys, Old Navy, Gap, etc. Rakuten makes their money when customers go Continue reading “How To Get Free Cash (CASHBACK) While Shopping | Rakuten | Guide | Promo”

Maths

How to Calculate the Area of a Circle? | Geometry | Maths | Tutorial

The area of a circle can be derived by the formula A = πr2. In this tutorial you will learn how to apply this formula to an example. For explanation on how this formula works read Continue reading “How to Calculate the Area of a Circle? | Geometry | Maths | Tutorial”

Maths

Area of a Circle – Proof | Geometry | Maths | Tutorial

You may not know this but there is no way of calculating the area of a circle exactly. The area of a circle is calculated by splitting the circle into many right-angle triangles and then calculating the area of these triangles. As you know triangles have straight lines and circles are curved therefore Continue reading “Area of a Circle – Proof | Geometry | Maths | Tutorial”

Maths

BODMAS – The Order Of Mathematical Operations | Maths | Tutorial

You may come across a simple maths questions with a mixture of brackets, orders (powers), division, multiplication, addition and subtraction all at once. You may think to yourself where do I start, this is where Continue reading “BODMAS – The Order Of Mathematical Operations | Maths | Tutorial”

Maths

Maths Magic Trick | Maths | Algebra | Tutorial

This post will show you how you can turn a little bit of maths in to a magic trick that you can try with your friends or family. Continue reading “Maths Magic Trick | Maths | Algebra | Tutorial”

Technology

Phishing Attack – Facebook Post (Example) | Cyber Security | Social Engineering

With more people now using social media other than email phishing attacks through social networks such as Facebook, twitter and Instagram are now on the rise. These posts are especially difficult to judge as they may have been shared or liked many times, making it appear popular or genuine due to the popularity of the post. Continue reading “Phishing Attack – Facebook Post (Example) | Cyber Security | Social Engineering”

Technology

Phishing Attack – Text Messages (Example) | Cyber Security | Social Engineering

Text message phishing attacks have evolved over time with the advancement of security technology. OTP (One-time Password) is currently the most commonly used 2FA (Two-Factor Authentication) technique. Most banks and many retail websites now require that in addition to you logging in with a password, Continue reading “Phishing Attack – Text Messages (Example) | Cyber Security | Social Engineering”

Technology

Phishing Attack – Email (Example) | Cyber Security | Social Engineering

Phishing attacks are very common through email, it is very likely that everyone who has an email account may have come across an email trying to social engineer you for data. In this guide we will look at an example of how a phishing attack is executed through email. Continue reading “Phishing Attack – Email (Example) | Cyber Security | Social Engineering”

Technology

Phishing Attack – Phone Call (Example) | Cyber Security | Social Engineering

In this guide we will look at one example how a phishing attack can be carried out through a phone call. We will also look at what could happen to our data if the attack was successful and how we could have prevented this. More Continue reading “Phishing Attack – Phone Call (Example) | Cyber Security | Social Engineering”