Category Archives: Uncategorized

Moving from Apple-to-Android? Read this article first !


Apple-to-Android Upgrade Comparisons 

 Bob is a happy owner of a new Apple phone (iOS 10 release). He has chosen it since it is “the biggest iOS release ever”, according to Apple. His sister Mary has decided to pick something different, namely Google’s Android phone. Now, Bob and Mary are wondering who made a better choice.

There are several factors they both must consider to determine which of the two options will be better for them.

Mary is happy when she finds out that Bob had to pay a lot more for his Apple phone than she did for her Android. However, iOS has a more uniform, stylish and simple interface than Android. As interface matters to Mary as well, she decides that her next phone will be made by Apple. She will wait though until she saves more money. If cost is of greatest importance to you, then you should probably stick to Android.

With Android phone, Mary gets more apps than Bob does on his Apple phone. If you are a gamer like Bob (which does not really matter to Mary that much), you will be happy to know that the best mobile games will appear on iOS but will not always come to Android. However, what matters to Mary is that the design of iOS apps is more uniform and stylish. So Android may have more apps but Apple has a higher variety and quality of them.

The Apple App Store offers advantage over Google’s Play Store in terms of its recommendations for new apps, sales on expensive apps and games and simpler interface. Apple Pay allows you to pay for apps and you get increased security by confirming downloads with your fingerprint.

Unfortunately, with all of its advantages, Apple is more restrictive as you can only stick to its own app store. With Android you are able to access alternative app stores but at the risk of being infected by malware. This particular advantage does not really matter to Bob and Mary as the apps’ and interface quality is something that they really care about. If you are interested in getting access to additional sources of apps, then Android might be a better option for you.

Android phone batteries can easily outlast Apple’s because they are bigger. In addition, Android phones can be very quickly charged whereas Apple phones cannot. These features make Mary very happy.

If you want consistent and timely software updates and security patches, then Apple’s iPhone is the only choice for you as you will not have it with any other.

As Mary continues to compare her Android phone to Bob’s Apple, she quickly realizes that her phone is much more customizable. For instance her default keyboard option is more developed and you can set third-party apps for things that are simply locked down in iOS. Again, it is something you may want to consider when choosing your system.

Mary also sees that her phone is great for getting the root access and complete control over her device as well as for determining how the operating system will load up on it. Bob’s phone cannot really do that. However, this is not something that Mary is particularly interested in so the type of phone Bob has still matters to her more.

Some of the other areas where Mary’s Android takes precedence over Bob’s Apple are email, cloud storage, photo backup, connectivity and maps. However, Bob’s iPhone cannot be matched on the arena of calls and messaging, accessories or peripherals, security and camera options; doubtless it is the simplest platform to use.

Therefore, Apple to Android (and vice versa) upgrade comparisons are meaningless as we end up comparing apples to oranges. Everything really depends on you and what is important to you. So it is Mission Repair Centre’s recommendation that you just pick what matters most to you and choose the phone with the greatest number of pros.

Darius Romanek

Mission Repair Centre Team 🙂

How Does a Normal Hard Drive Differ from a Solid State Drive ?


How Does a Normal Hard Drive Differ From a Solid State Drive?

 We are all used to traditional spinning hard drives or HDDs. However, solid state drives or SSDs which are a newer technology are now becoming just as prevalent on the market as traditional ones. Therefore, it is only natural for you to ask yourself which one might be the right choice for you.

Both HDDs as well as SSDs utilize non-volatile memory or NVM for long-term data storage. What this means is that your information is retained even after your storage device has been turned off.

Knowledge of different mechanisms and methods by which they read, write and store data will help you decide which one to choose.

In essence, data storage on HDDs involves motion whereas it is motionless on SSDs. HDDs write data to a disc called a platter via magnetism. These platters spin fast and have billions of sections where data can be stored. Data is written to these sections by a read/write head which swings over the discs while supported by mechanical arms. In turn, SSDs use a motionless technology called NAND flash memory where data is stored in cells.

HDDs store much more data and are cheaper than SSDs.

How about the speed at which HDDs and SSDs read and write data? Well, HDDs will quickly read files which were written sequentially. As the amount of data stored increases, files start to be written across multiple sections (a process called fragmenting) leading to longer read times. SSDs will always read files quickly as cells are designed to be accessed simultaneously. As a result, this process is much faster in SSDs than any HDD could possibly achieve regardless of its level of fragmentation. Unfortunately, SSD cells do wear out but the good news is that the time it takes in order for it to happen is quite long. During this time you will probably upgrade your SSD due to obsolescence or a desire for more storage space.

SSDs are far more durable than HDDs as they lack mechanical parts. Therefore, if you carry a laptop or some other portable device, your risk of potential data loss due to physical damage is reduced if your machine comes equipped with SSD rather than HDD.

In addition, SSDs generate far less heat than HDDs drastically reducing the amount of power drawn by your device and leading to less chance of overheating and quieter performance.

High end HDDs can give you up to 8TB of storage at the prices you could still afford but with SSDs you are looking at between 128GB and 500GB of storage for a reasonable price.

So which one should you pick? If speed, power needs or portability are what you have in mind, then probably you should choose SSD. Conversely, HDD will probably be a better choice if you require a stationary system with a lot of memory.

Major disadvantages of SSDs which are cost and storage capacities will eventually improve in time, as these technologies evolve.

Darius Romanek

Mission Repair Centre Team 🙂

Save your Valuable Data from Online Hackers and Phishers

smoke from laptop

How Could You Keep Your Data Safe From Online Hackers and Phishers  ?


Did you ever wonder what might be the difference between hacking and phishing? Well, hacking is an extremely high tech attack which requires you to take certain precautions whereas phishing is a low tech attack requiring just a dose of common sense to thwart.

So what does the hacker do? Essentially, he or she gains unauthorized access to your computer once he or she knows the address of your computer (your IP Address). You can think of an experienced hacker same as you can think of an experienced hunter in the forest full of game of different sorts. Just like a hunter will spot and target an animal in the forest, hacker will target your computer once he locates you in the ‘internet forest’ of network computers.

How then could you protect yourself from hackers? The best method is to use or install a so called “firewall”. So what exactly is a firewall? Well, it is a piece of hardware or software or both designed to make your computer “invisible” on the Internet. How does a firewall work? In essence, it blocks the ports of entry to your computer.

Some other anti-hacking operations include making your passwords harder to hack (by including upper and lower case letters, numbers and special characters as well as by increasing their length and complexity), changing your passwords regularly (and perhaps using password management services like Dashlane or PasswordBox to help you keep track of hard passwords), clearing your browser history, avoiding to use free Wi-Fi (unless really needed), using HTTPS (hyper-text transfer protocol secure) to add an extra layer of security and encryption while online as well as to authenticate websites, never opening unknown email attachments (which may contain viruses), trying not to use public computers (the more users the greater the likelihood of viral infection), using anti-virus protection and using thumb or flash drives carefully (as they can also spread viruses easily across computers and networks).

In addition, do not link accounts, keep sensitive data off the cloud and ignore alarmist webpages announcing that there are “critical errors” on your computer as these messages come from scammers.

How about phishers, you might ask? These are part of the latest identity theft scam using fake email messages. Therefore, phishers are like fishermen trying to use bait which reminds fish of its food, whatever it might be. Just like fish bait, these email scams are meant to look real to you. So what are these phishers ‘fishing’ for? They may want you to give up some sensitive personal information such as your credit card, bank or some other sensitive financial and personal information. Once they have it, they steal your identity and can potentially incur thousands of dollars’ worth of debt in your name. Hence, don’t take the bait.

So what could you do about phishing attacks? First, do not reply to any email asking for your personal information, no matter how legitimate it looks! If they include a telephone number for you to call, don’t.

Phishers also like to use scare tactics, threatening to disable an account or delay services until you update certain information. Don’t fall for it! Reading a commercial website’s privacy policy to check whether or not it will sell its mailing list to another company may help you reconsider whether or not you will want to sign up to the site thus stopping some of the spam you are receiving daily. You should also watch out for generic looking requests for information as fraudulent emails are often not personalized. What are some examples of generic looking requests? Some examples are phishing emails beginning with “Dear Sir/Madam” or coming from a bank with which you don’t even have an account.

Some other things you might want to do in order to prevent a phishing attack are never submitting confidential information via forms embedded within email messages or using links in an email to connect to a website of which authenticity you are not certain as well as maintaining effective software to combat phishing such as Webroot Internet Security (which automatically detects and blocks fake websites and authenticates major banking and shopping sites).

Darius Romanek

Mission Repair Centre Team 🙂