Thursday, June 29, 2023

Tech Info Update 2023: All you need to know about NFC tags and stickers #drmobileslimited #nfc #virtualcard #businesscard #aucklandrepair

NFC (near field communication) is the technology that allows two devices — like your phone and a payments terminal — to talk to each other when they're close together. NFC is the technology that enables contactless payments.

Near Field Communication, known as NFC, may sound like a dry, technical specification. In many ways, it is. However, the applications of NFC are worth considering.
Android smartphones have had access to NFC for many years, while Apple's iPhones previously had a feature-limited version. However, both platforms use the wireless technology for contactless payments, headphone pairing, and some level of automation.

 
What is NFC?

Near Field Communication (NFC) allows wireless communication between two electronic devices close to each other. Officially, NFC can support distances of up to 1.5 inches apart, but it can be up to four inches in practice.

Generally, this comes in two forms; device-to-device communication or readable tags. While it is possible to make two devices interact via NFC, there are generally better methods of achieving this either through physical cables or other wireless technologies like Bluetooth or Wi-Fi.

That said, contactless payments are facilitated via NFC. So, when you walk into your local store and pay with your phone using Google Pay or Apple Pay, the transaction is initiated via NFC.

The primary interaction method, then, is between a device like a smartphone and a readable NFC tag. These tags are small, cheap, and unpowered. This is made possible because the reading device, often your smartphone, can generate a Radio Frequency (RF) field that will power the tag.

Can you use NFC stickers with an iPhone?
How to Use NFC on iPhone
Using NFC on iPhone is incredibly simple. All you need to do is bring your iPhone into close proximity with the NFC device or tag. To use NFC on iPhone: If you're using an iPhone XR or later, simply wake your iPhone to turn on the screen and Background Tag Reading will be enabled.

How do I use NFC on my iPhone 13 Pro Max?

From iPhone 12 to current iPhone 13, there is no need to turn on or off anything in control center (there is no setting actually) for NFC. Just hold your phone over an NFC Tag and your phone should automatically read it.

What can you do with NFC tags?
Here are the top 10 uses for NFC tags.
No.  1 NFC tags as virtual business cards.
No.  2 Launch a website with your NFC tag.
No.  3 Lock/Unlock your door with NFC tags.
No.  4 Use an NFC tag to share photos and videos.
No.  5 NFC tags for making payments.
No.  6 Connect to your car with an NFC tag via Bluetooth.

Can you put a NFC sticker on your phone?
What is the NFC sticker on Your Phone and How Do You Use It ...
NFC Sticker is used in a variety of applications, such as contactless payments, sharing data, and connecting to NFC-enabled devices. NFC is built into all the latest Android phones and tablets and is also available on some iPhones and iPads.

What is the point of an NFC sticker?

You can use NFC tags for contactless payments, sharing contact information as a business card, location tracking, identity verification, access control along with hundreds of other uses and applications.

Can you reuse NFC stickers?

NFC Tags are rewritable by default. Potentially, the NFC Tag can be rewritten endlessly. They are guaranteed to be rewritten up to 100,000 times (depending on the IC). However, you can also block them, so that they will no longer be rewritten.

Can NFC stickers get wet?
High quality, durable and heat resistant NFC Tags. They can be applied to metal surfaces and are fully waterproof.




Can you write NFC with an iPhone?
In summary. With the upgrade to iOS 13+, all iPhone 7 and newer can read and write an NFC Tags. The NFC behavior of iPhones updated to iOS 13 (and later) is very similar to that of Android smartphones: for NFC Tag programming, an application is required (as for Android);

What is the best NFC tool app for iOS?

Best Overall: Decode - NFC Scanner
Users can launch scans from both within the app and the quick launch menu. Force touching the app icon on the home screen to launch a scan brings you the most similar experience to scanning NFC on Android on iOS.1

How do I set up NFC automation on my iPhone?
To create a shortcut, follow these steps:
- Open the Shortcuts app on your iPhone.
- Select 'Automation' at the bottom of the screen.
- Now tap the '+' icon at the top of the screen.
- Now select 'Create Personal Automation'
- Now you can scroll down and select 'NFC'
- Scan and names your NFC tag.

How long do NFC tags last?
10 plus years.  The NFC (near field communication) tag is made up of an antenna and a small passive IC chip usually on a PET substrate with an adhesive backing; no power source required. Tags have a lifespan of 10 plus years

What are the advantages and disadvantages of NFC tags?

NFC pros and cons. While NFC isn't free from security weaknesses, it's more difficult for hackers to access than many other types of RFID because NFC sends information through magnetic field induction, and the field fades faster. However, NFC's short range can be a disadvantage in various use cases.

Can a magnet erase an NFC tag?

No. NFC relies on alternating magnetic (and electrical fields) changing 13560000 times per second. A magnet represents a steady field, or at most one changing at the comparatively low rate at which you could physically move something. There will be no interference in terms of the actual signals.


Contact us today if you want to increase your retail client base using NFC technology!
Dr Mobiles Limited
1, Huron Street, Takapuna
Auckalnd 0622, New Zealand
Toll: 0800429429
Tel: +6495515344
www.drmobiles.co.nz, drmobilesnz(a)gmail.com

Wednesday, June 28, 2023

Chat GPT update 2023: All The ChatGPT Updates To Know About #aucklandrepair #drmobilesnz #drmobileslimited #chatgpt



ChatGPT is what everyone is talking about right now. The artificial intelligence (AI) powered chatbot, created by OpenAI, has become the fastest-growing consumer application in history, crossing 100 million users in just two months. As the number of users continues to rise, OpenAI has been busy with introducing unique updates to make ChatGPT more accurate in its responses and factually robust.

The massive popularity of the chatbot has been indeed astonishing. According to a UBS study, the AI-powered chatbot clocked 13 million unique visitors per day in January. TikTok, one of the world's most famous social media apps, took around nine months from its launch to hit the 100 million mark in monthly active users. Meta-owned Instagram, which is almost every month coming up with new updates and features, took two-and-half years to reach the number.

Before we check out the updates, let's try to know what it is about this chatbot that makes it stand above the rest and challenge the authority and dominance of search engine behemoth Google.




Why is ChatGPT famous?

Users are turning to this tool for its obvious utility: it is an AI that can generate human-like responses to almost any question the user may have. The answer is often well-structured and loaded with precise details.

Built on Generative Pre-trained Transformer (GPT), ChatGPT is essentially a neural network learning model through which a machine can be trained to perform tasks that fall within the purview of natural language processing (NLP).

To put it simply, the GPT enables this new chatbot to respond in a conversational way, and the neural network is essentially a learning algorithm which makes the chatbots mimic the brain and understand human languages as they are spoken or typed.

Yet, despite all the hype surrounding it, this tool is still a work in progress.

Many have found problems with its answers, especially with regard to factual accuracy, since the information in it is limited to 2021. This means that the chatbot cannot give accurate answers to queries that would be connected to events after it, such as 'who won the FIFA World Cup 2022?' and similar questions.

Also, there are concerns over the manner in which it can be abused into giving answers it is programmed not to, such as generating ransomware or phishing emails — two of the biggest dark sides of the AI chatbot that researchers have been able to point at.

And, that's why updates become all the more important before it grows into the go-to search engine or digital assistant.

Wednesday, June 21, 2023

Tech Update 2023: Ten types of Long Range Wi-Fi Antennas your can make at home #drmobileslimited #iphonerepair #aucklandrepair

Dr Mobiles Limited (Since 2011)
1, Huron Street, Takapuna
Auckland 0622, New Zealand
Toll: 0800 429 429
Tel: +6495515344
drmobilesnz(a)gmail.com


Ten types of Long Range Wi-Fi Antennas your can make at home!!

Why spend big bucks on Wi-Fi extenders, just build a budget-friendly Wi-Fi antenna at home?

While modern Wi-Fi antennas allow you to use the fastest speeds within your ISP's package, they can be quite expensive. Luckily, you can always turn to DIY projects to improve your connection signal without spending too much money.

The current and more popular model is the dual bank WiFi dongle.

A dual-band Wi-Fi dongle is a small device that provides wireless connectivity to devices that don't have built-in Wi-Fi capabilities. It plugs into a USB port and allows the device to connect to Wi-Fi networks.

The term "dual-band" refers to the two frequency bands supported by the dongle: 2.4 GHz and 5 GHz. These frequency bands are used for wireless communication and have different characteristics.

The 2.4 GHz band is more common and widely supported. It provides good range and can penetrate through walls and obstacles easily. However, since it is widely used, it can be crowded and susceptible to interference from other devices like cordless phones, microwaves, and Bluetooth devices.

The 5 GHz band offers faster speeds and is less crowded, resulting in potentially better performance. It is especially useful in environments with many Wi-Fi networks or interference from other devices. However, its range is generally shorter compared to the 2.4 GHz band, and it may have more difficulty penetrating through walls.

By having a dual-band Wi-Fi dongle, you can connect to both 2.4 GHz and 5 GHz Wi-Fi networks. This allows you to take advantage of the benefits of each frequency band and choose the one that provides the best performance in your specific situation.


Check out these 10 DIY long range Wi-Fi antennas you can make on a shoestring budget. Note that some of them may require you to obtain a license from the FCC (or relevant authority governing wireless devices in your territory), so do check before making yours.

1. Homemade Wi-Fi Antenna

2. DIY Tin Can Wi-Fi Antenna

3. DIY Long Range Wi-Fi Antenna

4. Wi-Fi Signal Catcher

5. Dual Band Wi-Fi Repeater

6. Wi-Fi Scanner Made Using ESP8266
https://www.youtube.com/watch?v=Wn71WxR8YYs

7. Long Range Wi-Fi MSP/PPM

8. Ultra-Long Range Wi-Fi Router

9. From Scrap to a 2.4GHz Wi-Fi Antenna

10. DIY 1KM Wi-Fi Antenna

 Boost Your Wi-Fi Range

There you have it, 10 DIY Wi-Fi projects you can make for cheap and enjoy a long distance internet range. Most of the projects will only require you to invest in basic hand tools and a few locally available materials.

You're already paying a premium to your ISP; it only makes sense to get the most out of the subscription. Now is the right time to maximize your Wi-Fi potential.

Read the rest of the article here....


Friday, June 16, 2023

​Scam Warning 2023: Phishing Attack, #iphonerepair, #aucklandrepair, #iPadunlock, #drmobileslimited #northshore

Scam Warning 2023:  Phishing Attack


According to Wikipedia, phishing is a fraudulent attempt to obtain sensitive data by impersonating oneself as a trustworthy entity.
Phishing Attack 🎯

Much like any other kind of fraud, the perpetrator can cause a significant amount of damage, especially when the threat persists for an extended period.

Phishing has a list of negative effects on a business, including loss of money, loss of intellectual property, damage to reputation, and disruption of operational activities. These effects work together to cause loss of company value, sometimes with irreparable repercussions.

To fully understand the impact of phishing attacks on businesses, you would need to get a grasp of the common types of phishing scenarios that exist. From then on, it would become easier to comprehend the measures to avoiding and preventing these attacks.


What is a Phishing Attack?

Phishing is a typical type of social designing assault intended to gather client data, for example, login certifications and Visa data. At the point when a casualty opens an email, text, or instant message subsequent to being hoodwinked into doing as such by a culprit acting like a dependable source, it happens. The beneficiary is in this manner fooled into clicking a hazardous connection, which might introduce malware, lock the framework as a feature of a ransomware assault, or uncover private data.

Phishing is additionally consistently used to get sufficiently close to corporate or administrative organizations as a component of bigger assaults like high level determined danger (APT) occurrences. In the last situation, workforce is compromised to evade safety efforts, engender malware inside a protected setting, or get to private data.

As well as experiencing huge monetary misfortunes, an organization that is the casualty of such an assault habitually has its piece of the pie, notoriety, and client certainty decline. A security emergency from which an association will experience difficulty recuperating could result from a phishing endeavor, contingent upon its expansiveness.

History of Phishing

In the 1990s, programmers began using fake messages to "fish" for data from unwary clients, leading to the expression "phishing." Phishing, with a "ph," acquired the name since these early programmers were habitually alluded to as "phreaks." Phishing messages expect to entice beneficiaries into taking the trap. Furthermore, the shopper and the association are both in a difficult situation on the off chance that they get dependent.

Phishing's set of experiences traces all the way back to the 1990s, similar to those of numerous other well-known dangers. At the point when AOL was a notable substance stage with web access, programmers claimed to be AOL laborers in phishing and texting efforts to misdirect clients into unveiling their login data so they could assume command over their records.

Aggressors utilized ledgers during the 2000s. Clients were fooled into revealing their ledger data through phishing messages. The messages had a connection to a malignant site that impersonated the real financial site, albeit the malevolent site's space was a nearby form of the genuine site's name (e.g., paypai.com rather than paypal.com). Afterward, the assailants continued on toward different records, remembering those for eBay and Google, to take advantage of the qualifications to take cash, participate in extortion, or spam different clients.


Phishing attack in action

The foundation subtleties of a casualty's private and expert history might be assembled by phishers utilizing open sources, especially informal communities. The names, occupations, email locations, and interests and diversions of the potential casualty are completely assembled from these sources. When this data is gotten, the phisher can use it to make a reliable fake message.

Messages that the casualty gets regularly appear to be from notable individuals or associations. Assaults are sent off by means of connections to rebel sites or noxious connections. Aggressors every now and again make fake sites that appear as though they are controlled by respectable associations like the casualty's bank, work environment, or establishment. Aggressors attempt to accumulate delicate information from these sites, like installment data or usernames and passwords.

Unfortunate phrasing, erroneous utilization of typefaces, logos, and designs can make certain phishing messages simple to detect. In any case, a ton of online law breakers are getting better at making correspondences look certifiable, and they're using master promoting methodologies to survey and upgrade the progress of their messages.

Signs of Phishing

Dangers or a Sense of Urgency

Messages that compromise adverse results ought to constantly be treated with distrust. Another procedure is to utilize criticalness to support or request prompt activity. Phishers trust that by perusing the email in a rush, they won't completely examine the substance and won't find irregularities.

    Message Style

A quick sign of phishing is that a message is composed with unseemly language or tone. In the event that, for instance, a partner from work sounds excessively relaxed, or a dear companion utilizes formal language, this ought to set off doubt. Beneficiaries of the message ought to check for anything more that could show a phishing message.

    Peculiar Requests


It could be an indication that an email is unsafe on the off chance that it demands strange way of behaving from you. For example, on the off chance that an email demands the establishment of programming and implies to be from a particular IT group while truly, the IT division frequently handles these undertakings halfway, the email is most certainly false.

    Language Mistakes

Language blunders and incorrect spellings are further signs of phishing messages. For active messages, most organizations have introduced spell browsing in their email programs. Subsequently, messages with spelling or language slip-ups ought to raise warnings since they probably won't come from the source that is being recognized.

    Varieties in Web Addresses

Looking for jumbled email locations, URLs, and area names is one more straightforward strategy to recognize likely phishing assaults. Checking a prior message that matches the source's email address is a fantastic model.

Prior to clicking a connection in an email, the beneficiary ought to constantly drift over it to see the connection's objective. At the point when an email seems to have come from Bank of America yet the email address' space doesn't contain "bankofamerica.com," it is probable a phishing email.

    Interest for Identification, Payment, or Other Personal Information

Aggressors habitually use messages that look legitimate to connection to false login locales that look genuine. A login box or a solicitation for ledger subtleties can be found on the fake login page. The beneficiary shouldn't tap the connection or enter their login data in the event that they didn't anticipate the email. Beneficiaries ought to go promptly to the site they accept is the email's shipper as a safety measure.

See here for the article:
https://www.wallarm.com/what/types-of-phishing-attacks-and-business-impact