How to give a picture a transparent background using photoshop

Making the background of a picture transparent may become necessary if you want to place that picture within another picture. If the picture you want to place within doesn’t have a transparent background, the whole image may not look nice. Below is a short video on how to remove the background of a picture and make it transparent.

The steps are as follows;

Create a copy of the photo and use the copy for editing. 

Open the image with photoshop

To make the image editable, double click on its layer and click ok

Use the quick selection tool to select the part of the image that is not background.

Save the selection.

Next , with your selection still active, select the inverse.  This will select the background portion of the image.

Use the eraser tool to erase the background portion of the image to transparent.

Export the image as png with transparency enabled.

Watch the video for detailed process

5 of the Best Selling Games that Run well on a PC with 8gb RAM and 1gb VRAM

Fifa 14:

This game actually requires a computer with 2gb RAM and 256MB VRAM to run.

Excellent performance on an 8gb RAM with 1 GB graphics processor 

You can enjoy the game at over 30 fps even when graphics are set to maximum.

Dirt Rally 2

The recommended system specifications are core i5 processor or equivalent, 8 gb RAM and 8gb dedicated graphics.Runs good when resolution is set to 1280 x 720 or a little bit higher  for a pc with 8gb RAM, 1gb VRAM.

A O Tennis 2:

The graphics and gameplay is excellent. The game requires a Core I series processor and at least 8gb RAM to run. lts also needs at least a dedicated graphics processor of 2 gb RAM to run smoothly

It is however playable on  a PC with 8gb RAM and 1gb VRAM,when set to reduced resolution of 1280 x 720 in graphics options of the game.

Grand Theft Auto 5:

This is a very popular game that requires high processing power to run. The excellent graphics in gameplay means that it requires a dedicated graphics processor of 2gb or more memory  to run.The PC must be of core i 5 or equivalent with at least 8gb RAM. It has been tested to be playable on a pc/ laptop with 8gb RAM and 1gb graphics card. However at a reduced resolution of 1280 x 720 or lower. You may occasionally experience some lag but you will still enjoy the game

Need for Speed Shift 

Runs excellent all the time on an 8gb RAM  with graphics card installed. Actually a PC with 2gb RAM is sufficient 

To ensure that your pc games perform optimally at all times, regularly defragment your hard drive,registry,

 and RAM. Also, regularly clean up junk files that have accumulated due to system usage over time. There are many software that can automate these processes for you.

Watch the video to see the games in action

Your Internet Safety Tips

Browsing the internet is fun. But it can also be a source of nightmares. Below are things you should be very careful of when online;

  1. Be very careful how you publish your personal information. Be very private with your location, email address, phone number, date of birth etc. Make sure websites that ask for personal information are trusted ones that won’t misuse the information to bring you harm.
  2.  Be careful of images & videos you post. Make sure you examine and censor them before uploading online. Note that once online these things are very hard to delete.
  3. Make sure messages you post online don’t contain abusive, defamatory, hate speech and the likes. It can get you into serious trouble.
  4. If you are a blogger, be careful what you publish. Your integrity is staked on this. Always research, verify information or article before you publish online. You can be held liable for misinformation.
  5. If you make a friend online and want to meet the person physically, be security wise. It is advisable you do not go alone. 
  6. Avoid adverts that are too good to be true. Hackers use this trick to get private information such as passwords from victims.

Phishing

Have you ever visited a website that looks like the original but on carefully observation its fake, if so, someone might be trying to steal your personal information such as login details.

What is Phishing

Phishing is a process of trying to find private information such as PINs and passwords by trickery. It is achieved creating a fake website and make the login page look like the original. On you inputing your login details, they are stored by the hacker and used for nefarious activities.

For instance if it was a fake facebook page that you entered your login details, the hacker will have access to your account and can use it to send unauthorized messages, adverts, close your account etc. If it was a fake internet banking login page; on inputting your login details the person may now have access to your account, view you credit information and even withdraw money.

What to do if you have been Phished

  1. Run antivirus software in your computer device
  2. Change the password of the affected account.
  3. If you cannot access your account call customer care agent .

How to prevent being phished

Check carefully the website structure/login page that it is exactly the original.

Ensure the web address uses https and not http.

Web browsers such a Google chrome may issue a warning if it suspects phishing.

How to Respond to Cyberbullying

What is Cyberbullying 

First of all I will start by defining Cyber Bullying. Cyber Bullying is when someone sends abusive or insultive words or messages to you by electronic means. For instance, someone can send threats or  insultive words to your phone through your social media accounts such as facebook, Twitter, WhatsApp, Text message, Anonymous or non anonymous phone call and so on. Anyone can be cyberbullied, however this phenomenon is usually common among popular figures, such as sports men and women, politicians, religious figures and so on.

How to respond to Cyberbullying. 

The best way to respond to Cyberbullying is to block the person on the online platform which he/she uses to send those messages. For example if you are being bullied through a phone call you can block the  person’s number or numbers. This will prevent further calls or text messages from that person. Similarly, on online social networks such as Twitter and Facebook you can block any person from sending messages to you. The process is easy. All social networking sites have instructions on how to block and unblock accounts of people from sending messages to you.

If the Cyberbullying is done anonymously, or the person uses fake accounts to send messages, take a step further by reporting the situation to the administrators of the online plateform.