How to Hard Reset a Windows 10 PC the EASY WAY

What is hard reset 

Hard reset means the process of returning your device to factory state. Which is the same state your device was when you purchased it brand new. Think well before you do a hard reset because the process is irreversible. You cannot undo the reset once done. Any files stored or installed on the device are deleted in the process. If you want a hard reset, you need to follow the instructions for your device.

Why a Hard Reset is Necessary

A hard reset is necessary if your device becomes unstable, unusable or if its security features have been severely compromised. Also if you are going to sell your used phone or give it permanently to someone, it is necessary you do a hard reset. 

How to Hard Reset Windows 10 PC

Your Next Gen Windows device likely offers more than one way to reset it.

 The following method describes how to hard reset Windows 10 PC when you have access to it.

1. Click the start button. In the Start menu, click on Settings or PC Settings, depending on your operating system version.

2. In Windows Settings, click on Update and Security.

The Windows Update screen appears.

3. Click on Recovery in the menu on the left side of the Window.

4. Click on the Get Started button in the Reset this PC section at the top of the window.

At this point, you may be prompted to insert the original installation CD on which you received Windows 10. But in most cases you don’t have to. Windows 10 usually stores a recovery copy in the harddrive.

Windows will offer you two choices;

a.      Keep my files:

b.      Remove everything: 

Option a means that files stored in data folders such as documents folder will be preserved intact after the reset. 

Option b means that all files and apps will be removed during the reset.

               5. Select the reset option that best suits your needs.

6. When you are ready to proceed, click on the Reset button.

7. From here on follow the prompts. If you receive a prompt asking you to continue to Windows 10 or troubleshoot, click continue to windows 10.

8. Hard resetting your windows 10 PC will take a while.

How to Soft Reset Android and iPhones

Soft Reset android & iPhones

How to Soft Reset Android Phones

Soft reset of an Android device varies between manufacturers. However, one of the 2 methods listed below should work;

Method 1;   Press and hold the Power button until you see a power off and restart menu. Click power off then wait a few seconds then power on the phone again.

Method 2:  if the first  method doesn’t  work. Press and hold the Power button and keep pressing until the phone powers off, wait  for about 10 seconds then turn the phone back on

How to Soft Reset iPhones

Soft resetting  your iPhone varies based on the model. However the following method explained below should work;

Method 1  Press and release the Volume Up button, then press and release the Volume Down button, and then press and hold the Power button until the Apple logo appears on the screen. Wait for the device to restart

Method 2. Press and hold the Power button. While still holding it, press and hold the Volume Down button. A power off prompt comes on, on the screen. Select it to power off the device. Wait ten seconds and press the Power button to turn it back on.

Method 3.  Press and hold the Power button, and, while still doing that, press and hold the Volume Down button. Continue to hold both buttons as the iPhone powers off. Release both buttons when the Apple logo appears on the screen. Wait for the device to reboot.

What is Soft Reset and How to do it.

A soft reset is the same as turning off the device then turning it back on. It does not wipe programs, data, or malware but can correct the device if it becomes unresponsive or crashes.

In some devices without soft reset capability, cutting off power to the device and removing the batteries, then restoring power to the device and fixing back the battery will soft reset the device.

A soft reset should be the first step to take when your computer device malfunctions.

For instance, a computer that suddenly shows the blue screen of death can be partially or fully fixed with a soft reset. In any case a soft reset will enable you to put on the computer and then deal with the issue causing the blue screen to appear.

Soft Reset of Windows computers

Nearly all  Windows computers can be soft reset by holding down the Power button for about ten seconds to shutdown. After the device shuts down, wait about ten seconds and press the Power button once to restart the computer.

Soft Reset of Mac computers

Hold down the Power button for about five seconds, to completely shut down the Mac PC. Wait a few seconds, and press the power button once again to reboot the Mac.

For some Macs pressing and holding the Power button may display a menu; press R to reboot directly, rather than shutting down and restarting the device.

How to Bank Online Safely

Online banking is unavoidable despite its security concerns. We are in the 21 century and online banking is smarter and easier banking. Here are some things you can do to improve your security as you bank online:

1. Use a strong password

 Your online banking password should be unique and strong. Commit to memory, that is remember it off hand. Do not store it in your phone or computer. If you like, you can write it on a piece of paper and store it in a safe place.

2. Choose a random PIN for your ATM   

It is good practice to choose a random Personal Identification Number (PIN) for your ATM card and/or phone identification. The PIN should not be related to any information that you know such as your name or other passwords. Do not write down your PIN or store it in your computer or phone. Do not tell your PIN to strangers, bank employees and people you don’t trust.

3. Log in to your online banking using trusted devices

Log in to your online banking using your phone or personal computer. Make sure the security features of your phone and computer are up to date. It is best to use your personal internet/ WiFi connecting. Avoid public WiFi networks because they can be unsafe.

4. Activate alerts for your bank account

Sign up for alerts from your bank. You should enable your bank account to be alerted by text message and/or email any time a transaction takes place with respect to your account.

5. Do not allow your browser store your online banking password

When you use your online banking password on a browser, your browser will normally request to store it for you. Reject the offer. This will safeguard against someone else easily logging in to your bank account. It is good practice to always enter the URL of your bank every time you visit the bank on the web.

Malware; What it is and How it Works.

Malware, also called malicious software, is a general term for software that is created for the purpose of causing damage on its users. The victims have no idea they are running it on their computer systems.

Malware includes computer Trojans, worms, viruses, scareware, ransomware, spyware, adware, cryptocurrency miners, and other programs intended to exploit computer resources for nefarious purposes.


Computer viruses are programs that replicate their own code into computer systems when executed. They infect the computers  through  software. For instance, a virus can be included in the executable file of a microsoft word document. So that when the word document is executed or run, the virus is executed alongside without one knowing.viruses can also infect the boot sector of an harddrive.

Because virus can spread on their own, if not checked will eventually render the computer system unusable

Viruses need a host or software to spread, that is to say , once the infected software or program is not run. The virus cannot run as well.


Computer worms are pieces of malicious  programs  that can propagate themselves without a host.they often attack computer networks and internet connections looking for vulnerabilities.

Worms can consume large amounts of network bandwidth slowing down internet connections in the process.  Worms can steal information without modifying program data.


Trojans (named after the  historical Trojan horse) is a malicious software that disguises itself as genuine. It can also be hidden within a non malicious software. Trojans can be spread by tricking people into installing an app, clicking on a link or some email attachment sent into your inbox.

Unlike viruses and worms which can self propagate, trojans propagate through the mistakes of humans.


Ransomware as the name implies, is  a malware that steals sensitive information, or encrypts files then tells the victim to pay some ransom to some criminal before stolen information can be returned or decrypted. 


Scareware  is a malicious program that scares people into taking some action. For example a message can suddenly appear on your phone stating it has a virus and  tricks you into clicking a link to download antivirus. But that link actually leads to the malicious program. 


Spyware is  a software that, without permission, collects information from your device. Information collected can include, keylogger, screen images, videos, audio from a microphone, and so on.

Cryptocurrency miners

Cryptocurrency miners are malware that steals cryptocurrency by infecting the CPU of its victims. 


Adware is software that generates revenue for the party operating. It displays adverts on your device usually after download of a free software. The adware is installed and run without permission.  

Blended malware

Blended malware refers to a technology that uses different types of malicious programs to run. For instance, a software comprising viruses, worms and trojans.

Zero day malware

Zero day malware is any malicious program that exploits a loophole not previously known to the public or to the creators/sellers of the technology containing the defect.

Risks Cyber Security Mitigates


Cyber security helps reduce risks arising from  misuse of , confidential  and personal information.


Risks  emanating from unauthorized access into customers’ bank account  to steal money is cut to the nearest minimum. Banks take the issue of protecting their data seriously. As a successful episode of cyber attack will make them lose many customers


Whether you work on your own or far an organization. It is very important that sensitive data and private communication be kept safe. More so when some individuals might want to gain access to such information to your detriment. These types of risks can be controlled with a well thought out cyber security structure in place.


We have  businesses at their peak suddenly crumble, because their websites/ bank accounts were hacked. A very successful online business equally needs good security to prevent cybercriminals from  bringing down in minutes what took years to build.

Personal risks

Many people store private and sensitive information in their phones. Examples include explicit photos and activities deemed not acceptable to their social circles. Imagine the embarrassment and harm such information could cause if leaked.

The onus is on the individual to keep his private information secure. 

I’m not a fan of storing sensitive information in mobile phones but if you do it, then take steps to protect  information from leaking. Some of the ways you can make sensitive data in your phone inaccessible is the using a password and encrypting the storage for added security.