OPENPINOY -Computer, Laptop, CCTV Products and More!

Mobile Gadgets

Abby Skype: Chat Call


Cell No: 0919-4872987

Viber ID: 0919-4872987

Online Sales

Ejelyn Skype: Chat Call


Cell No: 0917-8223232

Viber ID: 0917-8223232

Brand new PC and Monitor Sales

Asnie Skype: Chat Call


Cell No: 0932-1752793

Viber ID: 0932-1752793

Used PC, Parts and Monitor Sales

Amy Skype: Chat Call


Cell No: 0947-5566988 / 0927-0767317

Viber ID:0947-5566988 / 0927-0767317

Laptop Sales

Ghed Skype: Chat Call


Cell No: 0966-3592099

Viber ID: 0919-4872987

CCTV Sales

Kens Skype: Chat Call


Cell No: 0917-8449559

Viber ID: 0917-8449559

Accessories Sales

Asnie Skype: Chat Call


Cell No: 0945-8469567

Viber ID: 0945-8469567

Mandaluyong Branch

Bibz Skype: Chat Call


Cell No: 0917-8843177 / 0928-7397522

Viber ID: 0917-8843177


Facebook messenger


Facebook messenger

OP Mobile

Facebook messenger


Facebook messenger

How to get wechat and kakaotalk?
Just click here for wechat and here for KakaoTalk

You can scan images above to open up chat directly using fb messenger app on Android and iOs

Promotional Event

2014-10-07 : 40123 Hit

Laptop Protection

laptop Protection, FAQ, Technical Support, Tips

You can keep your laptop protected by implementing the following important steps:

Install Anti-Virus Software

Symantec Norton Endpoint Protection Small Business Edition

    The Small Business Edition of Symantec's Endpoint Protection consolidates antivirus, antispyware, firewall, and intrusion prevention into a single suite that's sold on a per user basis, so it can be easily scaled to the number of employees in your office. You can also centrally manage the security suite so you can control the security for all computers and servers.

Kaspersky Internet Security 2012

    Internet Security 2012 features Kaspersky's Hybrid Protection, which mixes traditional antivirus protection on your PC with cloud-based, real-time threat defense to keep you safe from today's ever-evolving threats. Kaspersky's Safe Run technology lets users open suspicious applications, files, or emails without allowing malware to reach your PC. A two-way firewall helps prevent hackers from getting into your systems.

McAfee Internet Security 2012

    You can protect up to three computers with McAfee Internet Security, and the security suite provides all the protections you'll need to connect, browse, email, and social network online. Another key feature is automated file backup to McAfee's safe deposit box for important files. McAfee Active Protection provides real-time protection by identifying items that are suspicious.

BullGuard Internet Security 12

    Internet Security 12 provides complete protection from online threats such as identity theft, credit card fraud, viruses, and spyware. Behavioral detection boosts the software's antivirus capabilities. Version 12 includes antivirus protection, a firewall, a spam filter, a vulnerability scanner, 24/7 support, 5GB of online backup, and three PC licenses. The vulnerability scanner will warn you about outdated software, which can be a security risk.

Check Point ZoneAlarm Extreme Security 2012 With DataLock

    This security suite combines the benefits of ZoneAlarm's Internet Security Suite with the ability to remotely lock a computer's hard drive. It will encrypt a laptop's data, including deleted files, behind a password. Wireless PC protection also blocks hackers when you connect to an unsecured network. It also features download protection that analyzes files before they are downloaded to your computer.

Comodo Internet Security Pro 2012

    With Comodo's $500 virus-free guarantee, the company stands behind Internet Security Pro 2012. The Pro version also gives you 24/7 access to Comodo's PC experts, whom you can reach by clicking a support icon on the Desktop. It provides real-time protection against viruses, Trojans, adware, spyware, and other malware.

F-Secure Anti-Virus 2012

    F-Secure's Anti-Virus 2012 protects against viruses and spyware, and you'll also enjoy the protection of F-Secure's Deep-Guard, which provides real-time protection against threats. DeepGuard checks all the files you open to ensure that they are virus-free, and if the file is unknown, it'll be opened in a virtual environment where all behavior will be monitored for suspicious activity.

Trend Micro Titanium Maximum Security

    Trend Micro Titanium Maximum Security provides maximum protection for everything you do online, including protection from malware, spyware, spam, and other threats. It's your all-in-one security solution for protecting you, your devices, and your data. For example, Trend Micro's Vault lets you secure sensitive data through encryption. It works with PCs, Macs, and mobile devices.

Update All Software

What is Software Update?

    Software Update is a free software client designed to inform you of available software updates for your computer, so as to keep your software up-to-date. Software Update scans your computer and notify you if there is a program hasn't been updated to the latest version. It offers you a link to update software and other related information.

Why Need to Update Software as Much as Possible?

    You may not always pay attention to updating software installed on your computer. Or you may think software update is not necessary as you only use certain functions and don't care to update at all. Actually, software updates often provide patches, which fixed software incompatible bugs and improved software performance to make your software more secure and reduce conflict. Software Update alerts you and provides you with software up-to-date information immediately if there is one available.

How does Software Update Work?

    Software Update is a free and instant informer special for those users who care to keep their application up-to-date with new functions and better performance. It scans your computer and lists all the applications installed on your computer, and then checks if there are new versions for them by connecting to Glarysoft software library, where all the latest software update information are submitted and stored. On the easy-to-use and intuitive interface, Software Update offers links to download software updates and ensures you are running the latest versions.

What Further Work Does Software Update do?

    Software Update provides a centralised but intuitive interface, which gathers and displays other relevant information on software updates that you might need. Through the interface, you can keep track of questions and comments on latest software updates, ask your questions and get answers from experienced users, share your opinions and meet people with similar interests on the software-related social network.


Free, small, easy-to-use and highly functional with intuitive interface.
Absolutely up-to-date information on software update.
Share experience on using software, no personal information leakage.
Integration into Glarysoft Community.

Avoid P2P File Sharing Software

What is Peer-to-Peer file sharing software?

    Peer-to-Peer (P2P) technology is a way to share music, video and documents, play games, and facilitate online telephone conversations. The technology enables computers using the same or compatible P2P programs to form a network and share digital files directly with other computers on the network. Because virtually anyone can join a P2P network just by installing particular software, millions of computers could be connected at one time. BearShare, LimeWire, KaZaa, eMule, Vuze, uTorrent and BitTorrent are examples of P2P file sharing programs.

    When P2P file sharing software is not configured properly, files not intended for sharing may be accessible to anyone on the P2P network. The Federal Trade Commission (FTC), the nation's consumer protection agency, has written this guide to highlight the security problems that can result when organizations allow their employees - and others with access to their networks - to use P2P file sharing software. The guide also notes measures network administrators or security professionals can use to address these problems.

Security Risks:

People who use P2P file sharing software can inadvertently share files. They might accidentally choose to share drives or folders that contain sensitive information, or they could save a private file to a shared drive or folder by mistake, making that private file available to others. In addition, viruses and other malware can change the drives or folders designated for sharing, putting private files at risk.

Virus Scan

Run Virus Scans Regularly

Why Regular Virus Scans Are Essential

    In most cases, people assume that because their computer is running without any major issues that they are safe from viruses. Similarly, many people assume that installing an anti-virus program will keep them safe for years to come, never thinking to update the software database, or upgrade to a later version.

    Updating anti-virus Software and scanning regularly needn't be a chore; these processes can be run in the background while working, and most anti-virus programs have the option to change whether it is a quick, resource-intensive scan, or a slower scan, which leaves resources free so that users can continue to work while the Software performs the scan.

    While scanning for viruses may not seem like an important task, there are so many potential issues which can arise from a virus infecting a computer system that it is good practice to scan regularly. Just remember how much you would have to lose if a virus were to take over your system and you incurred loss of data!

Install only licensed and Trusted Software

    If you're not sure what a piece of software does from its name then don't install it. Sometimes programs will ask you to install other programs during the install of the first application. So, install licensed and/or trusted ones only.

Delete Unknown Emails

    Opening an e-mail from an unknown sender may be an easy mistake to make if you do not know about the warning signs of a potential malware or information phisher. One of the most popular methods of distributing viruses is via e-mail attachments. E-mails from senders that you are unfamiliar with that have enticing subjects lines such as "you are a winner" or "claim your prize" are some of the most popular virus distribution methods out there. don't open unfamiliar e-mails. One other issue is the phishing email, those with subject like "your account re-activation", asking you to send sensitive and personal information, you should ignore them too.

Do not click on Ads

    Avoid clicking on ads if you can. Especially those ads where something is flying around and if you shoot the duck, you win some prize! Ads have become more sophisticated in that they try to make the ad interactive so that you'll be tempted to play it like a game.

Be careful what you attach to your computer

    This is a more common way to transfer viruses than you might think. Everyone now has a USB flash stick that they carry around on their key chains, ready to snap into any computer. But who knows what your viruses are on your friends computers and what accidentally got transferred to their USB stick. A lot of virus programs will auto launch right when the USB stick is put into the computer, so you don't even have to open or download any of the files to be infected. The right thing to do is to run virus scan on anything you attach to your machine.

Avoid downloading programs from suspicious sites

    downloading files from suspicious websites is like injecting virus in your machine. use caution and do not ignore the warning messages that you will likely receive before downloading anything online.



    Make sure Windows Firewall is turned on. A firewall prevents hackers from gaining access to your computer by limiting the number of ports that are open to the public.

    A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

There are several types of firewall techniques:

Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing.

Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.

Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.

Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.

Secure Your Wireless Network

The wireless world has its own language and set of acronyms. So it's appropriate before beginning our discussion of security to define some of the terms we need to understand to be effective at securing your home wireless network.

    SSID (Service Set Identifier) - This is the name of your network. All devices on the wireless network must use the same SSID to communicate with each other.

    WEP (Wired Equivalent Privacy) - A discipline that was integrated into the very earliest wireless standardization efforts that were put into place for the development of wireless technology. This protocol provides base level security standardization for all WI-FI vendors and systems that benefit from the OSI standardization effort. This standard, also called 802.11 is a default security level that is mandatory for all wireless products. WEP is either turned "on" or "off". WEP was designed around the same security paradigms that were used in the wired network development time frame.

    WPA (Wi-Fi Protected Access) - A security protocol for the wireless technology industry that was developed to improve on the limitations of WEP.

    TKIP (Temporal Key Integrity Protocol) - TKIP is a more secure version of WEP which is required to utilize WPA for network security. TKIP encryption is stronger and more resilient than the WEP algorithm.

    MAC Addressing (Media Access Control) - Similar to and of as great of importance as an IP Address, the MAC address is a 12 digit hexadecimal number that is associated with the network adapter directly. Also known as the hardware or physical address of the adapter.

    DHCP (Dynamic Host Configuration Protocol) - Otherwise known as dynamic IP addressing DHCP allows a network to join the internet without a preset IP address.

Use a Complex Password for Login

    This means that you should already have a password to login to your computer. Not having a password at all is not a good idea. Create a password for all user accounts and make sure it's complex. Complex means it should have numbers, upper case characters, lower case characters and symbols and remember to change your password regularly.

Name Password