Showing posts with label Security Tips. Show all posts
Showing posts with label Security Tips. Show all posts

Facebook Phishing

Phishing as discussed before is one of the most widely used method to hack a facebook account, Phishing holds the top position in an article I wrote on 10 Ways How Hackers Can Hack Your Facebook Account In 2011. There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims "Email Address" and "Password" is stored in to a text file, The hacker then downloads the text file and get's his hands on the...

What is Secure Sockets Layer (SSL)

You might have heard some times that not to give your password or credit card information or any other sensitive information on public computers or on Msn, yahoo etc chats.The reason why you might have heard that the Hackers have some ways to you would have probably heard that hackers have a way to steal your your credit card numbers , passwords etc. A hacker can use different types of attacks such as Packet sniffing or ARP Poisoning to steal your sensitive information Secure Sockets Layer (SSL) is the most widely used technology for creating a secure communication between the web client and the web server. You must be familiar withhttp:// protocol...

How To Protect Your Computer From Virus By Disabling Autorun

Most of the computer seems to get transferred from flash drives, pen drives and other portable and removable media. As soon as you plug and play your removable storage media, the windows’ default feather will search for Autorun.inf file which contains all the information about the things to do when media is plugged in. It can execute programs (probably virus) which are already in removable storage media. Eventually the programs copies itself to the hard drive.Therefore it is necessary to turn of autorun feature in your windows to get rid of viruses.In this short tutorial I am going to teach you how to disable...

Lock Your Computer With USB Flash Drive

Security of laptops and notebooks have been evolving with new technologies like fingerprint readers, eye scanners, face recognition etc but what about the personal computers? Using this trick you will be able to lock your computer with a Usb. The computer will work only when the Usb is plugged in. Once the Usb is removed keyboard and mouse will automatically get disabled and your screen will get dark. Moreover your computer will get automatically locked. To unlock the computer you will need to insert the Usb again. This trick will work on on all versions of windows including both windows 32 bit and 64 bit Here is the Trick to lock Your Computer...

Know More About Phishing Attacks

Phishing is a method of stealing login info (usernames and passwords) by directing the victim to a clone (fake) login page, that logs the login info without the knowledge of the victim. Such clone website is known as a phisher. eBay, PayPal and other online banks are common targets. Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures. Recent phishing attempts have targeted the customers of banks and online payment services. Social networking sites such as Orkut are also...

3 Ways To Choose A WPA Key That’s Difficult To Hack

Wi-Fi is a great way to stay connected to the Internet all over your home without huge wires, and is the only way many devices like the IPad have access to the Internet. Too often users compromise security for convenience and either leave their network open or choose an easy password. Here are three tips to choosing a secure WPA key for your home Wi-Fi network. 1. Avoid Dictionary Words Most Wi-Fi hackers get in with a brute force attack. A brute force attack tries random commonly used words and phrases together over and over until it finds the password. If you use simple dictionary words to secure your Wi-Fi than it isn’t a question of if a hacker can get in but rather when. 2. Use Random Capitalization Since most things are case sensitive getting into the habit of a capitalization pattern...

8 More Important Security Enhancements

1. Check Windows Update and Office Update regularly (http://office.microsoft.com/productupdates); Click on the Automatic Updates tab in the System control panel and choose the appropriate options.2. Install a personal firewall. Both SyGate (www.sygate.com) and ZoneAlarm (www.zonelabs.com) offer free versions.3. Install a free spyware blocker. I am choose SpyBot Search & Destroy (http://security.kolla.de). SpyBot is also paranoid and ruthless in hunting out tracking cookies.4. Block pop-up spam messages by disabling the Windows Messenger service.Open Control Panel >> Administrative Tools >> Services and you'll see MessengerRight-click...

Hide Windows Partition Without Software

I am going tell a trick by which you hide your Windows hard disk partition without any use of software.For this trick I am use the MS DOS (Command Prompt).Microsoft make the MS DOS for Command Line Instruction.I think every person whose that use the Windows know very well about Command Prompt.If we say about hackers,Windows registry(regedit) and MS DOS always favourite features in Windows.So.I am again use the MS DOS for hide the Windows Drive .1: Go to 'RUN' and type 'cmd' by which command prompt open. Type 'Diskpart' and press ENTER key like given below...By doing it Diskpart come into Global Configuration Mode. 2: Type 'list volume'...

Check Your AntiVirus Is Working or Not ?

Today,I am tell about a common method by which you check that your antivirus work properly or not. Open Notepad and copy the Code given below. X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H* It is a standard text developed by the European Institute for Computer Anti-virus Research (EICAR). Every Anti-Virus is programmed to load this file as a virus. Save as this file by checkantivirus.com It is not necessary you save this file by given name but use only this extension.. .com After some seconds saving this file, your Anti-Virus should come with the message that this file is infected with virus asking permission for its...

Shut Up and Be Secure - Power of Social Engineering

Human is the most weakest part of the Information Security chain. Psychologists have identified many benefits people receive when they help others. Helping can make us feel empowered. It can get us out of a bad mood. It can make us feel good about ourselves. Hackers find many ways of taking advantage of our inclination to be helpful. Because Hackers often target people who don’t know the value of the information they are giving away, the help may be seen as carrying little cost to the helper. Most of Humans tend to explain their behavior and of others, while doing this we give away alot of information about us. Security...

How to Protect Yourself from Malwares

Malware, short for malicious software, is software designed to secretly access a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses. [Wikipedia] With the increase in malware "programmers", numerous malwares/spywares are releasing everyday. Here are some ways to stay safe from most malwares in Windows: 1. OS Installation Directory Most of them are skids, so they hard-code location names in their apps, instead of getting the System Directory. As you know the default installation of Windows XP, Vista,...

How to Detect Hidden Backdoors, Trojan Horses and Rootkit Tools

Learn How To Detect A BackDoor On A Tool What is a BackDoor? A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected, the backdoor may take the form of an installed program, or could be a modification to an existing program or hardware device. It hides in the computer, scans existing loopholes, opens corresponding ports, as well as modifies system registration files. Backdoor will not duplicate or actively spread itself. It will only open a certain port through which a remote computer in the network can control the infected computer. Generally the backdoor will not influence normal communication of the network, so firewalls...

Learn All About Spyware

A very detailed look at what spyware is, how it attaches itself to computers, and the common methods of prevention. There are a lot of PC users that know little about "Spyware", "Malware", "hijackers", "Dialers" and many more. This post will help you avoid pop-ups, spammers and all those baddies. What is spy-ware? Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option...

How to Know if You Are Infected with RATs or Keyloggers

 In this post i am going to show you how to find out when you are infected with a RAT or Keylogger, without using any complex tools. Now i believe most of you might know that you need to have an internet connection to make a RAT or a Keylogger work, which would mean, if you are not connected to internet, you don't have to worry about being infected with RAT or Keylogger. Ok, so for those who have internet connection and think they are being infected with a Trojan, here is a little guide that can solve your problem. 1. Now every program has their own process which can be seen on task manager. So the first thing to do is to find out which...

Secure Wireless Network from Hackers

The reason we secure a wireless network is to stop people from using the services of our network who don't have permission to utilize them. It is harder to secure a wireless network from hackers as compared to a classic wired network. This is due to the fact that a wireless network can be accessed anywhere inside the range of its antenna. In order to secure a wireless network from hackers, we should take proper steps to save ourselves against security issues. If you don't secure a wireless network from hackers, you might end up without its service. The consequence might also include the utilization of our network to attack further networks. To secure a wireless network from hackers, you should follow these simple wireless networking tips: 1.       Strategic antenna...

Locking the Computer Screen in Windows 7

How to create a shortcut for locking the Computer Screen in Windows 7? There are many ways in which you can lock the computer screen. The most popular as well as the fastest way to lock it is to use a keyboard shortcut. The keyboard shortcut used to lock the computer screen is Win+L. A few of us choose to utilize the mouse to lock it. And of course many people like to use both the options. There is another method in which we can lock the computer screen. It is to create a shortcut for locking the computer screen in Windows 7. You can create a shortcut for locking the computer screen in...
 

Backlinks

Followers

Visitors stats

Support : Softwares And Tips | Best PTC Sites | Free Premium Accounts
Copyright © 2013. Softwares And Tips - All Rights Reserved
Template Modify by Best PTC Sites
Proudly powered by Blogger