Security

Posted by Mayank on July 7, 2017 in Security

Securing your online accounts with two-factor authentication is not enough. A cheap device called YubiKey can help keep you from being hacked. Two-factor authentication is great but it has limitations too. Most of the commonly used platforms like Facebook, Gmail, Amazon etc. not only support but force you to use two-factor authentication, also known as 2FA. If you haven’t noticed it yet – it is the process wherein you need to authenticate usiRead More...

0 comments

Posted by Mayank on July 1, 2014 in How To

I updated to newer versions of Mozilla Firefox and started to see this annoying problem – it will keep pestering me to save password. While there are a few sites I may be okay to save passwords, but for most of the sites and security breaches of all kinds happening every single day – I have to be careful with my passwords. I read this somewhere and liked it a lot: “The only strong password is one which you can not remember”Read More...

0 comments

Posted by Mayank on March 24, 2014 in Security

Your everyday activities determine your exposure to getting your private and personal information stolen. There are many such activities, which seem obvious but can go a long way in keeping you and your personal information safe and secure. Here are 7 of such common mistakes, which you should stop and now is the time! 1. Using the Same Password Everywhere Major corporations spend billions everywhere to keep their system and data secure. However, Read More...

0 comments

Posted by Mayank on September 2, 2012 in Security

First let’s understand what is ARP. ARP is how network devices associate MAC addresses with IP Addresses so that devices on the local network can find each other. ARP is basically a form of networking protocol to do a roll call. ARP consists of merely four basic message types: An ARP Request. Computer A asks the network, “Who has this IP address?” An ARP Reply. Computer B tells Computer A, “I have that IP. My MAC address Read More...

0 comments

Posted by Mayank on August 4, 2012 in Mac

Most Wi-Fi networks use poor security which leaves you exposed to privacy breaches and identity theft. Your exposure to security risk increases when you access a public network or are traveling and need to connect to a network to do your work. The need is to have a powerful WiFi protector, which can scan all the wi-fi networks you use for any security problems and warns you if any of them is unsecured. WiFi Protector is a simple to use but powerfRead More...

0 comments

Posted by Mayank on August 2, 2012 in Mac

Mac users got affected by a recent phishing scam, which redirects Mac users from legitimate websites to fake websites, which claim that their computer is infected with a virus. The fake websites also offers MacSecurity “anti-virus” software to solve the issue. Unless you realized it, this “anti-virus” software is malware (i.e. malicious software). Its ultimate goal is to get the user’s credit card information which may be usRead More...

0 comments

Posted by Mayank on July 29, 2012 in Mac

Mac users got affected by a recent phishing scam, which redirects Mac users from legitimate websites to fake websites, which claim that their computer is infected with a virus. The fake websites also offers MacProtector “anti-virus” software to solve the issue. Unless you realized it, this “anti-virus” software is malware (i.e. malicious software). Its ultimate goal is to get the user’s credit card information which may be Read More...

0 comments

Posted by Mayank on July 15, 2012 in Security

The About: Blank virus is a browser spyware, which can change the homepage of your internet browser and redirect your internet searches to random websites. In addition, the About: Blank trojan slows down your computer, decreasing the available memory and adds unwanted icons to your desktop. Most of the antivirus programs are able to detect and quarantine the About: Blank virus. The easiest way to remove the About: Blank virus is to run your antivRead More...

0 comments

Posted by Mayank on July 8, 2012 in How To

Smart phones have made cell phones are popular amongst kids. It isn’t uncommon anymore to see kids playing with cell phones while waiting for doctors appointment or playing with cell phones in the back seat of a car. These smart phones provide web browsing similar to that of a home computer at 3G or 4G speed. Monitoring cell phones usage is also very difficult for parents to monitor because they are commonly used outside the home. Easiest wRead More...

0 comments

Posted by Mayank on July 7, 2012 in Security

If you wake up on Monday, June 9th 2012 and find that you’re unable to access the Web — it is because The FBI will shut down Internet servers that it temporarily set up to support those affected by malicious software, called DNSChanger. Turning off those servers will knock all those still infected offline. Over the past five years, a group of six Estonian cybercriminals infected about 4 million computers around the world with DNSChanRead More...

0 comments

Posted by Mayank on July 6, 2012 in Security

Polymorphic virus is considered jack-of-all-trades virus. Polymorphic virus mutates over time or after every execution, changing the code used to deliver its payload. A Polymorphic virus may guard itself with an encryption algorithm that automatically alters itself when certain conditions are met. This makes a polymorphic virus more difficult to be identified by ordinary antivirus software. To effectively find polymorphic viruses, an antivirus sRead More...

0 comments

Posted by Diya on June 4, 2011 in GMail,Google,How To

gmail hacked We have different accounts on social networking sites as well as email accounts which are filled with our personal and private information. But due to increase in hacking activities over the web, our accounts are at risk. Latest is the hacking of gmail accounts which google believed to have originated from china. You can secure your google account by making sure you follow below steps which are recommended by google. Change your password You shouRead More...

0 comments

Posted by Diya on June 4, 2011 in How To

password strength logo   So you have a password, memorized it and didn’t tell to anyone not even to your lover. But are you sure that your password is really strong that it can’t be guessed using brute force attack. I found few of password checker which calculates the strength of your password based on the character,symbols you have chosen. Password Meter: I found password meter to be a really good tool which shows the strength of your password and alsRead More...

0 comments

Posted by Diya on June 4, 2011 in How To,Interestingness

password Stronger is your password, lesser are the chances of your password being cracked. Password strength can give estimates that how many trials an attacker who does not have direct access to the password would need, on average, to guess it correctly. The strength of a password is a function of length, complexity, and unpredictability. Below are some really useful tips to make sure that your password is strong enough to bewilder a program doing brute Read More...

1 comment