Posts

Showing posts from November, 2012

Add 2-Step Verification Method in Google Account To Increase The Security

Image
Hello readers today i am going to show you the " 2-Step Verification " method in Google accounts to add more security . Trust me this is very nice method to increase the security in your Google account .  In this method you cant login into your account if you don't have a verification code . If you have your password and your verification code ( Receive on your mobile via SMS or Call ) then only you can login into Google account . How To Add " 2-Step Verification "  . Login your Google Account . Go to this link :   https://www.google.com/accounts/SmsAuthConfig Click on  " Start Setup " On the Next Step  " Choose Mobile number and Click on Send Codes "  You will get codes via sms , Enter those codes and click on Verify .  On the next step it will ask you for " Trust this Computer "  ( If you lose your phone, you might be able t...

List of websites to check whether website is safe to use or not

To make sure whether site is free from malware or not, we have to verify the target-link with few more sites. Here ,i list out some websites that helpful to identify whether site is safe or not : 1.My Wot: WOT is a community-based, free safe surfing tool for browsers that provides website ratings & reviews  to help web users as they search, surf & shop online. website:  www.mywot.com 2.Virus Total: VirusTotal is a free virus, malware and URL online scanning service. File  checking  is done with more than 40 antivirus  solutions.    website: www.virustotal.com 3.Norton Safe Web, from Symantec Look up website safety information and safe site rankings from Norton  Safe Web from Symantec. Read what others think and write your site  reviews . website: safeweb. norton .com 4. Unmask Parasites Free online website Security Service  Check your web pages for hidden illicit content (invisible  spam links,...

3 Basic Ways to Tell Your Computer Has Been Hacked

Learning how to hack into the accounts of individuals is really convenient and pretty cool—but when the tables get turned around and you become the "hackee"—yeah, not so cool any more. Thankfully there are some clues that may suggest you are the victim of being hacked. To learn what they are, continue reading below. 1. It Seems as Though a Ghost Lives Inside Your Computer.   If you start noticing that your computer starts  to act strangely, almost paranormal like—for example maybe the cursor starts to move on its own, emails that you know were untouched in your inbox before suddenly vanish, passwords magically change, or numbers and other characters appear on your screen when you are more than sure that you didn’t even touch your keyboard—then chances are your "ghost" lives in some house across the country and is controlling your laptop or desktop from a distance. As soon as you notice any kind of the unusual activity listed above, it's recommend...

Password Protect your Word Documents

Image
We all use Microsoft Word to create documents and some times we dont want other people to access our documents  specially when you are on a shared computer in your company and you may have your certain secret data stored in your word document that should not be accessed by your boss or other employee’s. To deal with such a situation Microsoft word 2007 integrated a security feature in Microsoft word so that you can password protect your files. Just follow these simple steps to make your document protected 1. Click on the Microsoft Office Button present on the top left corner of the window. 2. Now Click on the Save As option 3. Now a new window will pop up. 4. Click on Tools option at the bottom of the window. 5. Choose General Options from the pop up menu. 6. Now You can select either one or both options One is Password To Open it will ask for the password every time the document is opened. So to view the document you have to enter the password first. ...

7 Web Security Risks of Not Monitoring Internet Activity

Internet access is one of the most important things you can provide to your users. It’s a morale booster, it helps them do their job (for some it is even a vital component of their job,) it enables them to find solutions to problems, research the competition, find new customers, and more. But Internet access comes with a host of threats and if you are not on top of your web security game, allowing your users to have Internet access may cause just as many problems as it can solve. If you are going to provide your users Internet access, consider these top six web security risks of not monitoring Internet activity, and deploy a web security solution to make sure you don’t regret the generosity to your users. 1. Malware Whether your users download infected files or they just visit compromised websites, malware infections are the single biggest risk to your users from Internet access. Web security applications can scan all files for malware and block access to ...

Top 5 Best Free Antivirus Software for PC

Image
Nothing is safe in Toady's world of Internet.When your are accessing Internet on your PC, it is exposed to various viruses and malicious attacks. Even a computer that is never connected to the Internet can be infected via a USB drive.We already discussed  best antivirus softwares of 2012  , in this article we will take a look at some  best free antivirus solutions . 1. Microsoft Security Essentials The  Microsoft Security Essentials  application provides real-time protection for your home PC.It safe-guards your PC against viruses, spyware and other malicious software programs. Free Antivirus. Daily Automatic Updates for Free of Cost.( Your Windows OS must be a genuine copy of windows to receive automatic updates ). Can be downloaded from   Microsoft Official website   for free. Easy Installation process. Easy to use. Real time protection in the background. Very fast and smooth. Doesn't slow down your PC. 2...

Best Tips To Secure Yourself From Hacking

Image
you should know to Secure your computer from getting hacked by some.Remember if you follow these guidelines it will be extremely difficult for a hacker to enter into your pc and to hack your data.As today everything from banking,business,studies etc is online so the threat of being hacked is becoming more and more dangerous.Ok,so listed below are the steps you should follow: 1. Do Not Disclose Your IP Address This the biggest mistake you could ever do.Never Disclose your IP address to anybody because ip address is the address of your computer.Once the hacker knows the address of your computer it will be easy for him Enter into your home(computer) and steal your accessories ( data and passwords). 2. Do Not Download any Suspcious Software or Attachments A lot of people search for cracks and keygens online.Remember this is most exploited method used by the hackers to hack into the pc(personal computer).They usually attach a keylogger or virus with t...

Domain Hijacking

Domain hijacking is a process by which Internet Domain Names are stolen from it’s legitimate owners. Domain hijacking is also known as domain theft. Before we can proceed to know how to hijack domain names, it is necessary to understand how the domain names operate and how they get associated with a particular web server (website). The operation of domain name is as follows : Any website say for example gohacking.com consists of two parts. The domain name (gohacking.com) and the web hosting server where the files of the website are actually hosted. In reality, the domain name and the web hosting server (web server) are two different parts and hence they must be integrated before a website can operate successfully. The integration of domain name with the web hosting server is done as follows. 1. After registering a new domain name, we get a control panel where in we can have a full control of the domain. 2. From this domain control panel, we point our domain name to the web...

Your mouse may actually be a RAT in disguise

Security researchers have discovered a Trojan that attaches its malicious code to routines normally used only to control the inputs from mouse clicks. The tactic is designed to smuggle malicious code past automated threat analysis systems. During such procedures there's no user input and certainly no mouse moving and clicking. The malicious code is designed to remain inactive unless the mouse itself is in use, giving a fair chance that the RAT (remote access Trojan) will remain undetected. The growing volume of malware means automated threat analysis systems are increasingly important. Only the more unusual analysis work gets passed on to human analysts. Even if the mouse-attached RAT gets caught out at this stage it still gains extra longevity. The development means that anti-virus firms will probably need to include a virtual mouse clicker and nudger in their automated analysis routines. The sneaky mouse-hogging malware was detected by security researcher...

Get Notification When Someone Login In Your Pc

Image
Instead, download SendEmail, a free tool for sending emails from the command line. With SendEmail, we can write a single command that will send out an email. SendEmail supports authentication, so we can easily send email from Gmail’s SMTP server or any other server that requires authentication. http://caspian.dotconf.net/menu/Software/SendEmail/ Creating a Task First, launch the task scheduler by typing Task Scheduler into your Start menu and pressing Enter. Click the Create Task link in the sidebar. On the General pane, provide a name and description for the task. You should also select the Run whether user is logged on or not option. On the Triggers tab, create a new trigger that begins the task at log on for any user. On the Actions tab, create a new action that runs the sendemail.exe application. Add arguments like the following: -f from@gmail.com -t to@gmail.com -u Someone Logged Into Your Computer -m Someone just logged into you...

Protect your cloud storage from hacking

Image
The concept of cloud storage has become more common these days especially when offered commercially since it's more cost effective for a large corporation to store data on an off-site data center. It is cheaper and they don't have to worry about finding space for storing data on server which can be the size of a warehouse. However, at individual level, it is preferred less over local storage devices like flash drive, hard drive and disk drive. What is cloud storage? To talk about the security level of cloud storage, we'll first have to talk about what cloud storage is. Cloud storage is an off-site data warehouse where data is transferred and stored. It can be accessed anywhere in the world provided an Internet access is available. You can store virtually anything in a cloud storage model. I say virtually, because you are transferring it over the Internet on a web-based interface or Application Programming Interface (API) so it m...