How to keep passwords safe from the hackers? 1.You need different passwords for different site/accounts Keep different passwords for different sites, i.e your facebook and gmail's password should not be the same. If
Home
Archive for
2012
A short introduction to SSL
SSL - Secure Socket Layer Secure Sockets Layer or SSL is a secure protocol, which is the reason why secured E-Commerce and E-Banking are working hastle free. It has become the de facto
Facebook security
The only guy who can protect you against hackers is YOU! If you are reading this post you are having an account on facebook..may be more than one (not ethical). Any way today's
Caesar Cipher - cryptography
Caesar Cipher In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is
8 Fast and Free Security Enhancements
1. Check Windows Update and Office Update regularly (http://office.microsoft.com/productupdates) have your Office CD ready. Click on the Automatic Updates tab in the System control panel and choose the appropriate options. 2. Install a
Botnet
What is botnet? A botnet is a collection of infected computers that are remotely controlled by a hacker. More about it... Once a computer is infected with a bot, the hacker can control
An introduction to cyber threat
Everyone knows about computer viruses. Or at least they think they do. copied from sophos.com Thirty years ago, the first computer virus appeared, Elk Cloner, displaying a short poem when an infected computer
Malware
Malware - Malicious Software If you are reading this, it's certain that you have a computer, and if you have used a computer, I am sure you have found malware or a virus
Trojan Horse
What is Trojan? A Trojan horse, or Trojan, is a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer. Trojans do not attempt
Avoiding keyloggers
Introduction Strong passwords are important, but even the best password won’t keep you safe from keyloggers that’s designed to secretly record your keystrokes. Hi today we'll discuss about keyloggers, software or hardware designed
avoid getting phished!
PHISHING - an introduction The most common way a usual internet user get attacked by hackers is phishing. Phishing is one of many ways by which your private data can be attacked. Wikipedia
Subscribe to:
Posts
(
Atom
)