Passwords

  Piyush   4:06:00 pm    0 Comments
How to keep passwords safe from the hackers? 1.You need different passwords for different site/accounts Keep different passwords for different sites, i.e your facebook and gmail's password should not be the same. If

A short introduction to SSL

  Piyush   12:37:00 pm    0 Comments
SSL - Secure Socket Layer  Secure Sockets Layer or SSL is a secure protocol, which is the reason why secured E-Commerce and E-Banking are working hastle free. It has become the de facto

Facebook security

  Piyush   1:43:00 pm    0 Comments
The only guy who can protect you against hackers is YOU! If you are reading this post you are having an account on facebook..may be more than one (not ethical). Any way today's

Caesar Cipher - cryptography

  Piyush   3:42:00 pm    0 Comments
Caesar Cipher In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is

8 Fast and Free Security Enhancements

  Piyush   3:11:00 pm    0 Comments
1. Check Windows Update and Office Update regularly (http://office.microsoft.com/productupdates) have your Office CD ready. Click on the Automatic Updates tab in the System control panel and choose the appropriate options. 2. Install a

Crypters

  Piyush   3:30:00 pm    0 Comments
Today I'll be talking about crypters - to bypass antivirus Crypters Crypting is one of the popular methods used for antivirus evading due to it’s simplicity and also because it does not require

Botnet

  Piyush   6:12:00 pm    0 Comments
What is botnet? A botnet is a collection of infected computers that are remotely controlled by a hacker. More about it... Once a computer is infected with a bot, the hacker can control

An introduction to cyber threat

  Piyush   6:06:00 pm    0 Comments
Everyone knows about computer viruses. Or at least they think they do. copied from sophos.com Thirty years ago, the first computer virus appeared, Elk Cloner, displaying a short poem when an infected computer

Malware

  Piyush   2:01:00 pm    0 Comments
Malware - Malicious Software If you are reading this, it's certain that you have a computer, and if you have used a computer, I am sure you have found malware or a virus

Trojan Horse

  Piyush   10:52:00 am    0 Comments
What is Trojan? A Trojan horse, or Trojan, is a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer. Trojans do not attempt

Avoiding keyloggers

  Piyush   6:33:00 pm    0 Comments
Introduction Strong passwords are important, but even the best password won’t keep you safe from keyloggers  that’s designed to secretly record your keystrokes. Hi today we'll discuss about keyloggers, software or hardware designed

avoid getting phished!

  Piyush   5:10:00 pm    0 Comments
PHISHING -  an introduction The most common way a usual internet user get attacked by hackers is phishing. Phishing is one of many ways by which your private data can be attacked. Wikipedia