In the recent times one of the major cyber crimes is password hacking. We should be very careful with our password not to hack as we will be having lot of personal and professional information in our account. It’s not so difficult to keep the password very safe, but one should be very careful when creating the password and using it.
Here are some important tips to make the password difficult for the hackers to hack:-
- Don’t put your password with any word from the dictionary. Because there are some soft wares which will check the password with the dictionary and at one point it will be matched.
- Never check the option “Remember my password” or “keep signed me in” when you go to public net cafe. If you select that, your password will be saved and the person who uses that system can be able access your account.
- Keep in mind that if your password length is more, it will be more difficult for the hackers to hack it. It’s better to have the password with minimum 6 letters.
- Don’t write your password anywhere. If you really want to save it to recollect in future incase if you forget that, write it on a piece of paper and keep it in a very safe place and don’t forget to tear it once you can memorize the password.
- Don’t share your password with anyone, even with your close ones. If you are really in an emergency situation when you can’t access your account, ask them whom you trust the most to do the work for you and change the password immediately once you are able to access your account.
- Keep changing your password at least once a month for accounts which are very important for you that must be never hacked into.
- When creating a password, it should have the following features to make it impossible for the hackers to hack it.
- It should have at least one capital letter and one small letter (as the password field is case sensitive, it will differentiate capital and small letters).
- It should have at least one number and one symbol like &, @, * etc.
- It should have at least 6 to 8 digits.
- Then the password will look like for example Av4k$b9 and it will be nearly impossible for the hackers to hack it.
CRYPTOGRAPHY :Cryptography in layman’s terms would mean the study of creating messages in a form of secret code that masks the actual message and displays it as something completely unintelligible.These cryptic messages make absolutely no sense to the casual observer, but the original content can be reconstructed by the intended recipient. That’s what cryptography is about—it uses complex mathematical calculations and computer science to pull off the job.
ENCRYPTION: Encryption is simply the implementation of cryptography. It is the process by which messages are converted into encrypted files. These files are password-protected by the creator author.Without the password, the file cannot be accessed and the original contents cannot be extracted. On entering the password correctly, the computer decrypts the file,revealing the actual message or data. Prior to encryption, data is simply referred to as ‘plaintext’ but once encrypted, it is called ‘ciphertext’, which means jumbled or puzzled data.
CIPHER: In simple terms, a cipher is a code or a set of instructions. More accurately put, it’s an algorithm that contains precise instructions for encrypting and decrypting data. In the world of encryption, there are two main types of ciphers; the transposition cipher and the substitution cipher. The two work in completely different ways. The former rearranges characters in a file, making them look illogical e.g. the word ‘COMPUTER’ might look like ‘UEORCPTM’ after encryption.The second method completely changes the content to corresponding values, and then reconstitutes it upon decryption, e.g. The word ‘COMPUTER’ might look like ‘YGBLWDJI’. In this example, the letters in both words correspond to each other sequentially starting from the first (A=W,B=X, C=Y, etc).
ALGORITHM: In the field of mathematics, an algorithm is a predefined set of precise instructions for a task to be accomplished successfully, from the initial stage right to the output. For instance, when you try switching on your computer and it doesn’t come on, you check the connections. If connections aren’t ok, you fix them and if they are, you look for a fault somewhere else, ruling out different possibilities at each step. It is an ‘if-then’ principle.
KEYSTREAM: A keystream is a collection or a stream of alphanumeric and special characters combined with the actual message. These characters are either randomly placed or appear to be random in nature.
BRUTE FORCE ATTACK: A brute force attack is an intensive trial-and-error procedure by which a person can try to crack the key or password of a file by trying different combinations of alphanumeric or special characters until the perfect match is found.
1.Open the start menu and click on run
2.In the text box type 'regedit' and press Enter. Registry Editor will Open.
3. open 'HEKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\StorageDevicePolicies' Key
4.If it does not exist , create it with ' Edit|New | Key' and rename it 'StorageDevicePolicies' and select it.
5.Now create a registry value by Right clicking on right side of window and select 'New| DWORD' and rename it with ' WriteProtect'
6.Now right click on it and select 'Modify' and set the value 1
now close the registry editor and restart the computer.
Now ,Your data is protected. NO one can copy you data by USB DRIVES.
When you wants allow the pen drive, change the value 0 from 1 nd restart computer.
Pen-drives will allow to copy data.
Have a FUN!!!!!!!!!!!!!!
How to block unwanted websites
You can try using something like parental control software like: cyber patrol parental control, Parental control bar, Safe Families We-Blocker Parental Control.
if you are browser specific and using internet explorer then you can use content advisor. This shows up in internet options and if you want to use some type of software to block sites according to category then the best option is k9 web protection.
Try to Open DNS besides filtering of sites based on your preferences it also blocks malware sites.
By using Windows Firewall applications you can be block for the users from that particular PC but no internet website. You can yourself check also go to Control Panel then go to Windows Firewall go to Exceptions and there you will find only the services that can be blocked. If you try to add new ones by clicking Add Programs right applications can be blocked for the users from that particular PC but no internet website.
The most easy and secure process to block particular websites on your client operating system is to use d windows HOST file. The steps are
go to C:\WINDOWS\system32\drivers\etc
find a file named hosts.
Open it with notepad then go to the end of d file and in a new line write particular sites full name or url.
More Articles …
Subcategories
Web Hosting
Web Hosting is a service offered by web hosting providers to the individuals and organizations to make their websites accessible on the internet. Depending on the requirement, one can avail different types of web hosting such as shared hosting, dedicated hosting, virtual private hosting, cloud hosting etc.
Page 103 of 193