Open Means Open Means

AVG 9.0

No comments on “AVG 9.0”

 

AVG 9.0 antivirus software is going to hit the markets this month.

The improvements in the upcoming version can be seen in the speed and the levels of protection offered by it.

The best of the free anti-malware products, AVG 9.0 will being to all its users, including those of the free version, identity theft protection through a partnership with Intersections Inc,

Scan speed has been  improved by marking safe files so that they are not scanned in the future unless they change.

Boot times are also improved and memory usage decreased.

As is the trend in the industry, AVG 9.0 adds white listing, behavioral protection and cloud operations to their signature-based blocking.

The new version adds the Resident Shield, firewall, and identity protection modules.

Improvements in the firewall cut dialogs with the user substantially without sacrificing protection. The LinkScanner component has been improved to cut phishing threats further.

The AVG Identity Theft Recovery Unit is a service that provides access to a team of fraud specialists to AVG customers who feel they may have been victims of identity theft. If they have, the service will review the customer's credit reports and enroll them in daily credit file             monitoring and alerts for 6 months. The customer will also receive assistance in filing all the paperwork necessary to re-establish a clear report.

 

Password cracking

No comments on “Password cracking”
Password cracking is the process of recovering password from data that has been stored in or transmitted by a COMPUTER SYSTEM. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a forgotten password (though installing an entirely new password is less of a security risk, but involves system administration privileges), to gain unauthorized access to a system, or as a preventive measure by system administrators to check for easily crackable passwords. On a file-by file basis, password cracking is utilized to gain access to digital evidence for which a judge has allowed access but the particular file's access is restricted.

Surfing from an internet cafe

No comments on “Surfing from an internet cafe”

Now day’s internet hackers are using Internet cafes mainly so that it will be tougher to trace them. Most of us, who even have internet connection at home, uses internet cafes often, when it urgent and when we are away. But we must be careful while surfing from an internet cafe, since there is a chance for our personal information getting stored in the computer or for getting robbed by some other users. So important things we must follow are:

  • Click the mouse carefully, never click (accidently) on the save password command, while you login to your accounts.
  • It is better not to add any personal information from internet cafes, especially your personal address, Bank account information, Credit card numbers etc.
  • Make sure that you've deleted all the files you've downloaded or copied to the computer before you leave the cafe.
  • It is better not to login to your accounts which are not encrypted (i.e. web pages which doesn't starts as 'https://')
  • It is also recommended not to plug any external storage devices like USB flash drives, external hard disks etc. since there is a chance for getting viruses enter to your device from the computer.
  • Make sure you've cleared the private data from your browser before leaving the cafe. It will be available in the ‘Options’ menu of the browsers.                          
  • Try to make online payments via a trusted payment processor (PayPal, AlertPay etc.), so that you don’t have to reveal your credit or debit card number.

 

These simple steps can protect you from getting cheated to a certain extend. So the most important thing is that to avoid adding personal information or other important documents from internet cafes. The browsers also perform a key role in protecting you from internet scams. For example Mozilla FireFox has a tool to prevent websites which are designed to get the personal information of people by mistaking them. So try to use the most trusted and popular browser and it is also good to use it’s latest version. Also using Antivirus is also very important. It is better to restart your computer in tha cafe before using it since most of the internet cafes use an application called 'Deep Freeze' which erases all the saved data once we've rebooted it and thus when you restart, if there are viruses or othe malicious codes, it will all get erased

Stay Safe.

http:// and https://

No comments on “http:// and https://”
While browsing internet or more specificaly while opening internet sites all of you must have seen in the url's(uniform
resource locator) say for eg.
http://www.google.com
is the url of google server.
the url of a web server is same as we have home address.
all url's by default start with either http:// or https:// depending on the server we use.if we don't add them before a url
then our web browsers add them by their own
Now the question arises what are they ,for what purpose they actually are,and what is the differnce between them?
http://  stands for hyper text transfer protocol,while https:// stands for hyper text transfer protocol(secure),the 's' here
is indicative of security of web page.
A protocol in computer's world mean a set of instructions to complete a particular task.
http:// and https:// both are protocols for sending and recieving data over the internet.
The data we send includes the things which we search in search engines like google and yahoo,and id's and passwords we send while banking processes etc.
now you must have thought that searching google and entering secret password are same things ie we are sending data but their privacy levels are very much different.
General web sites which do not deal with such private data like search engines,wikipedia etc,their url's start with  http:// 
while the sites dealing with private sites like banking related sites .their url's start with https://
the main purpose of using two types of protocols is to provide an additional layer of security to web users ,so as to save
them from financial as well as other types of losses.
The urls starting with https:// are also difficut to hack it serves an additional advantage.
so next time while entering any private data into web sites check their security levels themselves by checking http:// and
https://
thanx a lot hope you will find it useful.

How to remove New Folder.exe Virus from Pen Drive

No comments on “How to remove New Folder.exe Virus from Pen Drive”

Hi Friends,

We are all using Pen Drives now a days.  I do not think any one without a Pen Drive.  Pen Drive is very much useful to carry huge amount of data from place to place. There are pen drives having memory storage capacities ranging from 1 GB to 128 GB also. it has become a must for every one to carry Pen Drives.  But there is another disadvantage of Pen Drive.  If you have been using a pen drive at college or office for data transfer,  you might have come across this kind of virus.   This virus creates an exe file in your Pen Drive with the name "New Folder.exe".    Here are some symptoms of this virus.

* Task manager is disabled.
* Registry Editor is disabled.
* Folder options not working.
* Taking too much time for accessing pendrive.
* Uses half of your computers processing power.

You can easily remove this virus from your computer by using Smart  Virus Remover tool. It is a small 550 Kb file.    Just download the file from the link given at the end of this article. Run this downloaded exe by double clicking on it.    Then click on “Delete Autorun.inf file”. After that click on ”Remove virus from USB”. The virus will be removed from your pendrive.   To restore your task manager, registry editor and other things which were disabled by virus – click on “Restore
Default Windows Settings”.

The link to down load the Virus removal tool is :  http://www.brothersoft.com/smart-virus-remover-270067.html

Raghav

More Articles …

  1. Remove virus from your system within 2-3 min.
  2. How to remove autorun.inf virus from your computer or laptop?
  3. How To Protect From Virus and Nasty Internet Threads
  4. Protection from virus

Subcategories

Hardware & Troubleshooting

Software

PC & Internet Security

New Technologies

Web Hosting

Web Hosting is a service offered by web hosting providers to the individuals and organizations to make their websites accessible on the internet. Depending on the requirement, one can avail different types of web hosting such as shared hosting, dedicated hosting, virtual private hosting, cloud hosting etc.

  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117

Page 113 of 193

  • About Us
  • Faqs
  • Contact Us
  • Disclaimer
  • Terms & Conditions