Online shopping
Many of us have started shopping online these days as we find very little time to go to different markets and this is especially true for people living in metros or big cities. Most people in different jobs find it tough to go for shopping in real markets while the same items are available online and they have wider choice to compare and buy on a click. Different shopping websites help online shoppers to select and buy or even provide great online deals on some of the astounding item which is right there to grab online.
Make your online shopping safe
Before you decide to buy online, you must know some online shopping tips which would make your shopping experience safe and relish able. Please look at the following tips-
Tip1- There are thousands of shopping sites with online shopping facilities but you must not go for shopping on each and every site that pops-up in first place but you must go for reliable sites which have privacy policies and information about security measures. In a nut she you should only go for shopping on sites which are familiar and reliable or suggested by your friends.
Tip 2- There are certain basic thumb rules which keep your online shopping safe to a certain extent, first does the URL of a particular site starts with a HTTPS instead of HTTP and there should be LOCK icon on the status bar which indicates that you are on a comparative safer and secured website.
Tip 3- While it is good to use your own knowledge about trusted sites and you have full trust in that then there is no harm if you make a permanent account to come back and make a deal when you get news on other sources. But make sure that you take all precautionary measures because even the securest of sites may experience and fall prey to hackers. It is better not to provide any shopping sites with your real birth date or your ID number because combination of these two, make things very easy for internet hackers who are always on lookout for easy kill. You should keep your personal information very personal that will certainly keep your online shopping experience happy forever.
Tip 4- It is better to use your credit card in place of using debit card, especially while shopping for smaller items because most credit cards provide fraud protection measures that is not available with debit cards. If you use disposable cards or gift-card that makes it another good option because it has limited funds and specific use.
Tip 5- Do not, as a matter of policy trust whatever you read online. There are cyber criminals who are out to bring you to their fake sites. These sites are full of lucrative offers or fantastic prices, which you can believe only if you were sleeping at the time of reading them. Whenever you find offers too good to be true, you should know that you were on a fake site. The best for you is to google about the company especially if it’s lesser-known one.
Tip 6- Be very careful about your passwords. I have seen the most common password used is ‘your name1234’ that makes you very vulnerable to being hacked. You should instead use a unique password or better still a whole phrase like, I once used ‘iloveyou2honey’ I think its bit difficult to crack.
Tip 7- Shopping online from public computer is surefire way to invite hackers. Never use a public computer to enter your personal data or vital information if you do not intend to fall an easy prey to ever-waiting cyber criminals.
Tip 8- It is advisable to check your accounts at a regular interval, also you should check your monthly statements coming from different sources especially. You should make sure that what you are paying to credit card companies was for your personal use or someone else was having fun on your funds.
Tip 9- The worst strategy is to reload conformation pages which failed to load at your previous attempt because a site may charge you on your next attempt as well if you keep reloading that page. The best way in case you are not sure is to call the retailer directly to make sure your payment got through and get the confirmation of order paced. It is better to check credit card statement to make sure your charges were posted properly.
Tip 10- Do not trust on reviews or depend on them because many sites host such reviews on their sites that may or may not be true. You never know how many sites use fake reviews to hook you so it is good to trust what you read in independent review sites or the best option is to go for experiences your friends shared. If you regularly shop for a particular brand online, it is good to keep an eye on activities of the retailer you shop with on regular basis.
Tip 11- It is safe to download an anti phishing toolbar a way to track sites with dubious intentions. These tools alert you help track sites with malafide intentions. Most of these tools come to you free but very helpful in protecting you from sites trying to cheat you under false pretenses.
Conclusion
When I say keep a strict vigil on how you shop online, I have no intention to discourage you from doing it but being a little alert helps your cause. Some people feel there is nothing much consumers can do, where hacking online is concerned. That is only happening to people who are providing their data to third parties without a care of privacy in the cyber world.
Many big companies are sharing our details with different data collection companies for a price therefore it's not safe to use same passwords on different sites. Security questions are also important in cyber security; you must not use such answers which are too obvious to crack. Once again reminding you that your safety is in your own hands and it is not related to online shopping alone but in every sphere of life because you cannot avoid online shopping in this computer age.
As the technology has advanced, so has the threat to the security of our systems. We are installing more powerful and authenticated anti-viruses these days, but the threat to damage our system does not seem to be halting. As more and stronger anti-viruses are developed, so are the forms of the viruses. Every day, we come across a new form of virus that may cause damage to our PC and new software to get rid of them.
Most of you would have come across a situation when you observe some unusual activity in your system, something like missing icons on the desktop or unexpected pop-ups. This is one of the most common issues these days. If you have encountered any such situation, there is likelihood that your PC may be infected by Spyware.
Spyware is nothing but software that finds out a hideous place in your PC and then attacks the most important areas of your system. Its only motive is to harm you in all possible way.
How does it harm you??? Well, there are many ways; depending for what purpose it is developed. One of the most common among them is spreading your personal information for gaining some financial profits.
And who are the people who would actually steal your personal information? Well, they can be:
- The creator of the software
- A hacker
- A 3rd party who would want to use your personal information to get profited.
And how does they benefit???? There are several ways:
- Your browsing activity can be tracked and then hacked. This will cause a redirect of a particular website to market it.
- Simply misusing your information and causing a threat to personal security information as well as causing damage to your system.
Spyware is a program that is created with the basic motive of stealing the user’s personal information like security information, personal files and folders. The very word itself identifies that it is spying software. This means that a spyware can cause much more damage than what malwares and virus can……….
The strange thing about spyware is that they can hide themselves very efficiently even at the time of detection. Spyware blend themselves into the system with names that may appear too familiar to detect. So how the spyware does not allow any anti-spyware to detect??? There are two ways in which they can be done:
- The spyware encrypts in the code/data to allow avoid being detected. They also keep on changing their file per installation.
- The spyware tries to kill the anti-spyware process, and thus disabling them.
Do you know???
Gator and eZula are some of the most popular spyware.
Mostly you will be attacked by a spyware in the form of software. However there are some which may be present in the form of hardware too.
How to detect if you have been attacked by a Spyware?
Spyware can be detected by any of the activities mentioned below:
- You see a change in the configuration as well as basic settings in your system. This could be anything from a change in the screensaver to some important folders being automatically removed/ deleted.
- You are constantly redirected to a particular site while you are browsing through your default browser irrespective of your search criteria.
- You are receiving pop-up ads/advertisement which asks you to click on their ads to get rid of all the undesired activities.
- You see deterioration in the performance of your PC like slowing of speed, some programs not operating, etc.
- You see undesirable toolbar/icon installed in your default browser.
- Your default Home page keeps changing frequently.
- You encounter error messages while visiting some of your important/most visited sites.
- Some of the keys in your keyboard do not seem to function properly.
What are the sources of Spywares?
Spyware attacks can happen anytime during your browsing. You need to be precautious to avoid it. You may be infected by a spyware from any of the following pages:
- By visiting a web-page or by clicking an Ad on a webpage.
- By clicking on a link in your email or downloading an attachment from your e-mail.
- By downloading software which allows you to download only if you agree to share your information. These are generally mentioned in the Terms and Agreement section of the software referred to as “End User License Agreement”.
Form of Spywares:
Adware:
Adware or Advertising supported software is software that displays pop-up ads and renders advertisements. Generally the advertisements are in the form of pop-ups. Adware themselves are harmless but they generally come with spywares which monitors your internet activity and share your personal information to 3rd party website.
Adware’s are implemented in the software in the form of advertisement by the developer to recover the cost of developing the software. Advertisements are often irritating if they are interrupted in between. Some of the software which distribute the software free of charge but full of advertisements, offers paid services to give advertisement free software without any interruption. Thus revenue can be generated following any of the methods.
Trojans:
It is a file or programs that track your personal information and cause damage to the host computer system. Trojan Horse covers 80% of the malwares spread over the web. It spreads in the same way that a spyware infects a computer. They run silently in the background without the knowledge of the user. However, they are more harmful than the Adware.
Some other basic forms include:
Tracking Cookies: Cookies which track your personal information like your username, password, private and sensitive information, etc.
Browser Hacking: These causes changes in the host file, your home page, effects your search and displays error messages for the frequently browsed pages .
Keyloggers: It keeps a log of all your personal information and send it to a 3rd party for misuse.
Spybots: it monitors your browsing activity as well as sends your information to 3rd party website. It may also affect your host system as it may exist as a dll file.
Preventive Measures to be taken:
Similar to anti-virus, lot many anti-spyware software are available to prevent the attack of the malevolent software. Spyware doctor and Super Anti-spyware are some of the good ones available in the market to remove spyware.
Some more preventive measures that need to be followed are:
- Do not set up suspecting software into your system. Alternatively, browse for any undesired software in your system already set up, uninstall it immediately.
- Enable the security settings of your default browser.
- When downloading free software, do read the Terms and Conditions and License Agreement before installing the software. It is not advisable to download softwares that ask to share or access your information.
- Running an anti-virus, anti-malware and anti-spyware regularly for the PC always ensures safety and security. Additionally, running a CCleaner helps to remove all the unwanted and unused files from your system.
Computer and virus.
Now Internet is being a common option to know many unknown things and to communicate with our relatives who stay in distance through many social communication site. Multinational companies use the net for teleconferencing and to promote their products. Net banking, face book daily shopping's are very common use now a days through net. Students are using it in their studies . There are many other uses of Internet in our daily life. A common problem in using net is virus and mail ware. Hackers are throwing many virus in net daily ,due to which all small and big users are in a great stress regarding this. Even general users are also in thought due to this virus and malware.
How is it affected?
We are downloading many components daily through net. It may be any software or, educational matter or any form of interview, songs and movies. When it is done ,without our knowing many virus and mail ware is coming and also downloading in computer. If the computer once affected then it may not run further and from distance the unknown hackers may control your personal computer and will be able to know all subjects regarding your computer.
Thus the hackers are doing many illegal work and damaging your computer and even mobile also. The another name of this virus is Trojan.
TROJAN-what is it?
Experts are saying the term "TROJAN" came from the Greek work. In Greece history the name is related with the troy war. At that time a wooden horse was made and filling with soldiers ,it was send to the place of enemy. They thought that the opponent accepted the defeat and then enemies thought it might be a gift. They accepted the horse and took it in their area. Then the Greek armies came out from that horse and defeated them with a great horror. This horse was called TROJAN.
The name of this virus may came from that horse name and tactics. This malware also acts like that, it enters in your computer silently and helps to transfer all data's to sender and damages the users computer.
We used anti-virus to protect our computer and the branded anti-virus companies are in great thought to resist it. It is quit impossible to know ,from where it is coming as the users are changing their domain name continuously. It is attacking not only big companies but affecting many social organisation, even they are using it to know many Government secrets.It is creating problem in banking service mainly in ATM and net banking.
Not only computer, smart phone , digital television, printers, many electronics and electrical components are affected due to this virus.
Some tips to protect TROJAN.
- Use genuine operating system and it must be up to date.
- Use firewall and and genuine anti-virus software . Be sure that when you will download any or opening your mail ,it must be scanned automatically. It will block any unwanted virus or mail ware and will protect the compute.
- Be sure that your anti-virus protection is updated.
- Don't open any unknown email and don't download any unwanted software.
- Keep your personal computer with password protected and don't share it with any.
- Keep regular maintenance using defragnation and disc clean up tools.
So be alert regarding this TROJAN virus. It is a new threat to computer world.
Digital security systems are high-technology equipment combination installed for detection of attackers or potential intruders in our homes or any other types of establishments. These systems mostly consist of video surveillance cameras and digital cameras, sensor devices, motion detectors and sound-attenuation motors. These days, several incredible properties are susceptible to burglary and other forms of anti-social activities. Hence, installation of digital security systems in home, business or office may give users a sense of security as well as peace in their minds. Digital systems have different types of components. This includes video surveillance cameras, and other types of detectors.
Surveillance Cameras
Now let us have a look over the most essential part of digital security system named surveillance cameras. Cameras are mostly placed at the top of homes, offices or other incredible properties. Alternatively, you may place them in some of the hidden locations at interior or exterior portion of your building or in any other strategic way. Small telescope or bullets are the popular forms of security cameras used for surveillance. This is because; bullet camera systems are weatherproof and highly durable. Other than this, small telescopic cameras have built-in lens, day and night operation capabilities, inexpensive and most essentially users can install such systems in easy way. The main role of such cameras is involved in producing and recording images for security and surveillance.
Motion Detector
Now we will have a small overview over another essential part of digital security system named motion detectors. Whenever you install motion detectors, it may seem to be unresponsive. However, when the device detects any type of body movement or motion, alarm, along with other security related systems are activated automatically in no time. In this way, security officials and other authorities may come to know about any of the anti-social activities or unauthorized access taken place inside home or offices. It is one of the best security gadget because it cannot be recognized and give a quick alarm whenever it is necessary.
Infrared Detector
Now days, PID i.e. passive infrared detector systems have become one of the popular indoor security systems. PID systems are inexpensive, functional and are of highly reliable. Anyone can make use of such types of alarms inside their homes or business premises. However, such systems are unable to serve any outdoor uses. Initially, PID system measures the temperature of home. Once the device suitably programs the temperature, it will set an alarm in case of having any variation in the temperature because of heat produced by body. PID systems have proved to be highly useful in ensuring security of homes. However, these systems are not suitable for homes having any of the small animals. This is because; animal heat often set infrared alarms.
Ultrasonic Detector
As similar to Infrared systems, Ultrasonic detectors have also become popular home security systems for homes. The interesting feature associated with ultrasonic detectors is that such detectors make use of Doppler shifts to show and find the presence of an intruder. Ultrasonic detector systems, as the name is suggesting can emit such ultrasonic waves, which human beings can never hear throughout their entire daytime. If any intruder enters in your premises, ultrasonic waves shift to buzz the alarm. Alternatively, you can install microwave detectors for their homes. Microwave detectors use microwaves to detect the presence of burglars. Any of the detected motion will definitely set off burglar alarm.
In fact, you should have several reasons for ensuring protection of your homes. Therefore, one should essentially install some suitable indoor detection systems. It is true that these gadgets are quite expensive. But you can make sure the protection of homes and have peace in their minds.
COMPUTER SECURITY
Hi friends, today I'm going to write about some security measures that you need to take while using your computer. If you don't take it seriously now you may be in danger in the future. You may be having your personal details or even some important information like credit card details, bank details, passwords of online accounts and much more which you don't want anyone to steal and use. So, as it is rightly said 'prevention is better than cure' you should always try to protect your computer by following some tips that I'm going to share with you today.
So let's get started. These are the 8 tips that you should follow to be more secure on your computer.
1. Strong Password:
First thing to keep in mind is that you should have a strong password for your computer as you have strong passwords for your online accounts (hope so, if not then choose a strong password for them now). By strong password I mean that it should be more than 10 characters. The more bigger the password is the more secure it will be. It should contain CAPITAL LETTERS as well as small letters, numbers and even symbols like @, #, &, *, etc. You should not use your name, username, pet's name, date of birth as your password. And also keep in mind that the password should be a word that is not found in the dictionary (this will give you additional security by avoiding dictionary attacks).
2. Admin Password:
The next thing that you need to do is to create a password for the Administrator Account. There is an easy way around to open the administrator account when the password is left blank. When you install Windows on a computer, by default it leaves the administrator password as blank. So, you should take care to password protect your administrator account, because if someone gets access to your administrator account, he can do whatever pleases him like deleting a user account, change the passwords of the user accounts (by a simple trick known by most of the computer geeks), install virus and malicious softwares and so on.
To change the administrator password, go to the control panel, click on User Accounts, and select the Administrator account and follow the instructions.
3. Antivirus:
You should have an antivirus software to protect your computer from viruses. Just having an antivirus also will not work, you should update it regularly. Try to install a paid antivirus if possible which will give you additional features. AVG, Avast and McAfee are some of the popular ones out there.
4. Update Operating System:
Update your operating system periodically. In windows you have the option of automatically searching their official website for updates regularly. Every now and then they release new patches which contain an updated security feature.
5. Encryption Tools:
You can also use encryption tools like TrueCrypt to encrypt your files with a password. This software can create a virtual drive in your hard disc which can only be opened if you enter the password correctly. You can even password protect your hard disk.
6. Key Scrambler:
There are softwares known as key scramblers or anti-keyloggers which do the work of scrambling the keys that you type on your keyboard. It protects you from a malicious softwares known as keylogger which is used by computer criminals to capture and send your usernames and passwords to them by capturing every single character you type on your keyboard. Hence, key scrambler is a must if you use your computer more for online business and transactions.
7. Firewall:
Firewall is another important software that you need to keep your computer secure. There is a default firewall already available in Windows. You can enable it by going to the control panel. If you want to have more advanced firewall with more features, you can go ahead and download ZoneAlarm which is a free and a very powerful firewall. It will prevent others from accessing your computer illegally.
8. Update Your Softwares:
You should also update your softwares regularly. All softwares contain bugs which are fixed in the next release or update. So, if a new update is available for a software go ahead and download and install it. This will prevent the bug from damaging your computer. The updates are available in the official websites of these softwares. You can also update it from the software itself.
Hope these tips have helped you. Have a secure journey with your computer henceforth.
More Articles …
Page 2 of 24