Open Means Open Means

Top 5 tips to safeguard yourself from identity theft

No comments on “Top 5 tips to safeguard yourself from identity theft”

 

Identity theft 

 

Image Source: babble

 

Majority of us have started using Internet not just for searching information, but to pay bills, buy things, money transfer, work from home and much more. Many hackers take advantage of this and are trying various methods to steal sensitive information like username, password, credit card numbers, etc. This is referred to as identity theft. How to survive this and safeguard yourself from identity theft? Here are top 5 tips to protect you from identity theft.

 

1. Have you received an e-mail asking for personal information like your birthday, your username, password or your mother’s maiden name, etc? If yes, please do not respond to such e-mails even if they look legit. Such emails will look like they were sent by your bank or Credit Card Company. This is the main reason why many part away with their personal information. Banks or any other financial institutions will never ask for such sensitive information through e-mail. If you have any doubts on whether it is really sent by your bank, call the customer care and clarify your doubt.

 

2. Check whether there are any grammatical mistakes or typographical errors are present. No bank or financial institution will send e-mails that are grammatically incorrect or one with lots of spelling mistakes. If you find even a single mistake, rest assured it is from a hacker and not from your financial institution.

 

3. Some people when they receive such suspicious e-mails, they would try to call up the bank using the number provided in the e-mail. There are 100% chances that this number is not the number of your bank; therefore, do not call your bank using the number provided in the e-mail. Call up using the number you normally use to call your bank or financial institution and check whether they really sent such an e-mail.

 

4. If the e-mail that you received is not from trusted source, why take chance of opening it. Delete the e-mail without any hesitation. These e-mails may most of the times contain viruses or spyware or malware. When you open these files, these malicious programs get installed in your system and will start sending information to hackers’ computer.

 

5. Do not use the same password to all websites that you use. Keep changing the passwords at least once in every 3 months. Use a combination of alphabets (both upper and lowercase), numbers, and special characters. Many websites insist that you change the password frequently. When signing up for a website, almost majority of the websites will show how strong your password is. Change the password if it is weak.

 

Here's a small pie chart that details about various types of identity theft.

 

identity theft piechart

Image Source: cybercrimeonline

 

With these tips, safeguard your system against identity theft and phishing attacks.

Basic information of cryptography

No comments on “Basic information of cryptography”

Cryptography

Cryptograthy is used for security. Simply Cryptography is converting the understanable text to not understanable text.

Encryption means converting plaintext into cipher text.

Decryption means converting cipher text into plain text.

Purpose of cryptograthy

Cryptography is used to protect the data from theft.  And also used for user authentication.

Types of Cryptographic algorithms

There are 3 types of cryptographic algorithm. They are

  1. Secret Key Cryptography
  2. Public Key Cryptography
  3. Hash Functions

Secret Key Cryptography:

This cryptography is also known as Symmetric. Uses single key for both encryption and decryption.

Public Key Cryptography

This cryptography is also known as Asymmetric. Uses Two key for encryption and decryption. One for encryption and other for decryption.

Hash Function

This type uses mathematical transformation to encrypt and decrypt the data.

 

 

What is Hacking

No comments on “What is Hacking”

How should a person start hacking??

That means what should be the first step of him in the world of hacking??

Hacking is not a thing which someone can learn from others. But, ya at first he should see how hackers work, and also have a look on the new hacking tips!!

He should be very much active and all the time should keep his eyes in the world of computing, and the best way to do is Internet Surfing especially GOOGLE.

You can search different things everyday,and by reading then you will know the computing world very well!! Then you can search the hacking tips and should understand yourself,

How these are working !! Doing all these things you will get confidence and also get knowledge!!

Then you can think the things yourself on your own view and that will be the start of your own hacking .

Viruses

No comments on “Viruses”

 

comp-main_Full

 

What is a Virus?

A virus is a program that is able to replicate, that is create (possibly modified) copies of itself. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach themselves to just about any type of file and are spread as files that are copied and sent from individual to individual. The replication is intentional, not just a side-effect.

Several years ago, most viruses spread primarily via floppy disk, but the internet has introduced new virus distribution mechanisms. With email now used as an essential business communication tool, virus are spreading faster than ever. Viruses attached to email messages can infect an entire enterprise in a matter of minutes, costing companies millionsof dollars annually in lost productivity and clean-up expenses.

More than 60,000 viruses have been identified, and 400 new ones are created every month, according to the International Computer Security Association (ICSA).

Life Cycle of a Virus:

The life cycle of a virus begins when it is created and ends when it is completely eradicated. A virus has to attach itself to a "host", in the sense that execution of the host implies execution of the virus. The following outline describes each stage of its life cycle.

Creation : Until recently, creating a virus required some knowledge of the computer programming languages. Today anyone with basic programming knowledge can create a virus. Typically, individuals who wish to cause widespread, random damage to systems create viruses. A virus may be modified, either by the original author or someone else, so that a more harmful version of it appears.

Replication : Viruses typically replicate for a long period of time before they activate, allowing plenty of time to spread.

Activation : Viruses with damage routines will activate when certain conditions are met, for example, on a certain date or when the infected user performs a particular action. Viruses without damage routines do not activate, instead causing damage by stealing storage space.

Discovery : When a virus is detected and isolated, it is sent to the anti-virus software developers. Discovery normally takes place atleast one year before the virus might have become a threat to the computing community.

Assimilation : At this point, anti-virus software developers modify their software so that it can detect the new virus.

Eradication : If enough users install up-to-date virus protection software, any virus can be wiped out. So far no viruses have disappeared completely, but some have long ceased to be a major threat.

Some Other Terminologies:

Trojan : A Trojan is a program that pretends to do something useful or interesting, but when it is run, it may have some harmful effect, like scrambling the FAT (File Allocation Table), formatting the hard disk or releasing a virus. The main difference between a Trojan and a virus is the inability to replicate. Trojans cause damage, unexpected system behavior, and compromise the security of systems, but do not replicate. If it replicates, then it should be classified as a virus.

Malware : Short for malicious software - refers to any malicious or unexpected program or code such as viruses, Trojans, and droppers. not all malicious programs or codes are viruses.

Worms : Unlike viruses, worms do not require a host.

Boot Sector Viruses : This virus infects boot sectors on diskettes and / or hard disks. It replaces the original boot sector with itself and stores the original boot sector somewhere else.

 

some computers knowledge full tricks

No comments on “some computers knowledge full tricks”

There some tricks with the use of which you can apply security and also will get some knowledge

 

1.) To see internal & external IP :


a. Internal IP

method 1st

steps : a. My N/W Places [ right click ]

b. properties

c. Lan [ right click ] --> properties

d. TCP/IP settings

e. properties

f.We can see the manually configured IP address

method 2:


alt

steps : a. go to run

b. type cmd

c. on smd prompt, write ipconfig/all

d. after this cmd, we can see the ip address & other imptortant things also.


method 3:

steps : a. got to taskbar[ LAN icon ]

b. right click

c. go to satus

d. click on support

e. now u can see IP



b. External IP

method 1st :

www.whatismyip.us

method 2:

www.whatismyip.com


2.) To Block Website :


method 1st :

steps:    a. open the "c" drive [ the only drive in which window is installed ]

b. windows

c. drivers

d. etc

e. hosts

f. open in notepad

g. type the website which u want to be block( at the place of local host )

h. save this

i. check taht, site blocked or not.

method 2:

steps
:    a. got to internhet explorer properties

b. privacy

c. sites

d. type the address of website which u want to be block

e. ok & then apply

f. check that blocked or not.


3. To find the MAC address


method 1:

steps:    a. got to task bar

b. Right Click --> status

c. support

d. details

e. We can see the MAC address

method 2:

steps:
a. My N/W places

b. Right click --> properties

c. LAN R.C. --> status

d. support

e. Details

6. then see the MAC address

other names of MAC address :

a. Physical

b. N/W

c. hardware address

d. LAN address

e. Ethernet address


4.) To hide the MAC address



steps: 1. My N/W places

2. Right click --> properties

3. LAN [ Disable the LAN ]

4. Go To Lan properties

5. TCP/IP

6. Configure [ ask for proceed , click on " yes" ]

7. advanced

8. Locally Administered address [ select it]

9. click on the value

10. type the new MAC address [ 12 HexaDecimal code ]

11. ok

12. Enable LAN   

13. we cna see the new MAC address

14. Restart [ for old MAC address ]


5.) NETMEETING :


Netmeeting is the feature of windows through which we can communicate, chat, file transfer and desktop share  with all the pc connected through same LAN.

it dont need any internet connection

steps: 1. configure the netmeeting

2. type on run command - " cong "

alt

3. after that a wizard of netmeeting will appear

alt


4. click next --> next

alt

 

5. In netmeeting we can share desktop, chat, file transfer, painting

6. Suppose that these are two ppc PC1 & PC2 , Pc1 wants to take the desktop of Pc2, then first it will call through IPaddress, if PC2 acept the call, then it can take the desktop of pc2.

 

alt

 

Now call the another pc with the help of IP address of anotehr pc. and enjoy

 

Hope u will like it. please give ur comments

More Articles …

  1. Mobile Power conservation
  2. AVG 9.0
  3. Password cracking
  4. Surfing from an internet cafe
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21

Page 17 of 24

  • About Us
  • Faqs
  • Contact Us
  • Disclaimer
  • Terms & Conditions