Showing posts with label Security Tips. Show all posts
Showing posts with label Security Tips. Show all posts

Who Is best : Programmer -vs Hacker ?

0 comments
 
1. A hacker beats the system.
A programmer maintains the system.

2. A hacker is trying to get in.
A programmer is trying to stop things
getting in.

3. A hacker does things because he
believes in
them.
A programmer does what he is
supposed to.

4. A hacker changes the way things
are.
A programmer tries to keep the
status quo.

5. A hacker is agile.
A programmer is a small cog in a big
slow machine.

6. A hacker has many points of
attack.
A programmer has one job.

7. A hacker has to be fast.
A programmer doesn’t.

8. A hacker is self-reliant.
A programmer relies on others.

9. A hacker finds paths that don’t
exist.
A programmer guards the old ones
that already
do.

10. A hacker is about being
interesting.
A programmer is about being perfect...
Read More ->>

Top 10 Security Tips For Internet Users

0 comments
 Top 10 Security Tips For Internet Users:-
1. Always use a strong password with a combination of alphabets, numbers and special characters

2. Use Original Antivirus. Dont download Cracks & Keygens which are the main entry point for Viruses and Trojans.

3. Use Original Windows OS ( Paid ) or Use Open source OS such as Linux, Ubuntu, Flavours of Linux. Do not use some programs to patch your system.

4. Regularly Update your Antivirus and OS to remove and/or patch vulnerabilities and keep your system secure.

5. Shutdown / Uninstall unwanted programs or programs which you dont use such as FTP, Telnet or any softwares which use your resource.

6. Use Drive Encryption tools to protect your data from data theft and to protect from data loss.

7. Always create a back-up of your important files to a Hard disk or Online Servers ( like Drop box )

8. Never trust any other network to which you connect( OPen WiFi ). Crackers & hackers can compromise your data and also steal your data transmitted .

9. Have a routine check of your computer for defects and patch immediately.

10. Never leave your computer unattended, even for a short time.
Read More ->>

How to Become Secure Online

0 comments
Privacy has become something very important to people using Internet these days. The more we do online, the more trails we leave behind. There are lots of private companies tracking every movement, keystrokes, websites you visit and the people you communicate with online. These companies often sell this information to law enforcement agencies or the government for legal affairs. Day by day more sophisticated tools and methods are being discovered to track your activities and the entire scenario has become very sophisticated. So it is very important for one to keep his privacy and stop third-parties from intruding into their activities. In this article, we will learn about various methods by which you can become secure online and mask your activities that you do not want the world to know.
The three types of methods we will use to make ourselves secure online are:

  • TOR
  • Proxies
  • VPN

TOR
Tor, short form of The Onion Router is a system that offers you anonymity online. TOR clients  redirects all your internet traffic through a network of computers concealing your actual location and preventing any tracking. The TOR bundle comes with a firefox that’s integrated to the TOR network and a GUI named Vidalia is used to use the TOR network. Here is how Vidalia looks like:

111

So before we start, let’s see how the TOR network works. Here are some pictures from the official website which will help you get started.
222
So whenever you try to contact to Dave, instead of directly contacting him, TOR first sends your transaction through a number of networks so no single point can track back to your location. So packets from your network take a random route through the network and reach the destination.

333
So once a route has been established, all kinds of data can be sent and received over the TOR network. And after a fixed amount of time, TOR changes the route through which you connect randomly which makes it very hard to trace back to you.


444

Tor is good, but it can’t completely secure you and your activity. While it protects the transported data, experts can use statistical analysis and get your circuit route and find out your location.             Official Website: http://www.torproject.org
Download TOR Bundle: http://www.torproject.org.in/download/download-easy.html.en


PROXIES
A proxy or a proxy server is a computer system or application that acts as an intermediary between you and your client server or application. So you want to access a target, you connect to the proxy, the proxy connects to the target, then it gets back the relevant information to you.

555
So a proxy can be used to keep you anonymous, or to bypass IP restrictions, security/parental controls, or to get around regional restrictions. A proxy server appears as an IP address which you have to configure on your web browser to use it. When you do that, your original IP will be masked by the proxy and you will be anonymous.
190.96.64.234This is how a proxy looks like. All proxies are from a particular location or country so using a proxy near to your target server might help faster browsing too! If you’re on Firefox, you can set a proxy by going to Firefox Options > Advanced > Network > Connection Settings > Manual Proxy Settings.

666


VPN (Virtual Private Network)
A VPN or Virtual Private Network is a remote server in an offsite location that tunnels all your data and information through their secured servers by encrypting them thereby making your connection secure. Most of the VPN’s use 128 bit SSL encryption or 256 bit SSL encryption. More the bit count, better the encryption. VPN helps you hide your real IP and spoofs your location to any programs or clients trying to track you. So suppose you’re from USA and needs to access a website that’s for Russia only, I could use a VPN located in Russia that masks my IP as a Russian one and thereby access the website.
777
Another matter of concern while using a VPN is logs. Almost all of the VPN providers keep logs as a security measure. This is done so that if they ever want to check up a user’s activity, they could refer to the logs. So federal agents or the government could contact the VPN providers and get your activity. Hence if you are really concerned about your security, you should purchase a VPN that do not keep logs. When you purchase a VPN, make sure you choose one which is closer to you since it will make your Internet experience smooth and won’t cause any lag or slowness.
There are lots of free VPN’s available but they’re not recommended since most of them come with lots of ads, adwares and slow connection. Most of them keep logs which mean you’re not really secure and the connection won’t be having a good encryption rate. So it is always recommended you get a paid VPN. But I’ll include some good free and paid VPN’s to help you out.

Free VPN

Paid VPN

CONCLUSION
So that’s it. I’ve discussed some main methods by which you can be secure online. But always remember, you’re never 100% safe. If the federals or others want to track you, they can still do it no matter what measures you’re using to prevent it. These methods will work, but only up to a limit. The rest is up to you to use your intuition to keep yourself safe.
Read More ->>

What is Encryption | Symmetrical Key and Asymmetrical Key

0 comments



Encryption is a method or a technique used to encode a message so that it can’t be read by a normal user/person. Its an art of secret writing, It can also be defined as converting information from plain text using an algorithm or a cipher to make it unreadable, So that the converted information can only be read by the person who is having the special knowledge. The process of encoding is known as Encryption and its reverse process i.e. decoding it is known as Decryption. Encryption is very useful when it comes to protecting your confidential data from being stolen. It is helpful when data is transmitted over the network, it safe guards you data from sniffers. When data is needed to be encrypted over a network, SSL Protocol is used for encryption purpose. SSL stands for Secure Socket Layer.
Types of Encryptions

Symmetrical Key : This type of encryption is also know as Shared Key Secret. In symmetrical encryption, the key which is used in the process of encryption, that same key is also used in the process of decryption. If two parties want to exchange the encrypted data securely, both of them should have the same copy of symmetric key.


Asymmetrical Key : This type of encryption is also know as Public Key. In this type of encryption, keys are generated in pairs, public key and private key. In asymmetrical encryption key used to encipher is different from the key used to decipher. Therefore the two partners have two different keys, one is made public and other one is made private. Let’s take up an example to understand the concept in an easy way.
Suppose, John wants to send a message to Mike, he just ciphers the message with the public key and sends it to Mike. Since Mike is having the secret key, he can and decipher the message and read its content.
Read More ->>

Beware from Facebook Spam for Hacking Accounts

0 comments
 

Beware Safe Surfers....Links and Events are Popping Up on the famous social networking sites like Facebook and Tumblr, saying that a new “Limited Edition” Facebook red theme is available. When a user visits the link, it downloads a malicious Chrome Extension, which reportedly steals all your Usernames and Passwords of your current active sessions and gets access to your History.
Read More ->>

New and Basic Security tips to Aviod Virus /Trojan/ Keylogger Infection

0 comments




Security tips to Avoid Virus /Trojan/ Keylogger Infection

1. Install a good antivirus. Free or Paid is good, but dont used cracked or pirated versions.

2. Install real-time anti-spyware protection

3. Update your Anti-virus programs daily.

4. Perform scans on your computer daily.

5. Disable autorun to prevent infection from pendrives.

6. Disable image previews if usiing Outlook

7. Use good anti-virus which has browser plugins and scans all URL's for malacious content.

8. Use Hardware based Firewall.

9. Dont click on any mail links or attachments from unknown sources or malacious users.

10. Never download softwares from third-party sites. Download from original website. Dont use cracks or keygens which may be a virus/trojan itself.
Read More ->>

Basic Tips for Users System Security

0 comments



1. Always use a strong password with a combination of alphabets, numbers and special characters

2. Use Original Antivirus. Dont download Cracks & Keygens which are the main entry point for Viruses and Trojans.

3. Use Original Windows OS ( Paid ) or Use Open source OS such as Linux, Ubuntu, Flavours of Linux. Do not use some programs to patch your system.

4. Regularly Update your Antivirus and OS to remove and/or patch vulnerabilities and keep your system secure.

5. Shutdown / Uninstall unwanted programs or programs which you dont use such as FTP, Telnet or any softwares which use your resource.

6. Use Drive Encryption tools to protect your data from data theft and to protect from data loss.

7. Always create a back-up of your important files to a Hard disk or Online Servers ( like Drop box )

8. Never trust any other network to which you connect( OPen WiFi ). Crackers & hackers can compromise your data and also steal your data transmitted .

9. Have a routine check of your computer for defects and patch immediately.

10. Never leave your computer unattended, even for a short time. It is easy for a cracker to inject a virus or spyware into your system.
Read More ->>

Basic tips for Secure Browsing

0 comments



1. Never keep same password for different services you use online like gmail , facebook, bank accounts etc.,

2. Use multiple accounts so that you dont get spams in your personal/ official email address.

3. Install good Antivirus and Two way firewall.

4. Use VPN for hiding identity and secure browsing when using internet out of your home.

5. Update your OS, Antivirus, Firewall and Browsers regularly.

6. Install a good spyware & Adware scanner .

7. Never provide personal information openly in public websites. Share your information carefully.

8. Never click on unwanted or suspiicious links. It may be hacking attempt.

9. Change your passwords regularly to increase the security of your daily actiivities.
Read More ->>

Security Tips For Internet Users to secure Email

0 comments


  • Enable two step verification in you Email accounts.

  • Enable Login-notification for you email and get notification in your mobile whenever you login.

  • Set a strong password with a mix of alphabets, numbers and special charecters.

  • Enable login- notification for you facebook accounts to prevent unauthorised access.

  • Enable HTTPS in your email sttings annd your facebook account settings.

  • Never share your password with anyone. Even to your closest person.

  • Setup a recovery question which is difficult to answer and never setup an easy & guessable answer to your security question.

  • Never click on any links sent through mail or chat. It may be a link which can steal your cookie or inject any viruses.
 
    • Always check your address bar for proper website address before logging in.
     
      Read More ->>

      On this website can find all possible ways of making money online or Hacking Tricks or Any other field on internet world. But before you proceed, please subscribe for our email updates, so you can get the latest news instantly. Enter your email address to receive free make money online ,Hacking ,Security,Blogging news:

      Contact Us

      Name

      Email *

      Message *

      Blog Archive

       

      Followers

      Powered by Blogger.

      Recent Posts

      Blogger Tips and TricksLatest Tips For BloggersBlogger Tricks

      | AtiHackingTricks.blogspot.Com © 2009. All Rights Reserved |Back To Top |