Sunday, 23 August 2015

Computer Security Tips and Tricks


Top 10 Computer Security Tips


computer security tips
computer security tips : :
1.Use “anti-virus software” and keep it up to date.
2.Don’t open e-mails or attachments from unknown sources. Be suspicious of any unexpected e-mail attachments even if it appears to be from someone you know.
3.Protect your computer from Internet intruders – use “firewalls.”
4.Regularly download security updates and “patches” for operating systems and other software.
5.Use hard-to-guess passwords. Mix upper case, lower case, numbers, or other characters not easy to find in a dictionary, and make sure they are at least eight characters long.
6.Back-up your computer data on disks or CDs regularly.
7.Don’t share access to your computers with strangers. Learn about file sharing risks.
8.Disconnect from the Internet when not in use.
9.Check your security on a regular basis. When you change your clocks for daylight-savings time, reevaluate your computer security.
10.Make sure your family members and/or your employees know what to do if your computer becomes infected.
computer security tips, computer security tricks, top 10 computer security tips, simple computer tricks, computer security tips 2013, computer security tips for employees, computer security tips for the workplace,Computer security tips and tricks

Password Hacking Tips



Password Hacking Tips and Tricks

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :
1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even ‘well-chosen’ passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.
Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.
2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user’s personal information.
Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:
* blank (none)
* the word “password”, “passcode”, “admin” and their derivatives
* the user’s name or login name
* the name of their significant other or another person (loved one)
* their birthplace or date of birth
* a pet’s name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard — qwerty itself, asdf, or qwertyuiop)
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.
and so on….
In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.
A password containing both uppercase & lowercase characters, numbers and special characters too; is a strong password and can never be guessed.
Check Your Password Strength
3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.
Always disable or change the applications’ (both online and offline) default username-password pairs.
4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.
Long is the password, large is the time taken to brute force it.
5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on “enter” or “login” login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.
Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.
It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.

Recent Search On Password Hacking Tips

Password Hacking Tips, Password Hacking Tricks, gmail hacking tricks, facebook hacking tricks, orkut hacking tricks, gmail hacking tips, facebook hacking tips, orkut hacking tips, gmail password hacking tips, facebook password hacking tips, gmail password hacking tricks, facebook password hacking tricks, orkut password hacking tricks, password hacking tips and tricks, basic hacking tips, basic hacking tricks, password hacking software, password hacking tool, password hacking technique, password hacking program, administrator password hacking tips, how to hack password, tips for password hacking, tricks for hacking password, tricks for password hacking, all types password hacking tips

How to Protect Hacking




How to Protect Hacking, Valuable tips to prevent hacking, How to Protect Hacking of Facebook, How to Protect Hacking of Computer, How to Protect Hacking of Gmail, Protect Hacking Tips, Tips to prevent hacking, Tricks for prevent hacking, tips and tricks for prevent hacking
Install or Update Your Antivirus Software: Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users’ knowledge. Most types of antivirus software can be set up to update automatically.
Keep Your Firewall Turned On: A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection.
Prevent hacking of your G-Mail Account: Some one mail you that we have a business opportunity for you. And say click on this link for more details. Whenever you click on that link, a gmail screen shown including message “Your session has expired login again”. Its a clone of gmail screen that can hack your password.
Install or Update Your Antispyware Technology: Spyware is just what it sounds like—software that is surreptitiously installed on your computer to let others peer into your activities on the computer. Some spyware collects information about you without your consent or produces unwanted pop-up ads on your web browser. Some operating systems offer free spyware protection, and inexpensive software is readily available for download on the Internet or at your local computer store. Be wary of ads on the Internet offering downloadable antispyware—in some cases these products may be fake and may actually contain spyware or other malicious code. It’s like buying groceries—shop where you trust.
Keep Your Operating System Up to Date: Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates to ensure your computer has the latest protection.
Don’t Judge on Prize or Lottery E-mail: Someone mail you that you won the Lottery. And request you to give information regarding bank account or others. They keep your data’s and demanding the some money for Draft charges. It’s totally fraud.
Be Careful What You Download: Carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software. Never open an e-mail attachment from someone you don’t know, and be wary of forwarded attachments from people you do know. They may have unwittingly advanced malicious code.
Turn Off Your Computer: With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being “always on” renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning the computer off effectively severs an attacker’s connection—be it spyware or a botnet that employs your computer’s resources to reach out to other unwitting users.
Password hacking tips
Tips for Hack any Mobile Phone
Recent Search on how to protect hacking
How to Protect Hacking, Valuable tips to prevent hacking, How to Protect Hacking of Facebook, How to Protect Hacking of Computer, How to Protect Hacking of Gmail, Protect Hacking Tips, Tips to prevent hacking, Tricks for prevent hacking, tips and tricks for prevent hacking.