Keybloggers

Keyblogger is basically a spyware. As indicated by its namesake, it logs or recors your keystrokes. When you type in your username or password, this information is logged and amde available to the hacker. Keyloggers can either be physical or...

Precaution to be taken in Cybercafes

Elementary precautions Cyber cafes are very popular in our counry. The revolutions in technology ensures that everyones has a use for internet. People mainly use cyber cafes for browsing internet,checking thier mails and chatting. The first thing...

Firewalls

A firewall is a part of a computer system used to prevent any unauthorized access and allows safe communications. It can be implemented by hardware or software, or combination of both.Each firewall has different kind of authorisation criteria. The...

Anti virus Software Review – II

There are lots of Anti virus software available in market today, and all claims to be very much effective and providing 100% protection. Before you choose any Anti virus solution first find out the system requirement. Then you can decide which...

Computers and people

Computer is a fast speeding work system. Many uses from this computer, perfect work, it is better than that manual work. Man can do heavy work. Ten men work and eight hours works, that system do it easy in an hour. This is capacity of computer...

How intranet security works? Part V

The improvement to be applied depends on the amount of security required. Can be applied to security improvements in the following ways: When you specify attributes in the S-http hyperlinks Insurance client browsers need to know when...

How intranet security works? Part IV

Other methods of authentication: Hash Functions What is it? Using the password you typed, the browser creates a string using the password and other information including AuthRealm (authentication domain) and passes through the MD5...

Local Access Control. What is it? The LACF allows different access controls for directory or subdirectory of the tree, the file is usually called. Htaccess. One can deny the use of potentially hazardous SSI which cause the server to execute...

How intranet security works? Part II

3. Application examples policy Password policy: They are one of the most important policies, because usually the passwords are the first and perhaps only way authentication, and therefore the only line of defense against attacks. They establish...

How intranet security works? Part I

Definition of an intranet: A standards-based infrastructure and Internet technologies to support information sharing within a well defined and limited. Problem: Although an intranet is a private network in which the groups have well-defined and...

Hiding rar file in a Jpeg file

  1) Place the image in c:\. Then place the .rar file that you want to bind with the the image in the same directory. 2) Open up the command line by clicking, start, run, then type cmd, press enter. 3) Navigate to the c:\ by typing, `cd...

noikia secret codes

NOKIA CODE : * To Restore Battery Setting *#7780 * To Know Manufacture Date *#3283# & *#0000# * To Stop Sim clock *#746025625# * To Stop Operator Logo *#67705646# * To Reset Phone Timer *#73#* To Warranty *#92702689#

Check Your Nokia Mobile Quality

  Hai, Dear Friends any one buy a new nokia mobile? please use this code then only u know the mobile phone is original or duplicate.   Check Mobile Quality(NoKiA) Press *#06#If 7th & 8th digit is:00-Best & Original01 or 10-Gud02 or 20-Not...

Whats the power of ur Antivirus ?

A good way to check whether your Anti-virus gives u a real time protection... Just do this Test !Its simple as "copy-paste" !!Just follow the steps:Open Notepad and paste the code given...

Prevention from Pen drive attack

Most of the virus attack is made on our PC through programs entering our system through pendrive,cd etc.If we can prevent them to an extent,we can save our computer to a greater extent. Most of the programs enter our system without our...

Tips for Safe Internet browsing

The 21st century is the age of computers and World Wide Web. Everyone starting from child to old is accustomed with web browsing. The question arises how much we are safe on the Internet?  Hackers and malicious software poses a great threat to our...

Beware of the fraud emails

Today morning when I opened my email account I was surprised to see this message in the my inbox ICICI bank limited...account protection message Protect Your Account Dear Customers To protect your account, our monitoring process has temporarily...

Hi friends, As we all know the viruses and spam in the internet is increases rapidly , the most of the viruses and spams are present in the form of virus bomb which can easily enter in your computer through the network connections , you can...

"Computer Virus". The term which is known to any user of computers. It makes a lot of destruction to your computer. The worst part is some viruses not only affect to your computer but also all the computers connected to your computer. This will be...

Powered by CjBlog