Make Money

Freelance Jobs Freelance Jobs
Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

20.12.11

How to remove Malware (reported by Chrome) from Blogger in 5 minutes!

Delicious Digg StumbleUpon Reddit Subscribe to RSS Feed

Have Chrome ever reported the existence of malicious software (malware) on your Blogger-powered blog before?

The reason why I posed the above question today is because I’m seeing more and more Blogger-powered blogs that have such warnings reported by Chrome and Chrome happens to be my preferred internet browser of choice. The sight is disturbing but what is more disturbing is the fact that some bloggers didn’t pay much attention to such malware reports! What were they thinking?!

I can give you plenty of reasons why bloggers should pay serious attention to the existence of malicious software (malware) on their blogs but I will only list 3 today.

Malicious software (Malware) makes you lose traffic


Take a good look at the following screenshot. Chrome clearly said that my computer may catch a virus if I visit a blog that is quite popular here in my part of the world. Chrome even provides me with a big ‘Go back’ button so that I can click on it and go back to the last safe zone. Just imagine how many potential visitors the 'infected' blog had lost!



Bad news travel fast!


Yes, bad news does travel very fast and soon people will be talking about the existence of malicious software (malware) on your blog. The news might end up on social networks and soon people might get scared to visit your blog. There goes your blog and your reputation as a blogger down the drain!

Malicious software (Malware) gives you distinct 'recognition', recognized by major search engines


Take a look at the following screenshot. Once you have malicious software (malware) on your blog, failure to remove it in a timely manner will be ‘punished’ severely by major search engines such as Google. Your blog will be labeled harmful and the label is clearly seen in search results pages (SERP). If you are searching for something via Google and stumbles upon search results with such warnings attached, would you go and visit that blog?



Alright! I have given you enough reasons and I hope you are now convinced that malicious software (malware) is not something that should be taken lightly. Now come and learn how to remove malicious software (malware) from your Blogger-powered blog in 5 minutes.

Yes, it is that easy!

How to remove malicious software (malware) from Blogger


Once you saw warnings such as the one shown earlier on Chrome, note down the ‘element’ identified as malicious. In this particular example, the malicious element originates from another blog (nasionalis1946.blogspot.com).



Go back to Chrome and visit your ‘infected’ blog. Quickly view the live page source of your blog and use Chrome’s ‘Find’ tool (hit Ctrl+F) to look for ‘nasionalis1946.blogspot.com’ in your live page source.



Once found, find out how it got there in the first place. See if it is coming from an installed widget or gadget. Based from past experience, most of the time it did came from one! In the example shown down below, the link to that malicious blog is generated after the blogger behind the ‘infected’ blog added it to his or her existing list of blogs in the Blog List gadget.



Thankfully, this is pretty easy to resolve. The blogger behind the ‘infected’ blog can simply edit his Blog List gadget from his or her Blogger Layout dashboard and remove the blog that is causing the ‘infection’ from the list. Everything should be fine after the removal has been made and the new list saved back to Blogger!

There you are! Nasty malware removal for Blogger in just 5 minutes! :)

How to set up a secure network

Delicious Digg StumbleUpon Reddit Subscribe to RSS Feed



Whether it is home or small businesses, setting up a secure network will save you a lot of anxiety and time. There are a lot of advantages in setting up a secure network, for example, you can connect, share and access several electronic gadgets such as, computers, printers, scanners and the like. You have the option of Wireless or Wired networks and it depends on your budget and convenience. This article will guide you to set up your own secure network without having to hire a professional. In a network connection Network security is vital to protect your data. You can either purchase Network security software or download free Network security tools to safe guard your network from intruders.

Planning is important before you start setting up. Fix the location, where you will be placing your equipments. Determine the number of gadgets you would want to connect and also make provisions for any additions in the future. Accordingly purchase the 802.11n router [apart from Wi-Fi it has 4 Ethernet ports], modem, Ethernet cables, connectors and fasteners. In case your gadgets are wi-fi enabled, you can avoid Ethernet cables and set up a wi-fi network.

The next step is to run the cables. Connect the cables between the Ethernet ports of the router and cable/DSL modem. It is a common practice to run the cables either under the floor on the sides of the walls so that they don’t hinder movements. Connect the PCs and other equipments to the router using the Ethernet cables you just laid. Once you are done connect the power to modem and them to router. Let the diagnostics check on modem complete before switching on the router. You can now switch on your computer and test your network connection. If you have been already using internet connection, your system will automatically connect to the internet else you will have to set up as per the instructions of the service provider.

With Ethernet connectivity, your router should automatically start working. However, you will have to install the software supplied to initialize the wireless functions if you are using Wi-fi connectivity.

Protecting your network connection is the most important step of all. You can adjust the settings of the router through its administrative page using a browser by following the instructions in the manual. It is during this stage you will change the SSID and disable SSID broadcast setting. You can also enable the firewall on the wireless router. When it comes to network security, you can find numerous Network security tools available in the market. There are companies that provide free network security software in the internet. Utilize them and protect your network from intrusions.

In case, you find the network jargons difficult, you can choose companies that supply kits according to your needs. While setting up your own network connection is easy, it indeed requires quiet an amount of physical labor. If you are not used to such hard tasks, it is worth hiring professionals who can do the job for you.


Do you have questions, comments, or suggestions? Feel free to post a comment!

18.12.11

4 General Methods You Can Use To Detect Phishing Attacks

Delicious Digg StumbleUpon Reddit Subscribe to RSS Feed


anti phishingThe internet is one of the best tools known to mankind to do basically whatever you want. But Facebook, Twitter, Gmail, Dropbox, Paypal, eBay, bank portals, and so many more sites have twins that are actually phish.



A “phish” is a term for a scam website that tries to look like a site that you know might well and visit often. The act of all these sites trying to steal your account information is called phishing. While it’s very easy to spot some sites as a phish, others aren’t nearly as easy.
Here are four different anti-phishing methods you can use so that you don’t fall victim to phishing.

1. Use a Custom DNS Service

anti phishing
You need a DNS resolution service so that you can access all the sites that you go to. Your computer doesn’t automatically know where Facebook is (as far as its Internet address, or IP address, goes), so it needs to ask a DNS resolution service for that IP address. The good thing is, all Internet users have this service, thanks to their internet service provider. The bad news is that’s all they do.
Aside from name resolution, the DNS servers at ISPs do nothing else. However, there are some custom and independent DNS companies that do more than just name resolution. They can also filter sites based on content and malware/phishing concerns. There are many out there that can do this, but the most popular one (last time I checked) is OpenDNS.


16.12.11

How to Protect Yahoo Account from Hackers

Delicious Digg StumbleUpon Reddit Subscribe to RSS Feed


How to Protect Yahoo Account from Hackers
2 Step verification or Second Sign-In verification is an addtional layer of security that protects your account even if your password gets hacked.This feature  is already available for facebook and Gmail accounts .Yahoo has also launched Second Sign-In verification for accounts of selected countries (U.S, Canadian, Indian, Philippines).It is expected to be rolled out for all users by March 2012.
If you enable Second Sign-in verification you have to enter a verification code (sent on your mobile) or Security answer after entering your password.This addtional step is required only if your login from a new computer or mobile.

How to Protect Yahoo Account from Hackers:

  • Login in to your Yahoo Account.
  • Now open your Account Information.
  • In the Sign-In and Security section look for the Second Sign-In Verification and click on it.
17 How to Protect Yahoo Account from Hackers
  • Check the box to turn on the Second Sign-In Verification feature
21 How to Protect Yahoo Account from Hackers
  • Now a pop-up window will open, in this give your mobile number on which you want to receive verification codes and click on Receive SMS.
31 How to Protect Yahoo Account from Hackers
  • You will receive Confirmation Code on your mobile, enter this code and click on Verify button.
41 How to Protect Yahoo Account from Hackers
After completion of verification process whenever you will login from a new computer ( like cybercafe) you will receive a confirmation code on your mobile and without it your account cannot be accessed.

Google Removes 22 Dangerous Apps from Android Market

Delicious Digg StumbleUpon Reddit Subscribe to RSS Feed


Over the past week Google has removed 22 malicious apps from its official Android Marketplace again highlighting the weakness of Google’s (almost non-existant) approval process. The malicious apps were spotted by the mobile security company Lookout who then notified Google. In response Google removed the apps.
The apps all used the RuFraud malware to send SMS messages to premium rate numbers. The apps didn’t affect users in the USA, but it did target users in Great Britain, Italy, Israel, France, and Germany as well as Russia, Azerbaijan, Armenia, Georgia, Czech Republic, Poland, Kazakhstan, Belarus, Latvia, Kyrgyzstan, Tajikistan, Ukraine and Estonia.
The initial batch of apps that Google posted in the Android Market place appeared as horoscope apps with an unclear ToS pointing out the charges. Once the app started, tapping on “Continue” meant the user accepted the terms.
Next come apps designed to capture a wider audience: 3 wallpaper apps for popular movies (including Twilight), and 3 apps claiming to be downloaders for popular games such as Angry Birds and Cut the Rope.
The final wave of apps again masqueraded as free versions of popular games. In total 22 apps appeared in the Android Market and were downloaded over 14,000 times. Do the maths. That is a very quick way to make some money and Google helped by not having a decent app review process.

Google Pays out $6000 to Security Researchers for Chrome 16

Delicious Digg StumbleUpon Reddit Subscribe to RSS Feed


Google has released Chrome 16 (16.0.912.63) for Windows, Mac, and Linux. As well as improvements to Sync and the ability to create multiple profiles on a single instance of Chrome, Chrome 16 also contains some important security fixes.
The security fixes (and related awards) are:
  • [81753] Medium CVE-2011-3903: Out-of-bounds read in regex matching. Credit to David Holloway of the Chromium development community.
  • [95465] Low CVE-2011-3905: Out-of-bounds reads in libxml. Credit to Google Chrome Security Team (Inferno).
  • [$500] [98809] Medium CVE-2011-3906: Out-of-bounds read in PDF parser. Credit to Aki Helin of OUSPG.
  • [$1000] [99016] High CVE-2011-3907: URL bar spoofing with view-source. Credit to Luka Treiber of ACROS Security.
  • [100863] Low CVE-2011-3908: Out-of-bounds read in SVG parsing. Credit to Aki Helin of OUSPG.
  • [101010] Medium CVE-2011-3909: [64-bit only] Memory corruption in CSS property array. Credit to Google Chrome Security Team (scarybeasts) and Chu.
  • [101494] Medium CVE-2011-3910: Out-of-bounds read in YUV video frame handling. Credit to Google Chrome Security Team (Cris Neckar).
  • [101779] Medium CVE-2011-3911: Out-of-bounds read in PDF. Credit to Google Chrome Security Team (scarybeasts) and Robert Swiecki of the Google Security Team.
  • [$1000] [102359] High CVE-2011-3912: Use-after-free in SVG filters. Credit to Arthur Gerkis.
  • [$1000] [103921] High CVE-2011-3913: Use-after-free in Range handling. Credit to Arthur Gerkis.
  • [$1000] [104011] High CVE-2011-3914: Out-of-bounds write in v8 i18n handling. Credit to SÅ‚awomir BÅ‚ażek.
  • [$1000] [104529] High CVE-2011-3915: Buffer overflow in PDF font handling. Credit to Atte Kettunen of OUSPG.
  • [$500] [104959] Medium CVE-2011-3916: Out-of-bounds reads in PDF cross references. Credit to Atte Kettunen of OUSPG.
  • [105162] Medium CVE-2011-3917: Stack-buffer-overflow in FileWatcher. Credit to Google Chrome Security Team (Marty Barbella).
  • [107258] High CVE-2011-3904: Use-after-free in bidi handling. Credit to Google Chrome Security Team (Inferno) and miaubiz.
Note that the referenced bugs are kept private by Google until a majority of Chrome users have updated.

5.12.11

Wi-Fi Security: Cracking WPA With CPUs, GPUs, And The Cloud

Delicious Digg StumbleUpon Reddit Subscribe to RSS Feed

Is your network safe? Almost all of us prefer the convenience of Wi-Fi over the hassle of a wired connection. But what does that mean for security? Our tests tell the whole story. We go from password cracking on the desktop to hacking in the cloud.
We hear about security breaches with such increasing frequency that it's easy to assume the security world is losing its battle to protect our privacy. The idea that our information is safe is what enables so many online products and services; without it, life online would be so very different than it is today. And yet, there are plenty of examples where someone (or a group of someones) circumvents the security that even large companies put in place, compromising our identities and shaking our confidence to the core.
Zoom
Understandably, then, we're interested in security, and how our behaviors and hardware can help improve it. It's not just the headache of replacing a credit card or choosing a new password when a breach happens that irks us. Rather, it's that feeling of violation when you log into your banking account and discover that someone spent funds out of it all day.
In Harden Up: Can We Break Your Password With Our GPUs?, we took a look at archive security and identified the potential weaknesses of encrypted data on your hard drive. Although the data was useful (and indeed served to scare plenty of people who were previously using insufficient protection on files they really thought were secure), that story was admittedly limited in scope. Most of us don't encrypt the data that we hold dear.
At the same time, most of us are vulnerable in other ways. For example, we don't run on LAN-only networks. We're generally connected to the Internet, and for many enthusiasts, that connectivity is extended wirelessly through our homes and businesses. They say a chain is only as strong as its weakest link. In many cases, that weak link is the password protecting your wireless network.
There is plenty of information online about wireless security. Sorting through it all can be overwhelming. The purpose of this piece is to provide clarification, and then apply our lab's collection of hardware to the task of testing wireless security's strength. We start by breaking WEP and end with distributed WPA cracking in the cloud. By the end, you'll have a much better idea of how secure your Wi-Fi network really is.

Large Password List: Free Download Dictionary File for Password Cracking

Delicious Digg StumbleUpon Reddit Subscribe to RSS Feed

For password cracking, you can choose two different methods 1. Dictionary Attack 2. Brute Force Attack. The Dictionary attack is much faster when compared to Brute force attack.(There is another method named as "Rainbow table", it is similar to Dictionary attack).

In order to achieve success in dictionary attack, we need a large size of Password list.

Here is the list of 1,717,681 passwords(Free to download):
http://dazzlepod.com/site_media/txt/passwords.txthttp://adf.ly/42biE

If you didn't get success using the above password list, then you can get the UNIQPass dictionary file from dazzlepod.


UNIQPASS is large password list useful for use with John the Ripper (JtR) wordlist mode to translate even more hashes into cleartext passwords. While we have had good success rate with our standard password list passwords.txt (17.5MB), we realized the list can be made more useful and relevant if we include commonly used passwords from the recently leaked databases belonging to large websites. As a result, we have compiled millions of unique passwords into UNIQPASS.

UNIQPASS is available for purchase at only $4.99; see preview of UNIQPASS from these 2 million randomly selected passwords (18.9MB).

Get the UNIQPass Dictionary file from here:
http://dazzlepod.com/uniqpass/

10 Tips for Shopping Safely Online

Delicious Digg StumbleUpon Reddit Subscribe to RSS Feed

Whether you’re shopping the holiday sales, or just looking to avoid the craziness at the mall, shopping safely online can be a challenge, especially if you stray from the larger e-tailers to get a better deal from a lesser known site. Here are 10 tips to help you gain some peace of mind while shopping online.

1. Check the seller’s customer satisfaction ratings.


Other people’s experiences with the merchant that you are considering are often an excellent gauge of what to expect when you order. Review other user’s comments and check out the seller’s rating on sites like Google Shopping. Low “star” ratings may provide a red flag that cautions you to find a more reputable seller.

2. Check the Better Business Bureau site to see if there are a large number of complaints about the seller.


The Better Business Bureaus of the United States and Canada are excellent resources to find out specific information about merchants, including whether or not they have any complaints against them related to delivery, product issues, or refund or exchange problems. You can also obtain their business addresses and corporate contact information, which might allow you to circumvent the frontline call center circus of endless automated prompts (i.e. “Press 1 to speak to a semi-live person”).

3. Whenever possible, use a credit card for payment.


According to the American Bar Association’s website, safeshopping.org, it is best to use a credit card when paying online because federal law protects credit card users from fraud and limits individual liability to $50. Some card issuers might even waive the $50 liability fee or pay it for you.

Consider opening a separate account for buying online so your online purchases don’t get lost in the sea of Starbuck’s coffee transactions in your online banking ledger. Also, look into virtual credit cards if your card issuer offers this service. Some card issuers will give you a one-time use virtual card number that you can use for a single transaction if you are concerned about the security of a particular merchant.

4. Never enter your credit card information on a page that is not encrypted.


When using the online checkout process of a seller, always make sure that the web address has “https” instead of “http.” Https ensures that you are using an encrypted communications path to transmit your credit card information to the seller. This helps to ensure against eavesdropping on your transaction.

5. Go directly to the seller’s site rather than clicking a “coupon” link that was sent to you by an 
unknown source.
 
Scammers can often use a tactic called cross-site scripting to craft a hyperlink that appears to be the actual merchant site but actually relays your credit card information to the scammer when you put your payment information into the payment web form. Unless you can verify that a coupon came from the actual vendor’s site to which you have already subscribed, it’s best to avoid random coupons with unknown origins.

6. If you are ordering from a shared computer (i.e. the library, computer lab, or a work PC), log out of the shopping site and clear the browser history, cookies, and page cache.

This seems like a no-brainer, but if you’re using a shared machine, always log out of the store website and clear your browser’s page cache, cookies, and history when you are finished ordering something, or the next guy who sits down at the PC you were using might just have himself a little shopping spree on your dime.

7. Never give your social security number or birthday to any online retailer.


Vendors should never ask you for your social security number unless you are applying for in-store financing or something to that effect. If they are trying to require you to enter a social security number just to order a product, then they are most likely scammers. Run away fast. While your birthday may seem like an innocent enough piece of data to give out, it’s just one more of the three to four data elements needed by a scammer to steal your identity.

8. Find out the seller’s physical address.


If your seller is in a foreign country, returns and exchanges may be difficult or impossible. If the merchant only has a P.O. box listed, then that may be a red flag. If his address is 1234 in a van down by the river, you may consider shopping elsewhere.

9. Check out the seller’s return, refund, exchange, and shipping policies.
 
Read the fine print and watch out for hidden restocking fees, crazy high shipping charges, and other added fees. Beware of “coupon clubs” that the seller might try to get you to sign up for during your purchase. These clubs may save you a few dollars, but often they involve monthly billing for the privilege of joining.

10. Check the seller’s privacy policy.


While we might not think about it, some sellers resell our personal information, buying preferences, and other data to market research companies, telemarketers, and spammers. Read carefully and always make sure that you are opting-out and not opting-in when asked whether you want to have your information shared with “3rd parties” (unless you like a lot of spam in your e-mail). You may also want to obtain a separate e-mail account to use while shopping online to avoid clogging up your personal e-mail box with the barrage of sale ads and other junk mail that is frequently sent out.

Be smart, be safe, and know that there are groups such as the Internet Crime Complaint Center that can help you if you think you’ve been outright scammed. Check out our other resources below on how to shop smart.

Google+ Security, Privacy, and Safety

Delicious Digg StumbleUpon Reddit Subscribe to RSS Feed

You've heard all the hype about Google+. You may have even dived in, gotten yourself an account, and started building your "circles" of friends, but have you taken the time to see what kind of privacy and security features that Google has baked into Google+?

Facebook, Google+'s main competitor, has adapted its privacy and security settings over time, based on its user's concerns and other factors. Facebook has achieved a fairly robust system of opt-in, opt-out, group, and friend-based security and privacy measures that are still evolving today.

It's ultimately up to the Google+ developers as to whether they want to follow Facebook's lead or go in a completely different direction with regards to security and privacy features.

The jury is still out on whether or not Google+ has done a good job implementing its privacy and security features. We all remember Google's first major foray into the world of social networking, also known as Google Buzz. Buzz's initial privacy settings left a lot to be desired and a class action lawsuit was filed as a result. Has Google learned it's lesson? We'll have to wait and see.

Here are some tips on how you can use Google+'s currently offered security and privacy options to make your Google+ experience a safe one.

To begin, click on the gear icon in the top-right corner of your Google+ home page.


1. Restrict the visibility of your Google+ circles to increase your privacy

Unless you want everyone in the world to be able to see who your friends are, you'll probably want to limit access to this information.
To restrict who can see your friends and circles:
Click the "Profile and Privacy" link from the "Google+ Accounts" page:
Click the "Edit Network Visibility" button from the "Sharing" section of the page..
Uncheck the box for "Show People In" if you don't want anyone, including those in your circles, to be able to see who your friends are. Your other option is to leave the box checked, and choose whether you want your friends to be able to see who is in your circles, or you can allow the whole world to see this information. The current default is to allow everyone in the world to see who are in your circles.
If you want to be extra private you can prevent the fact that you have been added to other people's circles by unchecking the box that says "Show people who have added you to circles" at the bottom of the "Edit Network Visibility" pop-up box.

2. Remove global access to the parts of your personal profile that you don't want to share with the world

Identity thieves love personal details such as where you went to school, where you have worked, etc. These details are a gold mine for them. If you make these tidbits of information available for the whole world to see, you are just asking for them to use them to steal your identity. It's best to restrict access to most of these details, allowing only your friends the ability to see this information.
Anytime you see a globe icon next to something in Google+ it means that you are sharing that item with the world and not just with those within your circles.
To restrict certain parts of your profile to only be visible to people within your circles:
Click the "Profile and Privacy" link from the "Google+ Accounts" page.
Click the "Edit visibility on profile" link under the "Google Profiles" section of the page.
On the page that opens, click each item in your profile to modify its visibility settings. Click the drop-down box and change the items that you don't want revealed to the world.
Click the "Done Editing" button in the red bar near the top of the screen when you are finished modifying your profile visibility.
If you don't want your information made available to search engines, you should uncheck the "Help others find my profile in search results" box from the "Search visibility" section at the bottom of the page.

3. Restrict visibility of individual posts in your Google+ stream

Google+ allows you to restrict visibility of individual posts (i.e. status updates, photos, videos, links, etc...). When you're posting something in your Google+ stream on your homepage, look at the box underneath the text box you are typing your post into. You should see a blue box with the name of your default circle (i.e. Friends). This indicates the people that your post is about to be shared with. You can remove visibility for the post by clicking the "X" icon inside the blue box. You can also add or remove an individual's or circle's ability to see the post.
As Google+ evolves, it will undoubtedly feature additional privacy and security options. You should check the "Profile and Privacy" section of your Google+ account every month or so to make sure that you haven't been opted-in to something you would have rather been opted-out of.

2.12.11

Easy way to recover forgotten administrator password in windows

Delicious Digg StumbleUpon Reddit Subscribe to RSS Feed

recover forgotten administrator password in windows
here’s a quick and easy way to get your administrator password Reset by using a software called “Windows key enterprise”. Remember this software will not give you back the forgotten password, instead it will reset the current admin password. So think Twice before trying this tweak on your friend’s or spouse’s PC, no doubt they will come to know about this. you will require a blank CD or a USB pendrive.
Download |Size– 5.29 MB
.
.
How do i use Windows Key enterprise tool?
  1. Download the above file and extract the contents.
  2. Now Launch Windows Key enterprise and create a password reset bootable CD or USB pendrive to make the application Bootable, on any computer you have access to.
  3. Now go to locked computer and insert the Bootable CD or USB Pendrive you just created.
  4. Reboot the locked computer and follow the instructions
Features:
recovery rate for All Windows versions
Resets local Administrator password
Resets passwords for other local accounts
Resets Domain Administrator password
Resets local policy settings
Resets secure boot options
Displays account properties
Supports RAID/SCSI/SATA drives Updated

Delete Autorun.inf Virus without any Software!

Delicious Digg StumbleUpon Reddit Subscribe to RSS Feed

There are Numerous softwares available that exclusively deal with Autorun.inf and other Autorun viruses, for example ‘USB Disk Security‘. But Inspite of installing such kind of software, Sometimes you might accidentally open your USB disk Drive (Pen-drive) without looking at the warning by your Antivirus Software and thus Affecting your System with Autorun.inf virus. Once Autorun.inf gets control on your System, it will repeatedly Block any USB Scanning Software preventing it from deleting. It also Restricts you from opening hard drives on a double click.
In such cases, the Traditional Method of deleting Suspicious Programs Using Command Prompt is quite Useful. So Lets start with the Steps:
# 1. Open command prompt. Go to start > Run, and type “cmd” . Press enter.
# 2. Type “cd\” and press enter to get to the root directory of your System.
# 3. Type “attrib -h -r -s autorun.inf” and press enter. This will look for autorun.inf in the selected Drive.
# 4. Type “del autorun.inf” and press enter. This will delete autorun.inf virus from the selected Drive.
How to Delete Autorun.inf Virus from pendrive without any Software
# 5. Repeat the above Steps for other drives. To navigate to other Drives, First type “cls” to clear your ‘command prompt’ then type “d:” . Repeat the Steps for all the Drives including your USB Disk Drive.
# 6. Restart your System.



18.11.11

McAfee Internet Security Suite - Get it For Free!!

Delicious Digg StumbleUpon Reddit Subscribe to RSS Feed



Get McAfee Internet Security Suite for free! Recently the world’s leading dedicated security company McAfee announced that it has collaborated with social networking gaint Facebook to provide discounted security services to all of its 350 million Facebook members. Wasn't that good!!!
In order to get your free McAfee Internet Security Suite just follow this steps.

17.11.11

Enable Two-Step authentication for your google account

Delicious Digg StumbleUpon Reddit Subscribe to RSS Feed



I can make sure that the worst night-mare to me or to you is to lose your Google account due to hack attempts or phishing etc.., because all our Google accounts contains fully personal, confidential information. So worlds leading search engine giant Google who also provides many services like Gmail, Picasa, Blogger, ect. recently introduced advanced sign-in with two step verification process which in turn makes your Google account more secure from hack attempts and phishing. Lets see how it works and how to work with it.

Tips to protect your PC from USB threats

Delicious Digg StumbleUpon Reddit Subscribe to RSS Feed



From the past few years there is a tremendous increase in the usage of usb devices which in turn makes many users to be affected by usb threats like Malware, Trojan, Virus etc.., So it is very important to protect your computer from usb threats. In this post we will know some of the easy ways to protect your computer from usb threats.
The steps given below are very easy and can be done by beginners too.



 

HOW TO HACK Copyright © 2010 LKart Theme is Designed by Lasantha