Lost your Android device? Couldn’t find it? Do not worry Google will locate your device for you. This was initially introduced by Apple by there Find My iPhone, Although it is a late catch up Google it works really well. You can remotely ring your Android device and you can also wipe all the date in your […]
Archive | Hack & Attacks RSS feed for this section
September 8, 2012
One of my clients running their internal Mail Server in Windows XP SP2. And some times an event is logged as “TCP/IP has reached the security limit imposed on the number of concurrent TCP connect attempts” and the Event ID: 4226. For security (malware infections) reason since Windows XP SP2 release it limits 10 concurrent connections […]
May 11, 2012
Hello Folks, Once again, I’m back with another piece of information which is useful for the users. Almost all the internet audience will be targeted on this since it’s a privacy & protecting your self over the internet. Okay!! Today’s topic is about the famous malware which is spreading over the net anonymously these days & injecting users computer […]
December 31, 2011
Session Hijacking also known as a Sidejacking, is an attack stealing someones web session to gain unauthorized access. What is a web (HTTP) session Each & every time a user log into Facebook, Twitter or your banking account… etc, the web server will give the user a session ID or a token while the web browser stores […]
December 9, 2011
Google now has a security feature called 2-step verification which provides a secure way of login to your Gmail account. This would probably help when you you’re using a public PC or your friend’s PC. Who knows he/she has a key logger inside the PC ;). In this tutorial I’ll explain how to configure it […]
November 16, 2011
Passwords are an important aspect of computer security, because they are the front line protection for user accounts. A poorly chosen password of an individual may cause our entire network to be compromised. Thus, employees at RSSP are expected to follow these guidelines when selecting their passwords to keeping them secure.
November 15, 2011
Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate.
November 1, 2011
Most people keep in mind that people called hackers are criminals who destroy or gain unauthorized access to Network systems, Stealing government’s confidential information and so on. Yes it is, but those people are one kind of hackers. So in this article let’s see who really are the hackers. In hacking world people called hackers […]
October 23, 2011
With increasing anti-virus security in place against email-aware viruses and malware, hackers are turning their attention to less well-defended routes such as USB drives. This is the latest method that’s used by hackers to torment innocent users. However, there are ways you can protect your computer from USB and Pen drive viruses.
October 9, 2011
Spyware is a type of software intended to collect information from computers without permission of the user and then send that stolen information over the Internet to the spyware designer. The type of information collected varies greatly.