Archive | PC Security RSS feed for this section

How to Remove NewFolder.exe Virus

December 28, 2011

3 Comments

combofix 100x100

Newfolder.exe is one of the most irritating viruses that affect your system through Pen drives. Once your system gets affected, it will start creating new folders resembling the name of the parent folder. If your folder name is “smn”, it will create the virus file “smn.exe”

Continue reading...

MD5 Hash for Beginners

November 28, 2011

0 Comments

MD5 hash….I think you all had listen this word more often, but most of them don’t know what is it and why is it…. OK i am not going to the detailed information of MD5 because it is somewhat hard to understand, rather than i will say its usage in daily life..

Continue reading...

Secure your Windows with Syskey

November 18, 2011

2 Comments

key geeklk

Windows user passwords can easily be compromised by any geek  who has physical access to the PC. There are lot of tools to crack, reset, disable windows accounts and password such as Hiren’s Boot CD, OphCrack, Active@ Password Changer and more… To enhance login security, Windows has a hidden security feature called syskey gives us […]

Continue reading...

Creating Strong Passwords

November 16, 2011

1 Comment

Creating Strong Passwords 100x100

Passwords are an important aspect of computer security, because they are the front line protection for user accounts. A poorly chosen password of an individual may cause our entire network to be compromised. Thus, employees at RSSP are expected to follow these guidelines when selecting their passwords to keeping them secure.

Continue reading...

Ubuntu Guide for Backup and Sync Files With Grsync

November 4, 2011

0 Comments

grsync thumbnail

Many people care about their important data after they vanished or destroyed in some cases. Backing up data is one of the method to keep it secure. While having a backup storage it’s difficult to check and transfer only the files we’ve changed. There are many tools for automatically sync the changed files and keep […]

Continue reading...

Security Proffessionals or Cyber Criminals?

November 1, 2011

0 Comments

hacker thumbnail

Most people keep in mind that people called hackers are criminals who destroy or gain unauthorized access to Network systems, Stealing government’s confidential  information  and so on. Yes it is, but those people are one kind of hackers. So in this article let’s see who really are the hackers. In hacking world people called hackers […]

Continue reading...

Protect Your Computer from USB Viruses

October 23, 2011

0 Comments

USB 100x100

With increasing anti-virus security in place against email-aware viruses and malware, hackers are turning their attention to less well-defended routes such as USB drives. This is the latest method that’s used by hackers to torment innocent users. However, there are ways you can protect your computer from USB and Pen drive viruses.

Continue reading...

What is Dialers – Explained

October 21, 2011

0 Comments

Dialers

Dialers are small computer programs designed to establish a connection to the Internet or other network over a telephone line. Virtually every operating system has such a program as a part of the Internet connection tools.

Continue reading...

What is Browser Hijackers – Explained

October 20, 2011

0 Comments

Browser Hijackers

Browser Hijackers are Adware/Malware programs that change the way your web browser behaves. They can: Replace your homepage and/or error page with its own, Add their own items to your Favorites/Bookmarks list, Display unwanted tool-bars Hijack your search queries and provide you their own, usually low quality, results. Browser hijackers usually perform all these actions […]

Continue reading...

What is Worms – Explained

October 17, 2011

0 Comments

Worm

Computer worms are malicious, stand-alone programs with the ability to self-replicate. Unlike viruses, they do not need host files to spread; they use computer networks, instead. They usually scan the Internet until they find a system with a security exploit and then use it to install a copy of the worm in that system.

Continue reading...