PC Security
Secure your Windows with Syskey
Windows user passwords can easily be compromised by any geek who has physical access to the PC. There are lot of tools to crack, reset, disable windows accounts and password such as Hiren’s Boot CD, OphCrack, Active@ Password Changer and more… To enhance login security, Windows has a hidden security feature called [...]
Creating Strong Passwords
Passwords are an important aspect of computer security, because they are the front line protection for user accounts. A poorly chosen password of an individual may cause our entire network to be compromised. Thus, employees at RSSP are expected to follow these guidelines when selecting their passwords to keeping them secure.
Ubuntu Guide for Backup and Sync Files With Grsync
Many people care about their important data after they vanished or destroyed in some cases. Backing up data is one of the method to keep it secure. While having a backup storage it’s difficult to check and transfer only the files we’ve changed. There are many tools for automatically sync the changed files and keep local and [...]
Security Professionals or Cyber Criminals?
Most people keep in mind that people called hackers are criminals who destroy or gain unauthorized access to Network systems, Stealing government’s confidential information and so on. Yes it is, but those people are one kind of hackers. So in this article let’s see who really are the hackers. In hacking world [...]
Protect Your Computer from USB Viruses
With increasing anti-virus security in place against email-aware viruses and malware, hackers are turning their attention to less well-defended routes such as USB drives. This is the latest method that’s used by hackers to torment innocent users. However, there are ways you can protect your computer from USB and Pen drive viruses.
What is Spam – Explained
In short, spam is an unwanted mass-sent advertising email message. Spam messages are now sent by millions of people, small companies and large corporations using the addresses gathered by spammers from Usenet, web pages and from all over the Internet.
What is Phishing Scams – Explained
Phishing scams are criminal activity that combines the use of technological means (usually emails or instant messages) and social engineering in order to trick the victim into disclosing his or her personal data (usually user ID, passwords or credit card numbers) to a criminal (“phisher”).
TrueCrypt – An Encrypting Tool [Freeware]
As it pronounce as TrueCrypt, I assume you might have an idea on what this tool is all about. Well, I’d say simply it’s encrypting tool and as the same time it does the decryption part too… Obviously!!!! that’s the feature of an encryption tool where users needs to have the both encrypting & de-crypting, if [...]
Turn your USB into a Swiss Army Knife
If you are a computer geek, you might have a bunch of System Tools as Bootable CDs such as Hiren’s Boot CD, Password tools, Linux live distros (Ubuntu) and many more. But keeping all the CDs for different tool set in your pocket is not possible as you will need it anytime anywhere. This guide tells you how to put those bootable CDs [...]
Top 10 Tips for Avoiding Viruses
Adware, malware, spyware and viruses can bring your system to its knees. They are detrimental, lowering the performance of your computer. You might need to replace data. You might lose unique files. Keep the nasties away from your computer using these ten simple tips?