Showing posts with label Protect. Show all posts
Showing posts with label Protect. Show all posts

21.9.12

How to Protect Your Hotmail Account From Hackers

Hotmail is one of the easiest email accounts to be hacked. There are various reasons behind this like Phishing scams, insecure internet connections, unsafe computers, and user error can all lead to your accounts getting hacked. Of course hackers are very smart to hack any account, but Hotmail is more insecure. In this case you need some effective solutions that can help you to protect your Hotmail email account from hackers and spammers. Here are some very useful tips:

1. First of all you must avoid public computer or cyber café to open your email id. Mostly hackers take the help of the public computers to hack any account. These computers are not protected from viruses so your emails account is also at risk.

2. You can be the victim of phishing scams so you must be careful about it. You should not respond to any suspected or unexpected email. These types of emails always want you to provide your personal information or account login details. So never respond these types of emails.

3. You must change your password regularly or once in a month. It will protect your account from hackers.

4. You should keep your password in mixed words of capital letters and small letters. Do not use single and short word, always use more than nine letter words in mixed letters or alphanumeric words.

5. You must install a good antivirus and antispyware protection program in your computer and always update it. Try to install very effective antivirus program for your computer security.

6. You need to keep your password very private and personal. So you must avoid sharing it with anyone not even with your best friend or loved one.

7. You have to be careful while changing your password that it must not be the same or you should not use the password you already have used ever. It is quite possible that hackers might have tried to steal your information through your ID and your repeated password can help them a lot. They will surly use it for knowing your personal information like bank accounts and other important information about you and your family.

8. You must check and monitor your email account and if you find any suspicious activity there change your password immediately.

You must remember these tips while using a public computer:-

• You must sign out of your accounts

• Do not forget to clear the web browser history, cookies and cache before leaving the computer.

Vtechelp is world's leading Hotmail Support service provider offering the best of remote tech-support service. Visit us to get any kind of technical help for Hotmail help.


View the original article here

27.3.12

How to Protect Administrative Login Access by Specific User Locations

AppId is over the quota

One of the ways to prevent hackers from gaining access to your PHP administrative logins is to restrict access to the administrative directory. Using a web server directive called, deny all and allow from the web server can be configured to only allow access to a directory by a specific IP address or a range of IP addresses.

While using this method of blocking access by an IP address you are able to successfully login and access your web site while at the same time you are protecting your administrative login from unwanted users or hackers.

A folder or directory on your web site is the container used to hold files and sub folders or sub directories. Using a more proactive method of preventing hackers from attacking your web site. You can simply block access to any given directory by placing a ".htaccess" file into a specific directory location and then enter the web server directives into the access file which will tell the server what IP address to accept and which IP address to block.

If we use the approach to block everyone from the administrative directory and then only to allow a specific set users access we are then effectively blocking all users except for those we wish to have access to a given directory. This method can be used both for administrative logins as well as any other directory which you may want to control access.

The code below is an example of what you would need to enter into an access file. The ".htaccess" file is used to configure how a web site functions or responses to a given request. This access file is a hidden file on a Linux web server. There are many commands you can place in your access file however, I will only cover how to, allow a specific IP address or how to, allow a range of IP addresses access to a directory where the ".htaccess" file has been placed.

Content of this configuration file should look something like the following:
AuthUserFile /dev/null
AuthGroupFile /dev/null
AuthName "Access Control"
AuthType Basic
order deny,allow
deny from all
# white list a specific address
allow from 208.111.12.1
allow from 168.34.77.15
# white list a range of addresses
allow from 191.16.

Any line that starts with a pound sign is ignored. Only the specific IP addresses listed in the code above will have access to the directory structure where the ".htaccess" file has been placed, this same restriction applies to all sub folders or sub directories.

The settings of the ".htaccess" file flows downward. This means that you only want to place the access file at the root level of the directories you wish block. If you place this file too high in your directory structure you will also block the traffic that you want to have access to your web site.

No web site is a hundred percent secure. With all the security measures you place on your web sites you should always backup your account to insure that you will be able to restore your web site in case of an unforeseen event.

However using this method you can block access to any given directory and thus have a greater peace of mind knowing that you have implement a more proactive method to secure your web site than simply keeping your PHP scripts up to date.

About The Author

I have been doing web design for many years now. As a web designer I build web sites using HTML, JavaScript and CSS or by using a PHP based site such as Joomla or WordPress. I code my web sites by hand and may use a WYSIWYG type editor to adjust CSS Elements on a web page.

Come visit my Web Design site by coming to: BooneWebMaster.com


View the original article here

3.1.12

Avoiding Computer Viruses And How To Protect Yourself

AppId is over the quota

First let's look at what a virus is and what it is not. Let us look at Wikipedia's definition,

"A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. "

So there you have it. Quite technical and just a hunch but you're probably thinking "why do I need to know that?" Well you don't actually. You really need software protection and perhaps some insight into the hows and whys to avoid such catastrophes.

Let's deal first with why having a virus, malware or spyware can be so devastating. Are you backing up your important data? If you're not backing up your data you run the risk of losing everything. Sure some viruses can be eradicated sparing your data, but there are some which render your hard drives data unrecoverable. So it's wise to get in the habit of backing up your data. The only required tools are an external hard drive (if you have large amounts of data) or a thumb or flash drive if you have a small amount of data to backup. Once you have your external drive in place download a program called FBackup. The program is free and is customizable to run scheduled backups.

So now let's talk about good antivirus, malware protection. If you have Norton or McAfee installed that's OK but I must say having been in this business for over twenty years I am not impressed with either. Over the years virus protection has turned to Internet Security programs which monitor all activity to your computer not just email or downloaded attachment viruses. These days we have much more robust security packages designed which to proactively stop viruses which are transferred simply by visiting a website. Some of the good ones include and this is a short list,

Eset Nod 32 ( personal favourite)

Norman

Kaspersky

If you want to take a chance and go with one of the many free offerings we recommend,

Avast

Avira

Comodo

You need to ask yourself a few questions to establish whether you need serious protection or just go with one of several free protection programs,

Are you banking online or are you concerned about your passwords being compromised? If you are then you should use a purchased version of an Internet Security suite.

If you are dabbling online and could care less if someone sees your information and your passwords compromised then you can go with a free version

Consider your budget. Having antivirus protection is like insurance. To quote from a famous TV commercial " You can pay me now or pay me later"

Is your data important to you? Are there files on your computer(s) which are considered essential and you can live without them? If this is the case then you should consider purchasing a good internet security package

Obviously if you're using a business or corporate computer you need an excellent security suite because of the seriousness of preserving your data

What else can I do to avoid viruses in conjunction with good protection?

When you do a search online make sure you click on only results which are relevant to your search query

Stay away from sites which are unknown to you. Do not follow redirects unless you know where its leading

Never click on links in email or sign in to accounts from an email. Verify the authenticity of the email in question before clicking

NEVER EVER open a program which was sent as an attachment in an email even if you know the person. It's better to save the file to your computer but don't extract it or install until you check it with your protection

Do not allow pop-ups that ask to download windows updates unless you are certain this is a windows update. This is one of the tricks hackers use to disguise a download as a windows update and make you think you have to get it.

Ensure you have security of your browser set at least at medium security

Finally keep your security and protection up to date. Most if not all programs will update automatically so its not a major concern. And schedule automatic scans with your updated security protection. Scan manually as well to be sure you are protected.

New 2 Used Computers http://www.new2usedcomputers.com/ began officially in 1998 although the owner operator has been working with many facets involving IT for over 20 years. The purpose of our company is to provide exceptional service and deliver to our customers quality workmanship which sets your business apart from the competition.


View the original article here

12.12.11

Wallet Safety: Protect Your Credit Cards From RFID Tracking Systems

AppId is over the quota

Is it safe?

While RFID is gaining in popularity, and many companies are proposing to use it in all sorts of industries, from grocery scanning to tracking currency and retail, RFID technology can also pose a serious security hazard in credit cards. The technology Website EnGadget found that any unauthorized user can scan RFID credit cards for unencrypted data using a reader that can be purchased online for as low as $8.00.

How can I protect my wallet?

Credit card companies are catching on to the threats posed by RFID, and are taking action to boost security in the near future. If you are concerned about the safety of the information on your cards, here are some steps you can take right now to protect your credit cards from RFID tracking systems:
When you are out and about, use cash or normal credit and debit cards. Leave your RFID cards at home and use them for online purchases only.
Stack your RFID cards in your wallet back-to-back. This creates what is called "tag collision," essentially giving the reader too many signals to process at once. This offers little protection, however, since time read is very fast and it can be easy to develop systems that scan the chips one at a time.
Get a DataSafe wallet, or other similar product approved by the Government Services Administration to block RFID signals. These wallets are indistinguishable from a normal wallet on the outside.
Buy credit card shields to hold your cards when not in use. These are made from aluminum material and there are a number of companies that make them for less than $10.
Go the homemade route: Wrap your RFID cards in aluminum foil before you put them in your wallet. Some users have said that this is a simple and effective way to block your cards from RFID readers.
Make sure to consistently monitor your credit card statements, ad be on the alert for any suspicious account activity. Even if you don't have RFID cards, this is the best way to avoid credit card theft and fraud.

RFID technology at this point is limited to a range of about 5 feet. This may not be the case for long, however, as advancements and new technologies arise, it will be increasingly important to secure anything containing personal information that is equipped with RFID or similar technology. Watch for advancements in the technology and ensure your personal information is secure.

Learn more about RFID technology and RFID asset tracking systems.


View the original article here

21.11.11

You Can Get A Case That Is Right For You And Protect And Customize Your iPod

AppId is over the quota

It seems like everybody has their own MP3 player now-a-days, and they all look pretty much the same, but when it comes to your personal preferences, it does not stop at your style of music, and for those that choose to showcase their individual style, there are hundreds of cases out there that you can purchase for your player. If you want a hard case or a soft case, one that's made from plastic or rubber, there are cases available for any type of iPod or MP3 player, and there's sure to be one out there that suits your purpose.

You may find cases that have attachable arm bands for jogging, or water-proofing for those that enjoy taking their library out on the water with them, making it easy for you to accomplish pretty much anything and bring your iPod along with you. Without effecting its use in the process, by buying the right case, you may show your iPod off and display your personal style while continuing to protect your device.

It's pivotal to keep your MP3 player away from trouble, and not only are iPods a bit expensive to begin with, but when you think about the time and effort you place into compiling your music collection. When you consider your whole music collection and what would be the result if you were to lose it, and it is wise to use the extra care to invest in a case for your iPod, you'll be thankful that you did.

You could even buy custom iPod cases to work with your purposes and stand apart from the rest, giving you the individuality your want while continuing to be completely functional. As particular as your taste may be, there's still something out there that's best for you and accommodates to your lifestyle, no matter which style of device you own, there's a case out there for it.

And remember that cases aren't just exclusive to the basic player either; iPod touch cases are available in just as many assorted styles, and even though you will continue to have an open front to control your iPod, you can still choose from an unlimited amount of designs and styles that will work for you.

What you're searching for is a terrific blend of style and functionality, and you should settle for nothing less in the end. Get a case that you might show off to your friends and still be the best amount of protection for your player.

Shades makes cases the coolest new iPhone 3GS covers! Extremely thin, light, and Stylish Shades also makes the best selling product the iPod cases. ShadesCases believes in supplying low cost, innovative products and quality customer service. Typical iPod skins cover only part of your device, and most cases are often bulky and awkward. Shades stand out on your iPod, not in your pocket. "It's not a case. It's not a skin. It's a Shade."


View the original article here