Showing posts with label Computer Security. Show all posts
Showing posts with label Computer Security. Show all posts

Thursday, April 17, 2014

The Heartbleed Bug

The Heartbleed Bug is a serious vulnerability in the popular OpenSSL
cryptographic software library.


















This weakness allows stealing the information protected, under normal
conditions, by the SSL/TLS encryption used to secure the Internet.
SSL/TLS provides communication security and privacy over the Internet
for applications such as web, email, instant messaging (IM) and some
virtual private networks (VPNs).

Wednesday, March 19, 2014

CCleaner: Cover ur Tracks

     CCleaner is our system optimization, privacy and cleaning tool. It removes unused files from
your system - allowing Windows to run faster and freeing up valuable hard disk space.
It also cleans traces of your online activities such as your Internet history.
Additionally it contains a fully featured registry cleaner.

Thursday, March 13, 2014

Virtual CD/DVD Drive: Virtualize Optical Media

    Virtual CD/DVD drives creates images of your optical media, so you can use 
them at any time without having the physical medium on hand.
In many important works we need these virtual drives.
There are many Virtual CD/DVD Drive softwares available on internet.

Bellow are some good Virtual CD/DVD Drive Softwares:-

Wednesday, March 12, 2014

Friday, July 9, 2010

Pretty Good Privacy (PGP) - "Cryptography"


Pretty Good Privacy or PGP is one such cryptography system that uses the public-private key pair to encrypt & decrypt data securely.

Encryption:-
In first step, PGP compresses the plaintext data that has to be encrypted using a predefined compression algorithm.
Next, PGP creates a random single-use encryption key known as the session key. Which is randomly generated & is used to encrypt the plaintext data into ciphertext data.
Finally, the session key generated in step 2 is encrypted using the recipient’s public key. Once this is done, PGP then sends this encrypted session key & the ciphertext data to the recipient.

Decryption:-
First of all, PGP at the receiver’s end uses the private key of the recipient to retrieve the encrypted session key.
This retrieved session key is then used to decrypt the encrypted ciphertext data sent by the source.
Finally, this retrieved compressed plaintext data is uncompressed & the original plaintext data is obtained.

Popular PGP Tools:-

1) PGP Freeware v6.5.8
The official PGP implementation.
http://web.mit.edu/network/pgp.html

2) PGP Mail
Allows users to send & receive PGP encrypted e-mails.
http://web.mit.edu/network/pgp.html

3) PGP Disk
Allows users to encrypt a few files on the local disk or even the entire hard disk.
http://www.pgpi.org/products/pgpdisk/

4) PGP Fire
A firewall that comes with the PGP software.
http://www.networkingfiles.com/Firewalls/downloads/pgpfiredownload.htm

5) PGP Fone
A tool that allows users to make secure telephone calls using a modem or over the internet.
http://www.pgpi.org/products/pgpfone

PASSWORD BREAKING


  Although there is no particular guaranteed method of breaking into a Victim’s account, there are definitely a few different techniques that are commonly used by attackers, namely:

1.Password Guessing
2.Forgot Password Attacks
3.Brute Force Password Cracking
4.Phishing Attacks
5.Input Validation Attacks
6.Social Engineering

The success & speed of this technique largely depends upon the strength of the victim’s password.

Some basic tips that each & every Internet user must keep in mind while choosing a Password are:

1) Try to use a combination of alphabets, numbers & special characters.
2) Try to use both lowercase & uppercase.
3) Try to choose a password that is not a word in the dictionary.
4) Keep changing your password.
5) The password should not be too short.
6) Do not use a password that can easily be guessed.
7) Do not write down your password & store it near your computer.
8) Do not use the same password for all your accounts.
9) Do not use your personal information as Password.

"Then be secure & Safe Surfing" :)

Saturday, July 3, 2010

Simple Way To Lock Computer Screen

When you go out off work for while, then there may be chances of performing illegal task on your pc or someone delete, copy, etc your data.

So to avoid this you can lock your Screen.
To do this, very first you set Password for your account.
Whenever you want to go away from workplace for a while just press ‘windows’ key (Between ‘Ctrl’ & ‘Alt’) & then press ‘L’
       Your computers screen gets locked, & when you come to workplace you can start your screen after providing proper password.



Sunday, February 7, 2010

Zone Alarm: The Best Free Firewall

A good Antivirus software is only half a defense. To ensure complete security of your PC, firewalls are also a must.


For the best protection, get this firewall that's far superior to XP's Internet Connection Firewall, and keeps you safe from Trojan horses and other dangers.
The Internet Connection Firewall (ICF) that ships with XP has one very serious deficiency: it can't monitor and block outbound traffic from your PC to the Internet. Many Trojan horses do their damage by installing themselves on your system and then allowing others to take control of your PC, or using your PC to attack web sites, servers, and other computers. The ICF won't offer you protection against these types of Trojans; it won't be able to tell when a Trojan is making an outbound connection, so the Trojan will be able to do its damage without your knowledge.
Other firewalls, however, will offer that protection. The best of them is Zone Alarm ( http://www.zonealarm.com ). There are three versions of the program, a free version and two for-pay versions with differing levels of protection. The free version offers excellent protection against inbound threats as well as against Trojans. It also tells you whenever someone is probing your computer for security holes and gives information about the prober, often including his IP address, and the nature of the probe.

//*********************Page Navigation Widget*******************// //*********************End Page Navigation Widget*******************// //******************************//