Showing posts with label Tutorials. Show all posts
Showing posts with label Tutorials. Show all posts

Monday, 21 March 2016

How to Adjust Volume and Brightness in Smaller Increments on Your Mac

How to Adjust Volume and Brightness in Smaller Increments on Your Mac


How to Adjust Volume and Brightness in Smaller Increments on Your Mac

It often happens to us that we want the volume or the brightness to be at an exact level on our Macs so that it is as perfect as we want. Unfortunately, though, Mac does not easily let us specify exact values for the volume and brightness levels. At such times you just have to compromise and work with whatever has been provided to you.

Luckily, with a neat trick, you can now change both volume and brightness on your Mac in smaller increments and to the level you want. The trick allows you to change the levels in as small as 25% of the default bar. That means you can now set your volume at 25%, 50%, 75%, and so on instead of the default 100%, 200%, and so on.

FOllie along below if you would like to do that on your Mac.

How to Adjust Volume and Brightness in Smaller Increments on Your Mac

Ensure that your Mac is not set to mute.

1. Bring down the volume level to half of the total level so you can see the trick working. You can do that by pressing the Volume Down or Volume Up, whatever is appropriate in your situation.

2. Now, here comes the trick. Hold down the “Shift” and “Option” keys together on your keyboard, and then press either Volume Up or Volume Down.

You should notice that the volume now either increases or decreases in smaller increments unlike before. It takes four taps on the Volume button to fill-up a bar which used to get filled-up in just one tap before.

3. You can now keep on doing this until you are satisfied.

There has not been much buzz about this feature in the Apple world, but this small feature does a really great job for you.

Changing the brightness level in smaller increments can be done the same way as the volume. Here are the steps.

Adjusting the Brightness in Smaller Increments

1. Bring down the brightness to half of the total size so you can easily see the changes.

2. Hold down the “Shift” and “Option” keys together, and press the button for either increasing or decreasing the brightness. Like the volume bar, you will notice that it now increases or decreases in smaller increments than before.

3. That should let you adjust the brightness on your Mac according to your needs.

We all know that the default settings are not perfect sometimes, and tinkering around helps us get exactly what we want. This is one of those default things that does not work well for all users.

Conclusion

Learning how to change the volume and brightness levels in smaller increments should help you get that precise perfectness you have not been able to get on your Mac so far.
How to Block Someone on Instagram

How to Block Someone on Instagram

How to Block Someone on Instagram


If you don’t fee like changing the privacy settings on your Instagram account, but you also don’t want a certain user to access your pictures, you always have the option of blocking that person. The following guide will show you how easy it is, and in no time that annoying user will be a thing of the past.

How to Block Someone on Instagram

To block any user on Instagram, you will need to launch the Instagram app and go to the profile of the person you want to block. (You can do this as well if you wish to block a regular user or any organization).

Once you have accessed the person’s profile, click on the three vertical dots in the upper right-hand corner of your screen, but if you are using your iPhone, look for an arrow. You should now see six options: Block, Report, Copy Profile URL, Send Message, Send Profile as Message and Turn on Post Notifications. After choosing “Block,” Instagram will ask you if you are sure that you want to block this user, so any accidental or unwanted blocks are not done.


If you were to block the wrong person, that user would no longer be able to find your account, and it would seem as if you eliminated it (if your account is private). If your account is public, that person will still be able to find you through comments you made on other user’s accounts or by just typing your Instagram’s url:
http://www.instagram.com/username.

How to Unblock Someone on Instagram

Have you forgiven that user for being so annoying and want to give him or her a second chance? If you do, unblocking someone is as easy as blocking them. To unblock someone, you just need to follow the same steps you did when you blocked them in the first place, but “Block” will now be replaced by “Unblock.” Just tap on the wanted action and you are good to go. Remember, you can only block and unblock users from the official Instagram app and not from the web app.

What Happens After you Block Someone on Instagram

When you block someone on Instagram, the other person doesn’t get a notice that they have been blocked. They will only notice because they won’t be able to interact with you or see any updates from you. You should also keep in mind that if the blocked person mentions you using the “@” symbol, you would see that in your updates. The blocked person’s likes and comments will not be eliminated eit her.

To erase a user’s comments on your pictures, you need to launch the Instagram mobile app and open the comments. If you’re using your iPhone, press the Comments button right under the picture to access the comments. If you are using your Android device, tap on the comment bubble, look for the comment you want to erase, select it and you should see a trash can icon on the upper right-hand corner.

The person you decided to block can mention you on Instagram by using your username, but this isn’t going to appear in Activity. After blocking someone, their Likes will also be right where they left them, and they can also continue to see your comments and likes on other pictures.

ConclusionThere are various reasons why you might want to block someone on Instagram, but if you ever decide to do it, now you know how to do it and what happens after. Have you ever had to block someone on Instagram? Let us know in the comments.

Wednesday, 16 March 2016

Bohatei – Free DDoS Hacking defense tool

Bohatei – Free DDoS Hacking defense tool


 Bohatei – Free DDoS Hacking defense tool

Bohatei, a free DDoS defense tool that works using SDN and NFV. This tool defense 500Gbps DDoS attack and successfully handle any dynamic attack scenarios.

Features and File information:

  • An implementation of the FlowTags framework for the OpenDaylight controller
  • An implementation of the resource management algorithms
  • A topology file that was used to simulate an ISP topology
  • Scripts that facilitate functions such as spawning, tearing down and retrieving the topology.
  • Scripts that automate and coordinate the components required for the usecases examined.
The folder “frontend” contains required files for the web interface. For the experiments performed, we used a set of VM images that contain implementations of the strategy graphs for each type of attack (SYN Flood, UDP Flood, DNS Amplification and Elephant Flow). Those images will become available at a later stage.
The tools that were used for those strategy graphs are the following:
For more information about Bohatei you can visit GithubYou can check out Bohatei papers here and slides here.

Free Download: Bohatei (from github)
Security tips - How hackers hack your Paypal account

Security tips - How hackers hack your Paypal account

Security tips - How hackers hack your Paypal account
Today when I was checking my Inbox I got this mail from Service Paypal saying that, ” Your account has been limited until we hear from you.”. And when I open the mail it seems to be a phishing page from hackers to steal my login details.

Security tips - How hackers hack your Paypal account


1. Look at the address of mail sender. When you receive a mail from Paypal look what is write after “@”. It must be “paypal.com”.

2. Look out for text errors in the mail. In official mail from Paypal you wont have any errors.


3. If you still don’t find the above 2 options and you open the link given by them, then check out for the URL, it should be “paypal.com” or “paypal.co.uk” or “paypal.in” depending upon the country or where you live. As you can see from the image given below shows “qaypal .co.uk” which is not official one and its a phishing page to get users login credentials.

This is what you get when you click “Login Now” link from your email


This is how a phishing page looks like

4. So this is how the mail looks after you enter your login details.
So make sure you don’t fall into phishing scam from hackers. Be careful when you open a website link from your mail. This format of phishing almost works on other sites too, such as Facebook, Twitter and few other popular networks. We care for you, so we share this simple information to you. If you care about your friends and family then drop a share.

NOTE: The graphic design of these website would be as same as the official website so be careful when you visit.

Tuesday, 8 March 2016

FTP - Significance Of Ftp Set Up Provided With Hosting Service

FTP - Significance Of Ftp Set Up Provided With Hosting Service


An FTP setup is very necessary for businesses to flourish. FTP refers to file transfer protocol. FTP is used to transfer pages from a server to the user’s browser. It is also used to transfer electronic mail across the internet. Files can be easily uploaded with the help of FTP. To get started you need to upload an FTP client on your computer and set up an account with a home page hosting service which offers FTP . The first step is to get connected after selecting a profile name and address.

Understanding the technology
FTP can help you to transfer files between in the internet and a couple of computers. Files can be easily copied using FTP technology.

  •     FTP is the short term for file transfer protocol.
  •     Both ASCII and Binary files can be transferred between computers easily.
  •     An FTP server is required on the target computer for FTP to be running.
  •     A user-name and password is required for FTP to run.
  •     University of California Berkely was the first to develop FTP.
  •     For a quality FTP server both security and bandwidth is very important.
  •     File transfers are made possible through internet protocol and transmission control protocol.

Aspects related to file transfer protocol

It is important to pay heed to certain important points if you want to use FTP effectively.

  •     You can use an FTP backup tool to save information. This measure needs to be adopted so that when your hard disk crashes it is easy to obtain the essential data.
  •     In order to sync FTP hire the services of a reputed company which has strong track records.
  •     The best feature of FTP is that it is independent from the operating system.
  •     FTP has undergone transformations since the day of its inception. SSL has been incorporated to encrypt file transfers.

Implications of FTP


FTP is mostly used in secured networks. In order to load files FTP software is required. If you already have a website setting up a files transfer protocol will make your life easier. You will be able to upload and download files from your server easily. AS large files are difficult to share, FTP hosting allows you to share large files with certain people. FTP hosting will allow you to store the files in accessible locations and share them with the people you want. With the large availability of hosting providers it is very important that you conduct a thorough research before reaching a final decision.

Selecting an FTP host


While selecting an FTP host you must evaluate certain criteria. The more storage place that it is offered to you the better it is. Usually focus must be laid on obtaining large storage price at affordable prices. The FTP hosting service must be highly functional. It should help you with file transfers. Dragging and dropping files must be easy. Sharing files via links and offering features for back up is very essential. You should be able to access the files from most devices and across different platforms. Make sure that the hosting service makes use of encryptions to transfer files.
Hosting services which provide FTP must be able to provide strong customer support. If you face any problem the hosting service should be able to come to your assistance at once. They should be able to clear your queries and address all your problems. Certain service providers host FTP in the cloud. You can enjoy unlimited bandwidth and unlimited storage. Without ads your privacy is completely guarded as you opt for files transfer protocol.

Monday, 7 March 2016

 Transfer Content(files) Safely: Avoid Information Overload Using a Torrent Search Engin(e

Transfer Content(files) Safely: Avoid Information Overload Using a Torrent Search Engin(e


If it is used properly, bittorrent is one of the safest ways of transferring content. The reason why this is the case is because the torrent file contains metadata about the files that are to be shared and the bittorrent client subsequently checks the content received against this metadata.

The safety checks in place should ensure that any discernible difference in the content received will be discarded as a result of these measures.

Using a bittorrent client like www.Vuze.com will help to ensure that malware cannot be added to any torrent once it has become active meaning that any data that is damaged during this transmission process will be discarded an re-downloaded, ensuring a good level of security.

On the assumption that you already have a working knowledge of bittorrent, here is a look at how you can go about finding the content that you want and avoiding an information overload.

Different torrent search sites
There is an incredible amount of content currently available in bittorrent and it is estimated to be somewhere in the region of 25 PetaBytes of content that is available spread across in excess of 20 million active torrents.

These are split into public and private torrent search sites and the general consensus of opinion is that private torrent sites are preferable as they offer several advantages over their public counterparts.

With a private torrent site, you not only get the privacy aspect due to the fact that only members are active on torrent, but you should also enjoy cleaner torrents and greater speed, due to ratio enforcement which ensures a well seeded torrent.

The negative aspect of a private search site is that some of them can certainly suffer from over-zealous administrators policing them and a greater level of rules and regulations to overcome.

Unwanted features


It is a sad but true fact of life that even the best public torrent search sites can be plagued by scam links, adverts and toolbar downloads.

It is therefore really important that you make use of a web browser that has advert blocking capabilities so that you can hopefully eliminate all those unwanted features. Firefox offers an additional feature called AdBlock Plus and with Adblock Plus PopUp you can make all those scamming adverts and non-existent downloads disappear into the background.

Common deceptions


Avoid the scam links that offer you things like a Trusted Download and Sponsored Links and the toolbar downloads are often annoyingly placed very near to the Download Torrent button, so take a moment to check what you are clicking before you go ahead.

Do not be tempted by the adverts that do make their way onto the torrent search site, not all of them are completely questionable but why take the risk? Simply avoid downloading them to save you from any potential subsequent problems.

Key criteria


Your goal when it comes to finding a good public torrent search site is to find one that offers genuine and healthy torrent so you can get the content you want without any complications.

A good torrent site will often contain a large index of torrents backed up by a comments and ratings system, excellent search filters and sorting capabilities.

Also, make sure that you are uploading and downloading only files that do not infringe upon any copyrights.

Stick to this key criteria and you should be able to achieve your goals and achieve a safe transfer of content.
Why is Security for Your Business Important?

Why is Security for Your Business Important?

 
Did you know that in 2010, over 1000 workplace homicides took place in the United States according to the CDC? Did you know that 2% of all sales revenue, on average, is stolen annually by employees?

Did you know that having on-site security reduces your chances of being robbed by 85%?

These are just a few of the reasons why every business, regardless of size, income level, or specialty, needs to focus on protecting their business both physically and electronically.

Workplace Homicide and Assault


Workplace assaults reach in the tens of thousands annually. Each instance opens a company up to a potential lawsuit. These lawsuits can add up to millions of dollars in damages and legal fees for the companies and so investing in some security can be a very smart move.

Strong HR polices aren't always a deterrent from homicide or assault in the workplace. Having on-site security present can reduce liability in the event of something unfortunate happening. Security can also reduce the chances of an attack occurring at all. When managing a large company and mixing all different types of personalities you should definitely invest in some physical security to protect your employees and the company's assets.

Theft


Theft is a major problem in the workplace. Whether it be physical property stolen or intellectual property stolen it can pose a serious problem. Companies report between 2 and 5 percent of their income has been lost due to theft both within the company and outside. This can be theft of office supplies, computer equipment, or currency by employees. It can also mean theft of merchandise by customers which could be avoided if precautions are taken. With items like security locks from Security Centers in Southern California you can be sure to protect your business from thieves.

A security detail can monitor the entire company to ensure profits are not walking out of the door. The cost to protect against theft is a fraction of the overall cost of theft in a company. A visible security guard can reduce theft by as much as 50% or investing in some anti theft security software can help guard your property from malicious intentions.

Identity Fraud


Identity theft costs American companies nearly $25 billion per year. Scams pilfer another $2 billion from corporate coffers. While no one can completely prevent all forms of identity theft or scams, having security teams monitoring email traffic for key words or known phishing attempts can dramatically reduce the likelihood that it happens in your company.

Having a computer security expert working to protect your business can save another 3 to 7 percent of anticipated profits annually. Corporate security is not longer about physical security. Computer security is just as important.

Experts expect the rates of computer scams and identity theft to continue. Estimates put total losses at over $50 billion annually by 2020.
Hiring a team of security professionals and security software can help protect your online and physical assets can seem expensive but the price of not acting can be significantly greater if your business is compromised.
Smart Phone Tips: How to Keep All Your Devices Running Quickly and Smoothly

Smart Phone Tips: How to Keep All Your Devices Running Quickly and Smoothly


Have you noticed that your computer, tablet, or phone is not running like it used to? Your device may run super fast when it’s brand new, but after awhile it is common for it to slow down. There are several reasons that your device might be acting sluggish, but know that these problems aren't just due to old age. There are a few things you can do to help get your device back to it's top performance level. Read ahead to learn about a few ways you can help your device speed along and prevent it from slowing down in the future.


Get Rid of Unnecessary Files and Apps


Tablets and smartphones tend to get filled up fast with apps, because it’s so easy to connect and download them. This can result in too many apps piling up on your device, many of which you never use. Go through your apps from time to time and delete the ones you don’t need. You can even delete those that you only use once in awhile and download them again when you need them. You'll be surprised at how many apps you accumulate over time, and even more surprised at how much your device speeds up once they are cleared away.

Protect Against Viruses


PC users know that viruses have the potential to wreak havoc with their computers. The same is true for some tablets. Like Mac computers, iPhones and other Apple devices don’t have a high risk of viruses, but if you have an Android or Windows device, you should head to the app store and download a good anti-virus app. There are plenty of anti-virus apps and programs, some are free, and some cost money, but the most important thing is that you download one of these protection systems as soon as possible.

Close Programs and Apps When Not in Use


Tablets and smartphones are not really designed for easy closing of apps, and generally all the apps you use stay open all the time. You can get a task manager, which is an app that will automatically close multiple apps with one touch. Similar programs exist for computers. These can close unnecessary background processes that are using memory. You may not realize how many apps you have running, but if your battery starts to drain quickly, this could be because you're running too many apps at once. Closing out of programs you have been using will help out a great deal when it comes to giving your device a little speed.

Avoid Flashy Personalization Options


Devices and computers promote cool technology like “live” wallpapers that move and high quality graphics and icons on the desktop. According to professionals of thelocalcircuit.com who specialize in laptop repair in Denton, TX, these things use a lot of memory and slow down your device. Resist the temptation to use flashy personalization options and go with basic wallpapers and icons because these can really put the brakes on your device and make it difficult to complete simple tasks.

Clean Your Screen
For touch screen devices and computers with touch screens, something as simple as neglecting to clean your screen can slow things down. If you don't clean your screen regularly, tiny substances will build up on the surface of the screen. You might not even be able to see anything on the screen, but that doesn't mean there isn't anything there. Cleaning your screen will allow the device to recognize your touch more quickly, allowing you to perform tasks right away. Plus, cleaning your screen will clear away any germs or bacteria that might be lurking on the surface.

Keeping you device at top speed is easy; it just takes some regular maintenance on your part. A good method is to run through a short series of maintenance tasks on the same day you do a regular backup. That should keep your computer and devices in top shape and keep you more content as you quickly run through tasks without any loading or extra frustration.
 5 Common Hacks & Advice on How to Defend Against Them

5 Common Hacks & Advice on How to Defend Against Them


You may think that hackers are excessively clever people who are coming up with improbable hacks around elaborate security systems, and some are, but most rely on a few old tricks that have been around for years.

I am going to look at 5 common hacks that are used so that you can become aware of them, as knowledge is the first line of defense. I will then give you some actionable advice on what you can do to defend against these common hacking techniques.

Common hacks 1: Bait and switch

There have been countless ‘bait and switch’ scams over the years. I’m talking “years” as in over the last century. Things haven’t changed much in the computer age as bait and switch style hacks are still used.
Commonly, they’ll buy legitimate advertising space on websites. The hacker will switch the link contained within the ad from the approved one to a malicious one, or they’ll code the legitimate website to take the user to a malicious site. Clever hackers will give away something free, like a website counter, and allow thousands of websites to use it - and then switch it out for something like a nice fat JavaScript redirect.
How to defend: Given the large variety of bait and switch hacks out there, it’s difficult to give advice on them. The first point is to make sure that you understand that anything you don’t control can be manipulated. If it isn’t your web counter, someone can exploit it. If you didn’t find the website yourself, the ad can direct you somewhere you don’t want to be. These can be defended against by simply going to trusted resources for your web counters, or doing your own search for the content within the ad.

Common hacks 2: Cookie theft

Cookie theft, also known as session hijacking, enables people to assume your online identity on popular websites. This allows them to log into your accounts, taking over your social media accounts, as well as making purchases in your name.
To make matters even worse, there’s even a program called Firesheep that allows people to do this with a few clicks while using another trick we’ll talk about next, the fake wireless access point. All it takes is a few clicks, and they’ll take over your identity.
How to Defend: Try to always use websites that have secure development techniques and the latest cryptography. A tool that can help you do this while using Google Chrome is called KB SSL Enforcer.
The KB SSL Enforcer plug-in forces your browser to go to the most secure version of websites. This will be the one that starts with HTTPS, with the ‘s’ being ‘secure’ and referring to TSL cryptography. It is not 100% protection, but it does make things more difficult. If hacking you is a challenge, hackers are more likely to move on to someone who hasn’t read this list!

Common hacks 3: Fake Wireless Access Points

Everyone loves free wifi, including hackers. How this hack works is a hacker will set themselves up in a public location, a coffee shop, restaurant, airport, or public library as examples. They’ll establish a fake wireless access point (WAP) of their own and name it something that makes it sound official: “McDonalds Free WiFi” or “Laguardia Free Connection.”
Those who are looking to make a quick connection, for free, will then establish a connection to these WAPs. There are two ways that a hacker can steal information. The first is that they can set it up so that you have to enter a username and password to connect. Most people use a common username and password for these quick “set it up and forget it” accounts. Hackers will then take that information and use it to try to log into your Twitter, Facebook, Amazon, iTunes and other popular accounts. This is one example of online identity theft.
The other way that a fake WAP will work is by the hackers just sifting through the information that is going through the connection and taking whatever isn’t protected or encrypted.
How to defend: First, ask the proprietors of the establishment what the correct name is for their WiFi. That’s the easy one. Next, be sure to always use a unique password and login for public WiFi. It may be a pain, but it’s your best form of online protection.
To protect against those who sift through and steal information that isn’t encrypted, use a personal VPN to encrypt all of your communication. You can read more about top VPN services over on the blog I work for.

Common hacks 4: False file names

This work by tricking people into clicking on files that look enticing, like BeyonceNipSlip.avi, but are actually files full of malicious code when opened.
One of the most famous examples of this right now is one known as the Unicode character switch. It fools computers into displaying a file that is actually BeyonceNipSlip.exe (an executable file that can tell your computer to do things) as the less harmful looking BeyonceNipSlip.avi (.avi being a video file).
You then open it thinking you’re going to see a video of a small slice of heaven (sorry, clearly Beyonce biased), and instead get a computer full of something bad.
How to defend: This is one of those instances where you have to do your homework. If someone is sending you a file, be sure that you know what the full name is with the extension. If you don’t know who is sending you the file...don’t open it! If you have a virus scanner which allows you to scan individual files before opening them, put it to work.

Common hacks 5: Wateringhole attacks

Watering hole attacks can be related to point 3, but with more focus and malice. Hackers will scope out a common place where employees of their target company hang out for drinks, dinner, or even online social platforms - a ‘watering hole.’
These employees are often more relaxed about their security, but since they’re with co-workers they’re still prone to discussing business matters. The hackers will then either install fake WAPs in the physical location that they gather to get company credentials, or they’ll install harmful JavaScript redirects into the online places that these people visit.
The hackers will then use the login details or compromised workstations to gain access to the inner workings of a company. Notable wateringhole attacks have happened to Apple, Microsoft, and Facebook.
How to defend: Making it known to your employees is the first step. They can not use their same credentials on their workstation and on these types of sites, or in these locations. Like it or not, in today’s digital world, your employees have to act as if they’re always at work.
Security Tip:  Pocket Protection

Security Tip: Pocket Protection


Are you concerned about security on your mobile device? It's no secret that mobile users have been hacked in the past and had their personal information stolen. But is mobile security getting any better? Here are a few things you need to know about the current state of mobile security.

Apps Can Protect You Or Hurt You

Many app developers understand the risks that occur by having a mobile device and using it to access different networks, files, and applications. That's why several trusted app developers have released security apps designed to warn you of dangers and to keep your data safe. For instance, the 360 Security - Antivirus&Boost app for Android is designed to protect your device from malware and viruses. Others like Find My iPhone will help you locate a lost or stolen device and even lock your phone so that thieves can't access your private data.


The downside to smartphone applications is that even though there are apps that can protect you, others can hurt you. For instance, you might think you're downloading a seemingly safe application when in reality there's a virus piggybacking on the download. Furthermore, top-rated apps may become prime targets for hackers, meaning that even the best apps aren't always completely safe.

There are various smartphones to choose from, with many falling out of the limelight due to the hype of Android’s Galaxy and Apple’s iPhone. Take, for example, the Sony Xperia Z3, with several of the same capabilities as the aforementioned smartphones. Its unique capabilities provide the same functionality at a more reasonable price. The unique techie-centered Sony Xperia Z3 from an affordable carrier like T-Mobile shouldn’t be overlooked.

The good news is that an increasing number of app developers are using encrypted data to keep your information further from the reach of hackers. For instance, the cloud storage service Spideroak encrypts data at every stage of the process, making it a bit safer than options, like Dropbox, that don't.

The good news is that an increasing number of app developers are using encrypted data to keep your information further from the reach of hackers. For instance, the cloud storage service Spideroak encrypts data at every stage of the process, making it a bit safer than options like Dropbox that don't.

It's In the Fine Print


Before you download an app, be sure you're checking what the app has permission to access on your device. An application may not be damaging in the way that it installs malware and viruses without your consent. In fact, you may simply be giving the app permission to access your files. If an app does compromise your privacy, it could be because you've allowed it access to do so, though.


The good news is that in app stores like Google Play, you'll see a list of what the app is asking permission to access. You'll want to read through the full list before accepting the terms, so that you're not surprised later by how the app gains access to and uses your information.

File Sharing Raises Concerns


Mobile devices and their complementary cloud-based storage apps raise many concerns, particularly for businesses. The security threat here is that people are concerned that sharing files could lead other users to forward sensitive information. The further this information is distributed, the more vulnerable it is.


According to 2013 research into the state of mobile security, the second top concern with BYOD aka Bring Your Own Device was that users would be able to forward company data onto cloud-based storage services. This grave concern fell behind only that of lost or stolen devices.


It's clear how this may raise concerns for businesses allowing individuals to bring their own devices to work. As an individual, however, this should also be a concern. That's because even if you delete sensitive data on your device, such as photos, contact information, etc., it still survives on cloud storage services and on devices of anyone to whom you've forwarded the file. Even if you're the only one with the file, that digital data is never gone. Today, it's still a huge worry for many people about where the copies of their files are and how susceptible the information is to being breached.

The Bottom Line


While there are still a lot of concerns surrounding mobile security and the protection of your device -- including even physically protecting your phone from damage and water -- there have been improvements. For instance, more applications are taking security measures to encrypt their data and create constant updates to stay out of reach from hackers. In addition, operating systems like Google's Android 5.0 Lollipop OS are becoming more secure.


How do you feel about your device and its security?
Advance Database Security

Advance Database Security


Databases are often the targets of security attacks by cyber criminals. Databases that hold all the security related information, passwords and financial details of users are what these attackers are looking to profit off. That is why database security is an incredibly complex topic that can be covered in elaborate detail. Get in touch with your remote DBA now.

However here are a few of the best practices in database security that will help businesses.



   1. Keep the database and the web servers separate.


Usually when the entire web related software is been installed, the database is automatically made. For the sake of convenience the database is made on the same server where the software has been loaded which is the web server. However this opens the doors for a security breach because then hackers will only need a single point of entry. If they are able to make their way past the security for the web server then all the data stored will be at their mercy.

This is why the database should be stored separately on server that is further protected by a firewall and not with the web server. It is a more intricate but well needed procedure. To know more visit - http://www.remotedba.com/


   2. File encryption


Just storing the database on a separate server is not enough to ward off persistent attacks. Encrypt all the files that are being stored. The stored files of the web software have the information that will enable it to connect to the databases. If you store the data in plain text files like a lot of people then they will provide the data that the hacker needs to get to the sensitive information.

It is not just the files that need to be encrypted. Encrypt the backup files too incase there is an internal attack.


   3. WAF


Use WAFs or web application firewalls. It isn’t true that the web server protection is completely separate or irrelevant to the database. A proper WAF will protect your website from cross site script vulnerabilities, vandalism and also potential SQL injection attacks. If SQL queries can be prevented from being injected by a criminal then the firewall will be successful in keeping all the sensitive information which is stored in a database away from unwanted attention and attacks.


   4. Current patches


This is one thing that a lot of web administrators like remote DBA fall short. Web sites which have a lot of third party apps, elements, widgets, plug-ins and other add-ones become easy targets to something that could have been patched on time.


   5. Less third party apps


Try and reduce the number of third party applications being used. While it is understandable to use user-interactive widgets and other content that makes websites attractive, any app that accesses the database is always a weak point which can be exploited. Unless it is required don’t use third party apps. Remember that these are made by programmers who then stop support after a while.


   6. No shared servers


If your database has highly sensitive information then don’t use a shared server if you can avoid it. It will be cheaper and easier. However remember that you are putting all your important data at the hands of someone else. In case you can’t avoid it, do a keen review of all their security protocol.


   7. Security controls


Put in security controls on your database. Check your controls and ensure that they have been enabled even though it is automatically enabled by most databases these days.
Best Android Tutorials – Choose Any One From The List

Best Android Tutorials – Choose Any One From The List


The rapidly accentuating Android user base and the groovy features of the platform encourages the novice as well as expert developers to choose the Android development as their career. With the rising demand of this niftiest platform, a great craze for learning the Android development can also be observed.

This is why, there are numerous proficient sources available on the Internet itself that facilitate convenient and efficient learning. But since, too many options can also confuse you (especially when you are a beginner and lots of tutorials and study material is available out there), here I have compiled a list of some of the best Android tutorials for the newbies who are interested in learning and understanding the platform.


There are many sources to get you developed app and best is to avail Android App Developer for Hire. However, if you are willing to get into this profession, the let's have a glimpse into the best of the Android tutorials for newbies available on the Internet.

1. Building Your First App:

This genuine tutorial is offered by Google who maintains the Android platform. It provides an insight into creating a very simple Android application. You can go through the complete information with ease as everything is available on the same page. The tutorial is ideal for the developers who have some prior developing knowledge and wants to learn Android development.

2. Android Programming for Beginners Part1:

The tutorial indeed offers the brilliant guidelines for creating a basic Android app that runs a simple 30 seconds countdown and represents a number on the screen.

3. Android Development – Tutorial:

From this tutorial, you can efficiently learn the Android development as it offers an insight into the platform in a comprehended fashion. It precisely explains everything via theoretical as well as practical explanation.

4. An Android Book:

What I believe is that a book often provides a complete insight into the topic. It epitomizes everything in a well-organized and logical fashion. Therefore, a book-type tutorial is often a better option. You can choose a business level book like this one, and learn all, a simple to an advanced level Android development efficiently.

5. Learning to Parse XML Data in Your Android App:

Since, internal data is not always sufficient, you might require external data and XML facilitates a great way to handle all the external data in the most effective and efficient fashion. This resourceful tutorial will comprehend the best way to parse the XML data in an Android application.

6. Localizing Android Apps:

Android is a popular platform that exhibits a whopping number of fans across the globe, who understands and uses different languages. Thus, in order to meet the huge audience base of the platform, localization is must. And this is why, the most of the Android developers want to embrace localization in their application. You can refer this tutorial, as it offers and inside out about the topic and explains every single thing in an optimized fashion. Use this and learn the best way to localize your Android application.

7. Android 101 for iOS Developers:

Android being an open-source and popular mobile platform, whose captivating features can even attract the developers from other platforms including iOS developers. So, if an iOS developer who has prior knowledge of mobile app development, want to enter the Android domain, he can refer to a special tutorial like this one. In the Android 101 for iOS Developers tutorial, you will get a helpful difference between the development environments possessed by both the platforms (iOS App Development and Android App Development). This will make your transformation seamless and convenient.


Following an elaborated and comprehended tutorial can lend you a precise image of the topic. Whether you are an amateur developer or an advanced app developer, but have expertise in a different platform, there are tutorials and study materials available out there for almost everyone. You may search on the Internet or use the aforementioned tutorials that I have shortlisted while considering their usefulness. Follow the appropriate tutorial and reap the benefits of this rapidly flourishing platform. Step on the Android paddle and follow the pro tips and expert's advice, you will definitely be able to deliver a superlative and lucrative product.

Saturday, 5 March 2016

Step On How To Secure PDF Files

Step On How To Secure PDF Files

Step On How To Secure PDF Files

There are certain benefits of using PDF files and perhaps the most important one of them all is security. PDF files are more secure than other file formats as they allow for more sophisticated encryption. As such, as a PDF user, you can securely transmit or share your data through email or removable storage.
  • PDF security features allow you to dictate user access levels.
  • By using of watermarks, you can classify certain documents as secret or confidential in order to limit their circulation.
  • Application of digital signature on PDF files is an added security feature that serves to confirm the validity of a document.
  • You can set passwords.
Due to such security features and the fact that most PDF files are not editable (editor's note: you can edit PDFs by converting them to Word format), the chances of malware attacks or file corruption are limited.
The most commonly used form of PDF protection is password protection. You can add password protection in the following ways:


1. While in Adobe, open the file you want to protect by clicking on file and choosing open, then double clicking on the targeted file.

2. Click on the icon that looks like a padlock (this is the security icon) and select ‘show security properties’.

3. Click on the drop-down arrow next to the option labeled ‘security method’ and choose the type of security you want to apply. In this case, select ‘password security’. A dialog box will open. The next steps outline tasks you will perform within that dialog box

4. Compatibility: set compatibility to Acrobat 7.0 and later

Establish from your network of users if there is any one among them who is using versions lower that Adobe 7.0 so that you adjust your compatibility setting.
However, security settings for earlier versions may be lower, it is therefore better to ask other users to upgrade to current levels.


5. Set open Password
You will notice that the words ‘document open password’ is greyed out. Select the ‘require password’ option and type in your password. Only disclose the password to anyone you intend to open and read the document. Pay attention to lower and upper case letters.

6. Set Permissions password

Permissions allow you to exercise certain controls. Set a second password under permissions to control who can perform tasks such as editing. Provide a different password from the open password.

7. In the ‘printing allowed’ dropdown menu, you should select ‘none’ if you want to limit the printing of the document.

8. In the ‘changes allowed’ drop down menu, select one of the options that are to your preference. If you are sharing an ongoing project or you are sharing some views on your file and you want people to comment, you should select an option that allows readers to comment.

9. Click ok and then Click ‘ok’ a second time to leave document properties

10. Save the file and close

Important to note

If you want to recheck and confirm that the security settings work, enter the ‘open password’ and the ‘permissions passwords’.
If in the future you want to see the restrictions you have applied to the files, you can click on details to confirm.
With the above 10 steps, your PDF files will be safe to send out.
Cyber Attack: Common Mistakes that may invite Cyber/Web Security Risks

Cyber Attack: Common Mistakes that may invite Cyber/Web Security Risks





 Most organizations today, howsoever small or large are conversant with cyber security and the risks it addresses. Both the frequency and cost of breaches have continued to grow across technologies, security processes, employee training and customer data. According to Symantec threat report, more than 552 million identities were exposed through security breaches in 2013. The increased use of mobile devices for internet has also sparked a rising threat with 38% of users encountering some kind of vulnerability.

Hackers have continued to grow with technology. However, it doesn’t take much to make your data secure and confidential. Here are some of the top reasons why many businesses, comprising of both banks and ecommerce platforms have been exposed to an unwarranted third party.
  1. Weak and common passwords
Inspite of the repeated threats, users both individuals and businesses have continued to used passwords that can be easily exposed. Four out of every five incident occurs on the basis of hunch. 20% of users would have their birth date, their pet’s name or even their girlfriend’s name as a password! Personal information is easily guessable and if you are using it as a password to your email address or bank account, you can already guess the risk. Google also suggested that strong passwords must be a combination of characters, numbers and special characters (#, *, etc) and nothing close to something that could be guessed. Below are top 10 passwords which reportedly most used password sin 2014 by users.
1
123456
2
password
3
12345
4
12345678
5
qwerty
6
123456789
7
1234
8
baseball
9
dragon
10
football


Report: Splashdata
Another thing to note here would be that 12 percent of users have stored or shared their passwords through text massages, written it down on paper, on the desk, etc. This can encourage a breach.
  1. Not using SSL certificates
SSL certificates are applicable to websites. SSL or Secured Socket Layer acts as a cipher code that can only be recognized by the users at both ends – the customer and the seller. Even if the information is hacked by a third party, the data is rendered incomprehensible. Using SSL certificates not only secures the information passed online but also helps build the customer’s trust.
SSL Certificates are most important factor for every business including eCommerce because it prevents cyber threats and secure online transaction details with high encryption feature. ClickSSL is leading SSL Certificates provider in the business which provides major types of SSL Certificates from trusted brands and allows businesses to secure their website from cyber threats.
  1. Using untrustworthy plugins and software
The evolution of open-source era has really made web and app development easier. However, you never know the real motive. Hidden in the script could be some lines of codes that can give access to critical information once you have installed it in your system. Whenever you are downloading a third party software or plugin, ensure that it comes from a trusted developer and vendor.
  1. Not hiring Cyber Security Specialist
The complicacy of cyber crime has matched shoulders with technological innovation. Consequently, only a professional has the key and knowledge to identify bottlenecks and curb a threat before they start to work to the advantage of the hacker(s). A cyber security professional doesn’t just ensure that you have a secure website but also gives you precisely tailored advice and tools to make your platform invulnerable. Consequently, most big businesses and brands have started investing in cyber security that ever before.
  1. Missing device protection
Mobile devices can be easily stolen. Without necessary access protection installed into the device itself, it can be a wealth of information for a cyber criminal. Again, more than 86% of users use free Wi-Fi without checking for a secure connection. Any transaction made while using this connection makes your information vulnerable. Expert’s advice to always logout after a session has ended; using secure connections and always password protect access devices.
  1. Clicking every advertisement randomly
Most pop up ads and redirected web search are for malicious purposes. Use internet wisely and never click of anything without knowing where it will lead to just because it made you curious. In recent article on ComputerWorld says that malicious ads on major sites helping attackers to compromise many computers.
  1. Missing backups
Syncing information is vital as it serves a way to retrieve lost information after a cyber attack and wipe-up. You never know when there could be a breach and you land up in emergency.

Cyber crime is always well organized and done by some of the smartest minds. They are aware of every bottleneck and loopholes and it is your job to ensure complete protection.
Security Tips to Secure Your Android Phone from Getting Hacked

Security Tips to Secure Your Android Phone from Getting Hacked


 


 

Security Tips to Secure Your Android Phone from Getting Hacked

     Your mobile devices or even mine for that matter, house every sort of data imaginable. Think of all those selfies and the videos, synced bank accounts, Social Media as well as email accounts or contacts with their full details. It goes without saying that by storing all the information on a single (or multiple) device, we all face potential threats from hackers, who stealthily gain access to your smartphone or tablet and steal valuable information without your knowledge. The situation is worse in the case of Android phones.

One of the biggest weaknesses of the Android platform lies in the way in which the apps on a device communicate crucial information with servers. As is obvious, most of this communication is unencrypted and paves the way for hackers to exploit this vulnerability. Other than the issue with encryption, third-party advertising software can also leave your Android smartphone exposed to hackers. This is just the tip of the iceberg.
The scenario is scary because a hacker can not only access crucial/sensitive data, but also use your identity on various Social Media accounts and act as an imposter, carry out financial transactions from your bank accounts, hold your device hostage and most importantly, spy on your day to day activities and leak out sensitive information about you. Sounds scary right? What if I also tell you that these hackers can put your smartphone in a Botnet and carry out an array of illegal and fraudulent activities? Yes. Therein is the actual threat.
How to detect whether or not your Android device has been hacked?
Now there are no steadfast rules, but some telltale signs that will surely help you detect whether or not your Android device has been hacked. Take a look at the pointers that I have compiled to know which are these signs.
  • You get a long mobile bill that you have no clue about and it includes calls that you never made and SMSes that you never sent. The same holds true with bank transactions, which you never carried out. Both are signs of your mobile data being compromised at some or the other point of time.
  • Your mobile acts weird, even when the device is new. For example, certain apps might open and close on their own or send out texts without you doing as much as tapping the screen for approval is a sign of your device being hacked.
  • Your mobile battery is draining faster than ever. Of course, there are many other factors that can lead to this such as apps that consume a lot of battery power when they run in the background. But we can’t rule this point out.
  • Your phone runs extremely slow and keeps on getting hanged or restarts several times in a day. This can be caused by a malware or a hacker trying to modify some data in your device.
These situations can easily be done away with, if you know some top tips that are listed below to secure your Android phone.
  1. Always keep the software of your device updated: One of the key loopholes that malicious software look forward to is the outdated software of mobile operating systems. Therefore, when you update the software on your smartphone, you automatically reduce the risks of falling prey to hackers and malware. So, the next time an update notification pops up on your screen, remember to tap it and approve.
  2. Avoid third-party app stores: Always make it a point to download and install apps on your Android device from Google Play Store instead of a third-party app store or even some random websites. These are unreliable sources and you never know which of the apps will be infested with potential malware that will do you immense harm. Additionally, set up a separate PIN to make all the purchases on Google Play to stop unauthorized purchases.
  3. Use data encryption settings: Use encryption settings on your device to protect the data. This includes your Google accounts, application data and download information and you can enable it by going to the Security tab in Settings and checking Enable Encryption.
  4. Let go of the auto-complete feature: Make it a point to turn off the auto-complete feature on your smartphone. Even if you do feel lazy and irked to type the data every time, you can be sure that your personal data will not be up for grabs to the hackers. Similarly, avoid using the ‘show password’ feature that are available for a number of apps and websites.
  5. Don’t store your passwords in an app: Some people use apps that let them store all their passwords such as that of different apps, email accounts, Social Media accounts and even credit card or mobile/net-banking, in one place. This is a strict no-no. Even though the app is high quality and comes with several security features and functionalities, it is software at the end of the day that can be tampered with.
  6. Avoid charging your phones in public charging points: The constant use of mobile phones drains out battery, leading us to rush and charge our devices at the kiosks, especially when we are on the go. There are also fake charging points, which are the size of a shoe-box with power supply cords attached to them. These are placed by Juice Jackers to gain access to your phones. Here is how you can outsmart them.
  7. Don’t use public/Free Wi-Fi: Free Wi-Fi is definitely one of the perks that technology has bestowed upon us all. But wait. Before you use the unlimited Wi-Fi connection that comes free of cost and that too in a public network, think twice. Sending personal data over unsecured Wi-Fi makes your Android phone more vulnerable to hackers than you can ever imagine.
  8. Turn off your Bluetooth: Turn off your phone’s Bluetooth when not in use. Hackers can use unprotected Bluetooth networks to gain access to your device. If you do want to pair it with another device, use passcode. Do not allow any device to automatically pair with yours as this can lead to data theft and transfer of malicious code.
  9. Browse safely: I know, this is a basic step and you all are aware of the fact that browsing safe is the thumb-rule of ensuring security on the internet. But sometimes, when we are in a hurry, we hastily click on some links without a second thought. This can lead to the download of malware on your device without your knowledge.
  10. Delete browsing history on a regular basis: It is also important to delete your browsing history including cookies, cache and stored passwords, if any. Removing your virtual footprints will help your private information stay private and away from a hacker. Also, remove any temporary files stored in your phone on a regular basis.
To Conclude
In an era where practically everything is dependent on our mobile devices, taking precautionary measures to secure them does come in quite handy. Use these simple but effective tips and you will not lost sleep over your Android phone’s security!
Security Tip: Top 10 Worst Internet Security Mistakes

Security Tip: Top 10 Worst Internet Security Mistakes



 
The internet is getting increasingly popular for people to use (and use it to solve more of their problems), and thus it is getting increasingly popular for crime to happen over the internet as well. Hackers are not going to go away, and with identity theft being one of the most common crimes in the United States, your internet security is something you should be taking extremely seriously.

1) “password”


When you are choosing your passwords, what do you normally do? Do you optimize your passwords to the best security you can manage, or do you just type in “password” all of the time and let it be?
You should never pick a simple password, anyone wanting to get at your data will probably try out this list of commonly used passwords before resorting to anything more time-consuming. Even if you use the same password everywhere (which you shouldn’t), you need a strong password to protect your data. Change it now if you need to.


2) Using Public Networks without Protection.


While public networks such as those found in cafés, libraries, and airports might be incredibly convenient for you and help you stay in contact with people better while saving you money on your data plan, they can be incredibly dangerous to your online security and anyone with the right equipment (which isn’t expensive or hard to use) can take a look at what you are uploading or downloading (this includes financial data) if you are not prepared.

To be prepared, you will likely want to use a VPN, which will create a barrier of sorts around your connection and safely connect you to an outside server which will do your browsing for you and send you the data you need over that secure connection. This way no one will able to steal your data or know what you are doing.

3) Using Questionable Websites

This one doesn’t need much explanation. If a website is offering something that looks too good to be true, it is likely too good to be true. Also, make sure the website is as secure as possible, and don’t give your information to anything you aren’t 100% comfortable with.


4) Downloading Unknown Files


Whenever you download any file whatsoever, you should make sure exactly what you are getting. If you allow a file to be downloaded and activate on your computer then you are giving permission for that program to wreak havoc inside of your computer before you can possibly fix it. If you aren’t sure what it is, I can promise you that you don’t need it (or at least from that website).


5) Not Using an Internet Security Suite
This should go without saying, but you need internet security programs on your computer for it to function as a machine that connects to the internet for more than two months. A lot of people still don’t use them, and it usually leads to their ruin.


6) Not Checking and Clearing Cookies


Cookies and small programs or bits of information that are usually saved in your browser when you check a website or do something on it you want saved. Most of the time cookies are a good and useful thing that will save you time re-navigating pages you use often.
That all being said, sometimes cookies can be malicious and they might track your computer or take in data that you don’t want going anywhere. Every once in a while you should go into your browser’s options or settings (depends on the browser) and delete any cookies you don’t feel comfortable having on your computer.


7) Giving Out Too Much Personal Information


Maybe you need a strong public internet presence for one reason or another, but a lot of people don’t need to have everything out there for people to find when they are just using the internet for E-mail and Facebook. Try to figure out your own footprint on the internet and what people can find out about you if they look. Try to get rid of whatever you don’t want.

8) Neglecting to Update Your Computer


As incredibly annoying as those Windows security updates can be, forcing your computer to restart, they are usually there for a reason. If you are not updating often enough, you are vulnerable to whatever breach or loophole in the security that was patched up in the update (and that everyone knows about now that there was an update about it). Try to update any security related programs you have on your computer as soon as an update is available.


9) Failing to Keep Up to Date on Current Events


While this doesn’t mean that you need to have your head in the virtual tech newspapers every morning, you should try to stay abreast about whether any major websites are currently under attack or if there are any reports about a security leak which you might need to respond to. A quick glance over the major news sites and checking your email frequently should be enough to keep you informed.


10) Not Having a Backup Plan


Despite most people’s best efforts, sometimes there will be nothing you can do to prevent a security problem that will require your active attention. For this you should have a plan of what you are going to do and how you are going to quarantine the problem and keep your important information safe.

This means that you should try to have some backup drives in use and perhaps use a safe cloud storage program so you can restore everything you need to. Time will be of the essence, and you will not want to waste your time backing up your possible compromised files.

I hope that these security tips help you to create a strong defense against hackers and malware that intend to make your day a nightmare. Thank you for reading.