Posts

How secure your OTP ( one-time password ) is | Read this article and think twice

Image
No matter if you are a online banking or a mobile banking user, a gmail account user or a facebook account user we all are familiar with the word OTP ( one-time password ). Yes it is the password that gives your online banking or your social networking account a much more better security that we had before. Now a day one-time password ( OTP ) are most popular feature of most of the Banks through which a user verifies its identity using OTP that has been sent to their registered mobile number that they had provided to the bank at the time of account opening in the bank. Not only the banks but also the Social Networking Services like Facebook, Email Services like Gmail started using OTP ( one-time password ) as a two step verification to help their users to secure it from the hackers. With no doubt OTP ( one-time password ) is secure cause when you try to log in to your online bank service or to a shopping website or to your social networking website first you need to fill up your email ...

What is Ethical Hacker and Ethical Hacking | Read this article to get the real answer

Image
When we hear the word Hacker the first thing that comes into mind is a bad person who generally hack into our system or network to steal important data or to harm our system but Ethical Hacking or Ethical Hacker these terms are used to describe a type of hacking performed by an individual or a company to identify potential threats on a computer or a computer network. These kind of Hackers attempt to bypass all kinds of system security and search for all the weakness that could be used by the bad hacker community often called THE BLACK HAT HACKERS. These information then used by the organizations to improve their Security. TYPES OF HACKING  There are different types of hacking in the list : 1. Computer Hacking - Here different types of method used by hackers to get access and steal confidential data from a system. 2. Network Hacking - Here hackers use different type of tools to gather information about a particular network and destroy the network system or steal data from differen...

What is SYSKEY in a Windows Computer and what is it used for ?? ( read this article now )

Image
Well it is a very nice topic to discuss with. SYSKEY stands for system key and it is an executable file generally used to secure the SAM ( security account manager ) database.The syskey can also be used to secure your windows by configuring the start-up password that should be entered to decrypt the system. Syskey was first launched in Windows NT 4.0 SP3, syskey was launched to protect against offline password cracking attacks by preventing the processor of an unauthorized copy of the SAM file. But a bad news for Windows 10 user:       The syskey.exe utility is no longer added in windows 10. Windows will never prompt for a syskey password during startup. So if you want to use boot-time OS security in Windows 10 you can use bitlocker instead of syskey.exe utility. Don't worry windows 10 users because bitlocker is also good to improve your security. So if you are using a version of windows before windows 10 you can take advantage from syskey.exe utility.   Below in thi...

How to bypass a crashed web browser caused by malware attack and fix this problem

Image
How to Bypass a crashed Web Browser caused by Malware attack: Y ou may have faced a situation where a malware attack causes a crashed web browser. And whenever you try to uninstall and then reinstall a web browser it gives you the same result as the malware still present in your system it prevents you from fixing it up. I n such situation you first need to install an Anti Virus program to your system and update it so that a full system scan with that antivirus can find that malware and disinfect your system from it. But In such situation as you are unable to use your browser so you can't download it from the Web.                                                                                                             ...