Posts

Here is why you should always use VIRTUAL KEYBOARD while entering your password online

Image
Cyber Security has become a serious issue these days. Use of internet has been dramatically increased all over the world in past 10 years and so the cyber crimes. All the online service providers are continuously working on providing their customers a secure online platform. Most of security vulnerabilities have been patched by most of the online service providers.   But what if the users make mistakes ??   No matter how much securities have been provided if the users make small mistakes online account information could be bridged. So it is also our responsibility to maintain and follow all the security rules that they want us to follow.     Before getting into today's main topic why we should always use a virtual keyboard while entering password online i would love to discuss why it is risky to use a PHYSICAL KEYBOARD .   To understand it from a Hacker's point of view first we will discuss what is the easiest way hackers use to track your key strokes. There are...

Is it safe to access deep web or dark web ? The real truth you should know today

Image
The answer is YES if you are an expert but NO if you are an ordinary Internet user. First of all you should have a purpose why you want to visit DARK WEB or DEEP WEB. Though it is not illegal to access darknet but there are many risks that could cause problems if you are not fully aware of them. So before getting into the main topic of today let me explain what dark or deep web is. Dark Web is also a part of World Wide Web that is only accessible with the help of special software like Tor , I2P etc. These are basically open source software and can easily be downloaded from internet. The darknets which constitute the dark web include small friend to friend peer to peer networks , as well as large popular networks like Tor, I2P operated by public organizations and individuals. It also called onion routing. What are the Risks ?   Many illegal activities like drugs dealing, illegal sex contents of children, guns and other weapons dealing, black marketing, selling of stolen goods etc ar...

How to be safe on facebook? Don't do this mistakes ever on Facebook ( read now )

Image
Facebook has become a part of our daily life. We share our daily activities on facebook by sharing photos status events etc. We share many information in messenger. Many of us use it for business purpose too. As you all know Facebook is the largest Social Networking site in the world. Facebook has 2.23 billion monthly active users. But how secure your facebook account is? A little mistake can cause your account being hacked. We all should have a little bit of knowledge about how hackers target and gather information so that they can perform a hack attack on different facebook account. There are thousand and thousands of reason why hackers do so but here in this article we will discuss about some techniques hackers use to hack facebook account. This knowledge will definitely help you to protect your account from such attack in future. But before we start off i would like to request you all to activate Two-factor authentication for your facebook account. This generally gives your faceboo...

Online Earning - How to earn money online , start your business today | 100% real answer

Image
Here in this article i will discuss with you some of the best ways how you can earn money online. As digital marketing is becoming popular most of the companies spending more and more money on promoting their products online. Social media like Facebook Twitter Instagram youtube are a great platform for this. If you have a facebook instagram twitter or a youtube account with a good number of followers you are half done. Below one by one i will discuss all possible ways how you can earn a huge amount of money online.       One thing i would like to say that patience is what you need most if you are here online to earn money . 1. Blog Post Writing : if you have good writing skill and have good knowledge to share with people you can start your blog today. Your blog could be about anything like tech blog, traveling blog, cooking blog, tutorial blog etc. Blogger is a nice platform that gives you a space to start with because it absolutely free of cost. And you can start earning...

How secure your OTP ( one-time password ) is | Read this article and think twice

Image
No matter if you are a online banking or a mobile banking user, a gmail account user or a facebook account user we all are familiar with the word OTP ( one-time password ). Yes it is the password that gives your online banking or your social networking account a much more better security that we had before. Now a day one-time password ( OTP ) are most popular feature of most of the Banks through which a user verifies its identity using OTP that has been sent to their registered mobile number that they had provided to the bank at the time of account opening in the bank. Not only the banks but also the Social Networking Services like Facebook, Email Services like Gmail started using OTP ( one-time password ) as a two step verification to help their users to secure it from the hackers. With no doubt OTP ( one-time password ) is secure cause when you try to log in to your online bank service or to a shopping website or to your social networking website first you need to fill up your email ...

What is Ethical Hacker and Ethical Hacking | Read this article to get the real answer

Image
When we hear the word Hacker the first thing that comes into mind is a bad person who generally hack into our system or network to steal important data or to harm our system but Ethical Hacking or Ethical Hacker these terms are used to describe a type of hacking performed by an individual or a company to identify potential threats on a computer or a computer network. These kind of Hackers attempt to bypass all kinds of system security and search for all the weakness that could be used by the bad hacker community often called THE BLACK HAT HACKERS. These information then used by the organizations to improve their Security. TYPES OF HACKING  There are different types of hacking in the list : 1. Computer Hacking - Here different types of method used by hackers to get access and steal confidential data from a system. 2. Network Hacking - Here hackers use different type of tools to gather information about a particular network and destroy the network system or steal data from differen...

What is SYSKEY in a Windows Computer and what is it used for ?? ( read this article now )

Image
Well it is a very nice topic to discuss with. SYSKEY stands for system key and it is an executable file generally used to secure the SAM ( security account manager ) database.The syskey can also be used to secure your windows by configuring the start-up password that should be entered to decrypt the system. Syskey was first launched in Windows NT 4.0 SP3, syskey was launched to protect against offline password cracking attacks by preventing the processor of an unauthorized copy of the SAM file. But a bad news for Windows 10 user:       The syskey.exe utility is no longer added in windows 10. Windows will never prompt for a syskey password during startup. So if you want to use boot-time OS security in Windows 10 you can use bitlocker instead of syskey.exe utility. Don't worry windows 10 users because bitlocker is also good to improve your security. So if you are using a version of windows before windows 10 you can take advantage from syskey.exe utility.   Below in thi...