Tip of the day

Tip of the day

Prevent USB Drives from Spreading Viruses

When you stick a thumb drive infected with a worm like Conficker/Downadup into a clean system, the normally handy AutoPlay feature launches the worm and spreads the infection. You can prevent this by flipping the master switch. Here’s how:
1.Click on the “Start” button and pick “Run.”
2.Enter the text GPEDIT.MSC and press Enter. After a moment, the Group Policy editor window will open.
3.In the left panel, double-click on “Computer Configuration.”
4.Double-click on “Administrative Templates.”
5.Double-click on “System.”
6.In the right panel near the bottom of the list, double-click on “Turn off autoplay.”/
7.The default setting is the “Not configured.” Put a bullet in “Enabled.”
8.Make sure “Turn off Autoplay on:” is set to “All drives.”
9.Click on “Apply,” and then “OK”.
10.Close the Group Policy editor window.

Use plain old common sense
                   When in doubt, err of the side of safety. Delete email attachments from people you don’t know (WITHOUT opening them!). Beware especially aware of tempting animations on unprofessional-looking sites. Keep an eye out for strange links or attachments in Instant Messaging (IM) programs—they just might contain malicious code..

tip of the day

tip of the day

What is a KEYLOGGER?
These are programs which record key presses (i.e. what a user types on the keyboard) and can be used by a hacker to obtain confidential data (login details, passwords, credit card numbers, PINs, etc.). Backdoor Trojans typically come with an integrated keylogger.. .
install some good security anti keylogger software like key scrambler.it encrypts users keystrokes in real time to protect users privacy against data theft by keyloggers and keylogging malware ..you can get it from http://www.qfxsoftware.com/  free version aslo available along with paid one…so install it and be secured

Tip of the day

Many people think that ‘formatting’ a hard drive will wipe out all the data so it cannot be recovered

Not so. To prevent the possibility of future recovery, use a third-party, low-level hard drive formatting tool, such as Killdisk (downloadable at no charge from http://www.killdisk.com) to overwrite data on the hard drive with a random sequence of 1’s and 0’s.. 

Tip of the day

 Swipe your CD and DVD media:
              Gently wipe each disc with a moistened, soft cloth. Use a motion that starts at the center of the disc and then moves outward toward the edge. Never wipe a disc in a circular motion..

Do u know about spam?

Spam is anonymous, unsolicited bulk email – it is effectively the email equivalent of physical junk mail delivered through the post. It is sent out in mass quantities by spammers who make money from the small percentage of recipients that actually respond. Spam is also used for phishing and to spread malicious code.

Over the last decade, the use of and delivery of spam has evolved. While spam was initially sent directly to computer users and easily blocked, in the coming years, high-speed Internet connections allowed spammers to send out mass mailings inexpensively and quickly, as did the discovery that individual users’ modems could be accessed by anyone from anywhere in the world since they had no protection at all. In other words, unsuspecting internet users’ connections could be used to send their spam in much higher volume.

That was until hardware manufacturers began securing their equipment, and filters became more proficient at blocking spam. Yet, spammer techniques have always evolved, not only in the way they send spam, but also in response to filters. The result is an ongoing battle between spammers and those working to prevent them, constantly trying to stay one step ahead in the fight to keep spam from clogging the information superhighway..

Tip of the day

If you’re shopping or banking online, stick to sites that use encryption to protect your information as it travels from your computer to their server. To determine if a website is encrypted, look for https at the beginning of the web address (the “s” is for secure).

Some websites use encryption only on the sign-in page, but if any part of your session isn’t encrypted, the entire account could be vulnerable. Look for https on every page of the site you’re on, not just where you sign in..