attention windows 7 users

Is windows 7 still good ? Users who are still reluctant to upgrade are warned by Google about the vulnerability of their current system. Windows 7 users using Chrome browser get advise to upgrade their operating system to the latest windows 10. This comes after some potential vulnerability is found recently by Google’s threat analysis group. Major bug was revealed with Google chrome browser. Malicious codes attacked is directed towards users having older version of Chrome with Windows 7. Large numbers of users are vulnerable to risk, which can enable Attackers to take privileged access of the PC Even thoughRead More →

how to prevent wannacry ransomware attack,,how to avoid wannacry ransomware attack,preventing ransomware attack,4 ways to prevent ransomware attacks

how to avoid ransomware attacks | You will be no exempt from this ! Everyone is a part of this huge campaign . Be alerted about that email with Invoices , Quotes and application for fortune or lottery scheme that comes to your email from an unknown person. The title and content is so appealing that you are induced to open the attachment. Read More →

Prevent cyber attacks | Many people say you should never have a song play automatically when someone hits your website?. but don’t be alarmed, I have decided to alert because I want to show how easy it is to have your browser hijacked. I find that most people do not take me seriously when I explain to them how easy it is to have your device compromised. When you go to a page that automatically plays Flash video or audio, you are in danger of being hacked. You really should protect yourself against this. Just because you only go toRead More →

How does firewall protects a network?  A firewall is a piece of software or hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet. If you are a home user or small-business user, using a firewall is the most effective and important first step you can take to help protect your computer. Different Types of Firewalls Different firewalls use different techniques. Most firewalls use two or more of the following techniques: Packet Filters: A packet filter looks at each packet that enters or leaves the network and accepts or rejects the packetRead More →

At daily basis a large number of the common internet users get hacked and become a victim of the cyber frauds. They become victim of such attacks because of the fact that they even don’t know about the word “Security”. There systems are majorly not up to date in order to meet the recommended requirements for security. As a result due to many weaknesses present in there system these are easily exploitable without any warning. I am publishing this article to help you let you know that how can you make your self more and more secure. It would notRead More →

An IP address is the numeric label or sequence of numbers that is assigned to a computer or device used on the Internet or a LAN . It is a means of identification and determining the user’s address online. When an IP address is blocked, network connections to or from that address are not permitted. An IP address can only be blocked through a firewall that is installed on the computer. Windows users have two options for blocking an IP address Through the built-in windows firewall . How to Block an IP Address Using the Windows Firewall Step 1 – SelectRead More →

Firewall protection works by blocking certain types of traffic between a source and a destination.All network traffic has a source, a destination, and a protocol. This protocol is usually TCP, UDP, or ICMP. If this protocol is TCP or UDP, there is a source port and a destination port. Most often the source port is a random port and the destination port is a well-known port number. For example, the destination port for HTTP is 80 and the destination port forDNS is 53. If the protocol is ICMP, there is also an ICMP message type. The most common ICMP message types are Echo Request andRead More →

Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats. 1. Check Windows Update and Office Update regularly (_http://office.microsoft.com/productupdates); have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.2. Install a personal firewall. Both SyGate (_www.sygate.com) and ZoneAlarm (_www.zonelabs.com) offer free versions.3. Install a free spyware blocker. Our Editors’ Choice (“Spyware,” April 22) was SpyBot Search & Destroy (_http://security.kolla.de). SpyBot is also paranoid and ruthless inRead More →

Its  important to take all the possible steps to keep your network safe and away from hackers. When a hacker gains access to your network, all sorts of problems can pop up. It ranges from your inability to access your system to the worst-case scenario where your wireless network is used as a platform to launch criminal attacks.Use the below tips to keep your network safe: Disable the DHCP    For a hacker to gain access to your wireless network, when you disable your DHCP, the hacker must decode the IP address and the TCP/IP parameters. Disabling the DHCP willRead More →

     In this E-world of online transactions , its a fact to worry that the online  fraud and hacking is worth billions of dollars every year.  Hackers will utilize every chance of intruding and spying our details. In very few cases the untrusted shop workers are also causing a threat to our e-shopping transactions.There are risks  involved in making online as well as phone purchases.  So its important to learn how to shop safely online with our cards and bank accounts.       Nowadays, card and account details are mostly stolen by phishing scams. The fake  websites resembling the original bankRead More →