Business social network LinkedIn said it is investigating reports that more than six millionpasswords have been stolen and leaked onto the Internet. Although LinkedIn did not confirm if any user data had been hacked or leaked, researchers at U.K. Web security company Sophos say they have confirmed that a file posted online does contain, in part, LinkedIn passwords ``hashes.'' That's a way of encrypting or storing passwords in a different form. Graham Cluley, a consultant with Sophos, recommended that LinkedIn users change their passwords immediately. LinkedIn has a lot of information on its more than 160 million members, including potentially...
Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts
Saturday, June 16, 2012
Sunday, November 6, 2011
Saturday, July 16, 2011
Protect your Data, Passwords
It’s hard to remember multiple passwords and keep sensitive information secure in this digital age. Whether you use a Mac, PC or smartphone, various free tools can help you with this by securing all passwords with a master password, encrypting data and securely wiping any sensitive info explain Karan Bajaj & Hitesh Raj Bhagat EXCLUSIVELY FOR MAC OSX Encrypt This Simply drag and drop the files/folders you want to protect onto the application’s icon. It will then ask you to set a password for accessing the files and then create a protected disk image of your content. Get it from www.nathansheldon.com Pastor One of the simplest...
Wednesday, July 13, 2011
How to remove new folder.exe virus from pendrive
If you are using pen drive for data transfer at school, college or at your office you must have come across this virus. This virus creates an exe file in your USB drive with the name New Folder.exe. Here are some symptoms of this virus. Task manager is disabled. Registry Editor is disabled. Folder options not working. Taking too much time for accessing pen drive. Uses half of your computers processing power. You can easily remove this virus from your computer by using Smart Virus Remover tool. It is a small 550 Kb file. Just download the file from the link given at the end of this...
Thursday, March 24, 2011
Intel launches second generation processor - Intel Insider
Intel today launched a second generation processor called Intel Insider, a feature that will help people download and view movies in High Definition (HD) on their laptops and PCs. The PCs and Laptops with the Intel Insider processor would be available in the country from next month onwards, Intel's Managing Director, South Asia, R Shivakumar told PTI here. 'The launch of Intel Insider in India is absolutely befitting considering it is the home of one of the largest film industries in the world -- Bollywood. With Intel Insider, people can watch their favourite movies in HD at their homes on the day of release itself,' Shivakumar said. In...
Nokia job cuts might begin from April end
The world's leading mobile phone maker Nokia said Wednesday negotiations with unions over upcoming job cuts would begin at the end of April. 'We don't have an exact starting date, but we are planning to begin talks at the end of April, and then we will of course talk about the numbers,' company spokesman Tomi Kuuppelomaeki told AFP. Nokia has not yet said how many of its 16,000 developers worldwide it will let go as part of a new corporate strategy to phase out development of its smartphone platform Symbian. On February 11, chief executive Stephen Elop announced the company would begin adopting Microsoft's Smartphone platform instead,...
Wednesday, March 23, 2011
9 Things you can do with Wi-Fi
Wi-Fi can be used for a lot more than just connecting to your computer or phone to the internet. The technology can come handy for a variety of other tasks. Here are nine little-known uses of Wi-Fi. Make DTH signal go the distance Monsoon Multimedia's Vulkano is a device that connects to (and controls) your existing DTH set top box (STB). It has to be set up so that the STB outputs to the Vulkano, while the Vulkano is connected via HDMI to the TV. You can watch TV normally, but Vulkano also lets you stream your existing TV, which you've already paid for, to any internet-connected PC, Android phone or iPad/iPhone/iPod Touch. Whether you're within your Wi-Fi connected home, or anywhere in the world, you can connect to the Vulkano box, switch on the STB and watch or record live TV....
Monday, March 21, 2011
CISCO - LINKSYS E-1000

GO WIRELESS AND EASILY PUT THE SPEED AND POWER OF WIRELESS-N TECHNOLOGY IN YOUR HOME….. PRESENTING LINKSYS E-1000 WIRELESS N ROUTER…….. BEST FOR : - STANDARD, QUICK TO INSTALL, WIRELESS – N CONNECTIVITY FOR SURFING THE WEB, SENDING EMAIL AND FILE SHARING…. BENEFITS : - Ø WIRELESSLY SURF THE WEB AND SEND E MAIL. Ø SHARE FILES AND PRINTERS Ø QUICK SET UP PASSWORD PROTECTED GUEST ACCESS, PARENTAL CONTROLS, ADVANCED SETTING HOW WE DO IT :- Ø WIRELESS N TECHNOLOGY WITH 2 INTERNAL ANTENNAS Ø 2.4 GHz BAND OPERATION Ø CISCO CONNECT SOFTWARE Ø ADVANCED SECURITY AND FIREWALL PROTECTION Specifications Ø...
Sunday, March 13, 2011
BELKIN Play Max wireless router

One of the best routers available today with just one flaw. The name ‘Play Max’ raised our expectation before we actually tested this IEEE 802.11n based router and when we did it we were not at all disappointed, in fact disappointment came from other features. Once out of box what you have in hand is a compact clean looking router with hidden antennas and single indicator light and WPS button in front for hassle free secure connection setup. Number of connection ports at back is where Play Max has edge when compared with other similar products; there are 5 gigabit ports (1xWAN, 4xLAN) which would be ample for any wired connection plus...
Friday, March 4, 2011
Interesting story behind Trojan Horse
We all have heard about the viruses named Trojan Horse, Trojan Horse is a kind of virus which appears to perform it’s intended tasks, But silently steals all the information from your computer or harms your computer in a way which may be difficult to recover. Interestingly I got to know a story about the name Trojan Horse virus, Here it goes… In Greek Mythology they believe there was a city called, City Of Troys & there was other kingdom of Greeks. They fought for about 10 years and the war was called the Trojan War. After 10 years of fight the greeks still had nothing in their hands, it was a fruitless siege , So the greeks declared...
SvcHost Exe process info & virus details
What is an SVCHost.exe file? & What is it doing in your task manager? An svchost.exe file is a windows generic host process & is there for a good reason, This files is a native integral part of the windows operating system. It basically supports various windows services running from the Dynamic Link Library (DLL) files of windows. The services that may require SVCHOST.Exe include Windows Firewall, Automatic System Updates, Windows themes , Plug and play, Fax & printer services & many more. These services ideally start automatically when the windows system starts. These files are found in all windows operating systems launched...
Saturday, November 13, 2010
Walkie Talkies FAQ
Q: Which radio band is right for me? A: FRS Walkie Talkies are ideal for folks who generally wish to use these for outdoor purposes such as when hunting, fishing or camping. They are free of interference from business and government agencies and don't require you to have a license. GMRS have a much broader range for talk, extending up to five miles. These aren't intended for hobby use, rather they're meant for purposeful communications such as business or commercial activity. You must obtain a license from the FCC in order to operate in this band. .adheadline {font: bold 10pt arial; text-decoration: underline; color: #0000ff;} .adtext {font: normal 10pt arial; text-decoration: none; color: #000000;}try{var AdBrite_Iframe=window.top!=window.self?2:1;var AdBrite_Referrer=document.referrer==''?document.location:document.referrer;AdBrite_Referrer=encodeURIComponent(AdBrite_Referrer);}catch(e){var...
Walkie Talkie Distances

Size doesn't matter, right? Well, perhaps. But when comparing distance capabilities in walkie-talkies it sure does! There's the more common 2-mile and 5-mile units. And then theres the less common like the 7-mile, 8-mile or even 10-mile units. Your range of service needed really just depends on what your use will be. Hikers, for example, might prefer a greater range of distance. The important thing to keep in mind when considering distance is that buildings, hills and other tall, solid structures can very easily get in the way of your transmitted signal. Distance is especially an issue with hunters, hikers and campers. FRS radios...
Walkie Talkie Channels

How many channels do I need? Just like your radio or TV at home, walkie-talkies utilize channels to obtain their signal. FRS radios typically have either seven or 14 channels. Though, in most cases, the manufacturer will give you 38 possible CTCSS tones to use in the receiving and transmitting of your handheld radio. This means that, with a 14-channel radio, you could have up to 532 separate channel configurations or frequencies. GMRS units provide you up to 22 channels. However, please note that when in a well-populated area, anyone with CTCSS disabled on their walkie-talkie will be able to hear your radio transmission on their radio. The tones,...
Sunday, August 22, 2010
Fingerprint Time Attendance System - Time Counts In Office
Fingerprint Time Clock and Recorder to be used as a business clocking in/out system for employees. No more cards, no more paperwork, no more hassle! This digital fingerprint access terminal and data logger registers finger prints for time management and can also work as an authorized personnel access device (door unlocking) when attached to electronic doors. For Employment - The purpose of this device is to help employers and employees more easily record daily time worked. This model fingerprint time attendance unit helps companies to manage attendance records more easily (it comes with professional attendance software that lets you...
Sunday, May 2, 2010
Steps to Protect Your Computer..!!
1. Turn on automatic updates. After installing your operating system, you usually forget to pay attention on operating system updates. If your operating system is not updated for protection against loopholes and security threats found after you installed it, your computer may be vulnerable to outside world. Hackers can get access to your computer by using these loopholes and they can do anything with your computer. So, to keep you safe, turn on automatic updates. When automatic updates are turned on your operating system is updated frequently and you will be safe from unwanted trouble. You can turn on automatic updates from Control Panel => Security Center => Automatic Updates. You must be logged in as Administrator to change this setting. 2. Turn on Windows Firewall. Windows Firewall...
Tuesday, March 9, 2010
How to reset Trial period in Softwares
Many Software use third party software like Sentinel or Win License for protection and licensing. These protectors will have functionality for trial periods also. Using this, many software gives 15 or 30days trial period after installation like Kaspersky. However there are software that can reset the trial period of such software. As you all know, the protection software will store the trial details in the Windows Registry. Finding and Decrypting the registry values is almost close to impossible when manually done. But a Software called “Trial Reset” can do this job for you. The software is free and it can effectively clear trial period of almost any protection. This is how Trail Reset works The host software will create registry keys, which contains the encrypted keys and details...
Sunday, January 31, 2010
Hide Private Files and Folder On USB With WinMend

WinMend is a free tool which is the first free tool which lets you hide your private files and folder which you don’t want others to see while they access or use your USB Pen Drive. This works successfully to hide files and folders both on your computer and your Removable Drive. This application has a very simple interface, which allows you to hide any folder or file not only computer, but even on the removable drive. All the files hidden with this tool will be securely hidden even when the USB drive is accessed in another operating system or at any other computer. You can set password to hide files and folders using this tool, it has...
How to Kill Any Running Process From Desktop Shortcut
Yes you can kill (Terminate) any program or process running in windows simple by desktop shortcut to terminate the running process by forcefully end it with task kill command in windows. In this method I used to kill yahoo messenger as it keeps running under the processes, even after closing yahoo messenger completely or you can use this method to kill any hanged process in windows, through this way you can forcefully kill any process on windows instantly. Here is how you can create a desktop shortcut to kill any process instantly In order to terminate the process instantly you will need to send some kill signal command using the some arguments...
Thursday, December 3, 2009
CRIME WATCH
(1) Today I passed by a building which has an ATM machine. There was an old man looking at me. Suddenly, he called me. He said he did not know how to read, so he gave me his ATM card and asked me to help him withdraw money from the ATM machine. I answered ‘NO! If you need help, ask the security to help you.’ Then he said ‘never mind…’ and continued to find other people to help him… REMEMBER: ATM machines have CCTVs. If you help him he will later claim that you have robbed him or stolen his ATM card. Besides, his ATM card could be a stolen one. So please be careful of these tactics. (2) Suddenly your house lights go off. From your window you find that your neighbors still have their lights. So you go out of your house to check the Meter Box. But once you open the door, a knife will be pointing...