Sunday, April 19, 2015
Geepas Infrared Burner GK4413 Product Review
Wednesday, July 9, 2014
How Hackers Steal your Passwords
In my previous post entitled " BackTrack - Advanced Penetration Tools for I.T Pro ", I showed in detailed the threat of how black hat hackers steal WiFi Password and also gave some tips in order to avoid of being compromised. Also I mentioned in my post entitled " How to protect your Sensitive Account Info of getting HACKED- Phishing Method ( Part 1 ), of how a hacker clever technique of using identical website to trap a user to gather useful sensitive account credentials. Now in this post I'll show you how hackers steal your social account password like Facebook, Twitter and other social site account, your email or even your banking account online log-in credentials. Some of you were experienced this kind of threat where you cannot access your email, social account or there is a transaction in your banking or online money processor like Paypal that you didn't know or remember that you actually did the transaction. Nowadays black hat hackers are very very clever, so what should we do in order to safeguard our privacy while we are on the Internet ?. Let's first know of how this threat actually happened in real world. Sometimes a reader might going to believe if they see the real threat in detail before they actually believe that it's really existing. So Let's move on and make some experiment.
Thursday, July 3, 2014
BackTrack - Advanced Penetration Testing Tools for I.T Pro
As an I.T enthusiast whether it may be a geek, techy or whatever they call an I.T person, it's a must that we understand and know the possible threat that lies ahead in our Computer and our Network System, especially for PC - Network Administrator who are given an important task to manage and secure the PC-Network premises. As such, local and remote threats must be mitigate for the overall productivity. As Lao Tzu said " In order for you to know your enemy, You must become your enemy." This explain that we must know the footprints of our enemy and know their moves, for us to know the task of securing our PC and Network. Right knowledge and Right tools must become handy and aid us in this aspect of performing security threat mitigation. Although there are many tools, one can start for not paying much just to have a great penetration tools. One powerful tool is BackTrack- a free Penetration tools developed under Linux kernel system. In this post I will show you how to perform a penetration testing in Wi-Fi, as this technology is susceptible to many kind of attacks. So Lets move on....
Wednesday, June 11, 2014
How to Check and Monitor Computer CPU Temperature
![]() |
Image Source : www.jkcomputersystems.com |
CPU or Central Processing Unit is sometimes called the " brain " of our computer. Also called Processor because it handles all the instructions of a program and perform logical, arithmetic and input/output working in the system. It is one of the most important hardware or component in computer operation, without it probably there is no computer. Today CPU are much more faster and many companies like Intel and AMD has a continuous research and development to improve the technology to make computers a supercomputer that think like humans as " Artificial Intelligence". With the advancement of our technology of course there is also some factors to consider in order to prevent damage in any components in our computer to prolong it's life and boost it's reliability and productivity. Computers is our companion, so taking care of it is a must. We all aware that the faster the speed of computer, the better. But as the speed increases, the temperature of a device also increases, and if the temperature continue to increase beyond its limit, the performance of a device is much affected and there is a possibility that it might break down. So let's be aware for that.
Monday, June 9, 2014
How to Remote Control PC - A Legit Way
Remote Control ? Yes your right ! It's just like using your TV remote control or any remote when accessing your home appliances. But remote control a PC goes another way. It allows you to control a one PC using another computer, and use it as if you are facing your own computer. You can control the mouse, the keyboard, everything. But you may think that is some sort of hacking ? If you hear the word hacking, I know it makes a bad impression to you. Not knowing that hacking has a good side also, like for example if you are working in a big companies, every PC Administrator has the right to see what you are doing in your PC, in short you are being monitored, for the sake of your companies productivity. And for example you need an online technical assistance for your computer, and the technical support have it fixed just doing via online or the so called Remote Desktop Assistance. Hacking is good if DONE in a LEGITIMATE WAY. Now I will show you How to Remote PC and take advantage of many good aspect to boost your productivity.
Image Source : www.teamviewer.com
Wednesday, June 4, 2014
BUBBLEWS - Write your story and EARN Money
If you are new seeking online opportunity , then it is one of the best way to start your career. Bubblews is my third program " Work at Home / Earn Money Online, that I added into my list, aside from Humanatic and Blogging. I only picked with what I think, is more valuable and worth to work for. Internet has a vast unlimited opportunity and I've found out that it's really worth giving my best effort to start a new career here. Learning is fun and you will discover something that even in your home, there's an opportunity to earn enough and sustain your family needs. Let's move on and I'll show you what Bubblews program is all about.
Monday, June 2, 2014
How to protect your " Sensitive Account " Info of getting HACKED - Phishing Method ( Part 2 )
In my previous post, How to protect your " Sensitive Account " Info of getting HACKED - Phishing Method ( Part 1 ), you see how black hat hackers, try to steal your sensitive account information and how they do it in a nice, well crafted, genius way. You also learned one simple idea of how to protect yourself from this fraudulent act. You also learned how phishing is disguise as a official looking copy cat site. Now I'll try to detail out and elaborate more of how this technique come to you as a bait. I'll also try to give you more information of how to fight Phishing and prevent you of being the next victim.
How to protect your " Sensitive Account " Info of getting HACKED- Phishing Method ( Part 1 )
Online banking, Online Money Processor like Paypal etc., are widely used now because, you can access it anytime, anywhere and with just a click you'll be able see the status of your valuable account, and even withdraw your money or transfer it to any account, with just simple click. What about if that's easy, simple click also can harm your sensitive account and with a blink of an eye, your hard earned money will be gone. Many are not still aware, Internet is just like our surroundings, there's a good guy and also a bad guy. In our home it's common to secure our house and even install security gadgets in order to protect it from the bad guys. Just like our home we must also educate ourselves and install security measures in order for us to protect our " sensitive account information " when browsing the Internet and dealing with transaction online.
Image Source : www.searchenginegenie.com
Saturday, May 31, 2014
Spying on You through your Webcam
Sounds creepy ? but it's TRUE. Many still didn't know yet that this is happening. You didn't even know that there is someone who is watching you over your webcam. The truth is thousands of webcam users get hack and if you didn't know " How to protect Yourself ", maybe the chance of getting hacked is higher. So for in this topic I'll be explaining some of the best precautions and necessary steps to secure your webcam.
How to Protect USB Drive with Password
I still remember when floppy disk is so popular during the time that computing comes out as one of the promising technology. Floppy disk is portable and light storage device used to transport data between any computers or to any device that support it. But now USB thumb drive has emerged like floppy disk before, it is use to read and write data between any device that has USB port. A wide variety of USB drive are now in the market and the storage capacity is increasing making it so easy to store any valuable data or files in a single portable device. But one disadvantage of it is that it can be easily be lost because of its size and portability. So how about if you have important and confidential data that are stored and suddenly you lost it ?
Subscribe to:
Posts (Atom)