Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Safe & Security Articles
Page 87 of 88
Features that Matter in an Effective Mobile Anti-Virus!!
The usage of the smartphone has witnessed exponential growth in recent times. The benefit of using a smart device coupled with an active internet connection is endless. However, with multiple advantages, there is a possibility of unwanted suspicious threats. These threats are regarding the fall of your sensitive data which is present inside a mobile which may go into wrong hands through malware or spyware.Though most mobile users think antivirus as the only savior from a disaster, they lack the knowledge of judging the best one among all available. It takes a lot of parameters to decide the exact worthiness ...
Read MoreWannaCry Ransomware – How to Avoid Such Attacks
The recent WannaCry ransomware attack is so massive that it has affected more than 2, 00, 000 machines across 150 countries around the globe. There are individuals, various institutions and government agencies who became victims of this cyber extortion. Now all of them are desperately looking for a solution to retrieve their locked data. They may not want to pay the demanded ransom amount, but if they will not able to find a suitable solution then, may end up paying the ransom to the blackmailers.While paying the ransom amount, there is no guaranty that whether you will get back your ...
Read MoreTop Free Anti – Virus Softwares
Looking at the safety concerns of your Organization, an anti-virus software is a basic requirement in today’s technology-savvy world. Every now and then, we keep on getting new viruses launched in the market. This, in turn, requires a basic anti-virus software being installed on your PCs.If you are a start-up or a small scale technology firm, it is difficult to invest in a good and costly anti-virus software. Worry Not. We have some great anti-virus software available in the market for free or we can say at a very less price. These products are free only for non-commercial use; if ...
Read More‘Ransomware Locky’ a new threat decoded and How to Protect Yourself
A Government Organization CERT (Computer Emergency Response Team) has issued a high priority alert that a new ransomware Locky has spread like ransomware WannaCry which has compromised a huge number of the computer system in the India, which has also affected ATM network and Government offices computers too.The CERT issued a severe threat alert on Saturday and also advised to the users not to open any unknown emails from an unknown sender as it is estimated that an approx. of 23 million emails, messages are sent in the phishing campaign.The studies estimate more than 100 countries in the world have ...
Read MoreRansomware Attack – The Modern Ways of Cyber Extortion
The recent ransomware attack has changed the definition of centuries-old style of demanding ransom. Typically what we know earlier that, the bad guys kidnapped a person or an item and held captive to extort money or property to secure their release. That is the typical way of demanding ransom which we sometimes found in our national and international newspapers as well as in many Hollywood and Bollywood movies where similar stories are kept on playing.But, most of us may not ever thought of those files and folders on your desktops, laptops, and smartphones which can be locked and hold for ...
Read MoreHow To Configure and Set Up a Firewall on Ubuntu 16.04
In this article we will learn about – how to configure and setup UFW ( Firewall) on Ubuntu 16.04, UFW stands for Uncomplicated Firewall which acts as an interface to IPTABLES that simplifies the process of the configuration of firewalls it will be a very hard for a beginners to learns and configure the firewall rules where we will secure the network from unknown users are machines. UFW works on the policies we configure as rules.Pre-requisitesFor this, we needed a non-root user with root permission on the machine.Installing the UFW (Firewall)UFW is installed by default with Ubuntu, if not installed ...
Read MoreLearn How to Manage System Firewall using Iptables in Linux
Iptables and ip6tables are used to established, maintain, and check up on the tables of IPv4 and IPv6 packet filter ideas in the Linux kernel. Several distinct tables may be defined. Each table contains a quantity of constructed-in chains and may also contain person-outlined chains. Let us explore about how to manage a system firewall using Iptables in Linux.Installing IP tablesTo install IP tables, use the following command –$sudo apt-get install iptablesThe sample output should be like this –Reading package lists... Done Building dependency tree Reading state information... Done The following packages were automatically installed and are no longer required: ...
Read MoreHow to Avoid Spyware during Online Browsing?
Spyware is an unwanted program that gets installed in user’s system without his/her permission and tracks all the activities like important log-in information, valuable data, internet interactions etc. In addition to that, it hampers the performance of systems and even redirects web browser searches.Its rank on vulnerability is high because detection is very difficult. Before some spyware will be installed on your system, you have to open or click on some programs. The usual sources of these are spam folders of your mail, free downloaded software, misleading pop-ups and corrupt websites. Unless you are not sharp enough to judge these ...
Read MoreHow does WhatsApp “End-End Encryption” Feature Keeps data Safe?
WhatsApp has emerged as a popular smart app and is even more admired due to its secured chatting feature. With different versions, it offers users an additional security level each time, thus ensuring the safe messaging experience, but the updated version of WhatsApp post 31st march 2016 brought a revolutionary change by introducing a strong security feature for its users known as “end-to-end encryption”, designed on Open Whisper System. This has added another layer of safety to its application and has made more well-liked.What is End-to-end Encryption?End to end encryption means no one except you and the recipient can see ...
Read MoreHow To Set-Up Apache to use Password Authentication on Ubuntu 16.04
In this article, we will learn about how to setup and configure the Apache Web server to restrict from visitors without authentication where we can hide some important and critical information to the un-authenticated users.PrerequisitesWe needed an Ubuntu machine with a non-root user with Sudo privileges.An Apache2 web server installed on the machine.Installing the Apache UtilitiesWe needed to install an Apache2 utility package called ‘htpasswd’ where this utility is a part of ‘apache2-utils’ packages.This will help us to create and manage the username and password which is needed to access the restricted part of the website.Below is the command to ...
Read More