Found 987 Articles for Safe & Security

Top Free Anti – Virus Softwares

karthikeya Boyini
Updated on 23-Jan-2020 11:23:25

219 Views

Looking at the safety concerns of your Organization, an anti-virus software is a basic requirement in today’s technology-savvy world. Every now and then, we keep on getting new viruses launched in the market. This, in turn, requires a basic anti-virus software being installed on your PCs.If you are a start-up or a small scale technology firm, it is difficult to invest in a good and costly anti-virus software. Worry Not. We have some great anti-virus software available in the market for free or we can say at a very less price. These products are free only for non-commercial use; if ... Read More

‘Ransomware Locky’ a new threat decoded and How to Protect Yourself

karthikeya Boyini
Updated on 23-Jan-2020 09:50:58

152 Views

A Government Organization CERT (Computer Emergency Response Team) has issued a high priority alert that a new ransomware Locky has spread like ransomware WannaCry which has compromised a huge number of the computer system in the India, which has also affected ATM network and Government offices computers too.The CERT issued a severe threat alert on Saturday and also advised to the users not to open any unknown emails from an unknown sender as it is estimated that an approx. of 23 million emails, messages are sent in the phishing campaign.The studies estimate more than 100 countries in the world have ... Read More

Ransomware Attack – The Modern Ways of Cyber Extortion

karthikeya Boyini
Updated on 23-Jan-2020 09:49:04

165 Views

The recent ransomware attack has changed the definition of centuries-old style of demanding ransom. Typically what we know earlier that, the bad guys kidnapped a person or an item and held captive to extort money or property to secure their release. That is the typical way of demanding ransom which we sometimes found in our national and international newspapers as well as in many Hollywood and Bollywood movies where similar stories are kept on playing.But, most of us may not ever thought of those files and folders on your desktops, laptops, and smartphones which can be locked and hold for ... Read More

How To Configure and Set Up a Firewall on Ubuntu 16.04

Sharon Christine
Updated on 23-Jan-2020 07:47:45

2K+ Views

In this article we will learn about – how to configure and setup UFW ( Firewall) on Ubuntu 16.04, UFW stands for Uncomplicated Firewall which acts as an interface to IPTABLES that simplifies the process of the configuration of firewalls it will be a very hard for a beginners to learns and configure the firewall rules where we will secure the network from unknown users are machines. UFW works on the policies we configure as rules.Pre-requisitesFor this, we needed a non-root user with root permission on the machine.Installing the UFW (Firewall)UFW is installed by default with Ubuntu, if not installed ... Read More

Learn How to Manage System Firewall using Iptables in Linux

karthikeya Boyini
Updated on 23-Jan-2020 05:50:52

387 Views

Iptables and ip6tables are used to established, maintain, and check up on the tables of IPv4 and IPv6 packet filter ideas in the Linux kernel. Several distinct tables may be defined. Each table contains a quantity of constructed-in chains and may also contain person-outlined chains. Let us explore about how to manage a system firewall using Iptables in Linux.Installing IP tablesTo install IP tables, use the following command –$sudo apt-get install iptablesThe sample output should be like this –Reading package lists... Done Building dependency tree Reading state information... Done The following packages were automatically installed and are no longer required: ... Read More

How to Avoid Spyware during Online Browsing?

Sharon Christine
Updated on 21-Jan-2020 07:50:18

139 Views

Spyware is an unwanted program that gets installed in user’s system without his/her permission and tracks all the activities like important log-in information, valuable data, internet interactions etc. In addition to that, it hampers the performance of systems and even redirects web browser searches.Its rank on vulnerability is high because detection is very difficult. Before some spyware will be installed on your system, you have to open or click on some programs. The usual sources of these are spam folders of your mail, free downloaded software, misleading pop-ups and corrupt websites. Unless you are not sharp enough to judge these ... Read More

How to Avoid online Scams on Facebook?

karthikeya Boyini
Updated on 05-May-2022 07:14:47

207 Views

With seven hundred million plus users all over the globe, Facebook is a perfect podium for scam artists. For a scammer, it requires little research on your interest, one simple friend request and once you add them in your friend list, the further process of phishing and scamming runs smoothly.This mega program runs through ‘Social Engineering’, which means understanding common user habit along with behavior and make best use of those to design eye-catching headlines. A simple click on them can redirect you safely to unsafe scam page. There you might be asked to input your login details and personal ... Read More

How does WhatsApp “End-End Encryption” Feature Keeps data Safe?

karthikeya Boyini
Updated on 21-Jan-2020 06:46:27

736 Views

WhatsApp has emerged as a popular smart app and is even more admired due to its secured chatting feature. With different versions, it offers users an additional security level each time, thus ensuring the safe messaging experience, but the updated version of WhatsApp post 31st march 2016 brought a revolutionary change by introducing a strong security feature for its users known as “end-to-end encryption”, designed on Open Whisper System. This has added another layer of safety to its application and has made more well-liked.What is End-to-end Encryption?End to end encryption means no one except you and the recipient can see ... Read More

How To Set-Up Apache to use Password Authentication on Ubuntu 16.04

karthikeya Boyini
Updated on 20-Jan-2020 11:04:18

539 Views

In this article, we will learn about how to setup and configure the Apache Web server to restrict from visitors without authentication where we can hide some important and critical information to the un-authenticated users.PrerequisitesWe needed an Ubuntu machine with a non-root user with Sudo privileges.An Apache2 web server installed on the machine.Installing the Apache UtilitiesWe needed to install an Apache2 utility package called ‘htpasswd’ where this utility is a part of ‘apache2-utils’ packages.This will help us to create and manage the username and password which is needed to access the restricted part of the website.Below is the command to ... Read More

Gmail Productivity Tips

karthikeya Boyini
Updated on 20-Jan-2020 10:04:56

232 Views

In this super busy world of professional environment, it makes it challenging for each one of us to organize and use our emails effectively and efficiently. Whether it’s customizing, sorting, searching, automating your emails, Gmail offers dozens of ways to managing your inbox easily. Gmail is simple enough to use and to make you become a Gmail power user. We bring you some tips which will help you get to the next level of productivity.Labeling your EmailsLabeling your emails makes it easy and effective in organizing your inbox. Emails can be automatically given a label and you can also create ... Read More

Advertisements