Wednesday, 8 May 2013

Different Types of Antivirus Software



If your computer runs normally, it is a sign that it is working properly. If however, your computer starts to function in a way that it is far from normal, consider that as a warning sign that your computer is about to suffer from a viral attack. Computer viruses and trojans can have a serious impact on your computer such as deleting your hard drive and even taking control of your computer. With sufficient and adequate antivirus protection, you can counter the effects of an unwanted attack.
There are good free antivirus programs, however the only drawback is that it consumes a huge amount of memory. If installed on a laptop, there is a chance that this program will cause the laptop to hang. A desktop computer carries more memory than a laptop, therefore it may withstand the free antivirus software's memory consumption. This is what happened in my case. As my commercial antivirus program expired, I was left with the dilemma of protecting my computer. As I searched for a good antivirus, I finally selected one which protects against most viruses and at the same time consumes the least amount of memory. Best of all, it's free.

Monday, 6 May 2013

An Overview of Norton Antivirus


Computers have become valuable to the lives of millions around the world. Every aspect of our daily routine is reliant to computer processes. Every sector of society is run by computer generated system.
Despite the many good benefits we derived from computers, there are people who are trying to destroy these productive processes by creating computer programs aimed at destroying the computer system. They create viruses that harm computers when victims accidentally open them.
The advances in computer operating systems are continuing. Experts are trying to improve further these computer systems for personal and commercial usage. There are also efforts to counter the worst of effects of computer viruses. One of the software to combat these viruses is the Norton AntiVirus or the NAV.
The NAV was developed by Symantec Corporation. It detects and removes viruses, spyware, adware, and other possible risks to computers.
The Norton AntiVirus is offered for sale as a product by itself. It means that it can be installed in computers as a program. This product is also sold as a component of other Norton software program. Norton Internet Security and Norton SystemWorks includes the antivirus program as one of their programs.

Computers Hacking - Information


PC hacking entails the exploitation or method of cracking network and human vulnerabilities to gain access to otherwise safety protected information and facts. These methods of gathering information and facts have already been around for a really long time and go effectively beyond just a machine. Infiltrating a target also includes utilizing phone systems, wireless networks, closed networks, or fundamentally anything which will shop info. Computers will be the most typical of targets for intrusion on today's planet due to the vast amounts of variables involved which can be taken advantage. Each and every machine has its personal uniqueness primarily based on the human user.
A hacker is really quite a broad based term to describe a person that might use a bunch of unique varieties of technological specialties. You can find several distinctions in the world of network safety that differentiate a script kiddie from a white hat. There have also been loads of media consideration paid to the subculture of hackers. Modern movies portray gothic or emo looking teenagers applying overly elaborate graphical interfaces to take down an entire country's infrastructure from a few easy keystrokes. While that is fine for making drama, it's not actually reflective of true life. Actual hackers tend to be effectively educated computer system specialists or hobbyists that conduct their activities utilizing many personal computer code tests. A hacker looks at the puzzle in front of them and thrives on getting the loophole within the code to resolve the problem from within. They're seeking that bit of data that nobody else has paid consideration to before.

Thursday, 2 May 2013

Tips: Save Your Wireless Network From Hackers

Creating a wireless network at your house is an excellent idea, it's really easy to do plus it enables you to surf the net conveniently from anywhere at your house.The problem is that lots of people are unaware of the danger that's added when using the home Wireless in an insecure manner.

If you want to protect your WiFi in order to prevent your neighbors from using up your bandwidth, then sure that's a sound cause to protect your WiFi, however it mustn't be your primary worry. The greatest problem with insecure WiFis happens when a hacker is able to connect to your WiFi, if he succeeds on doing that then he can easily read the information that's sent between you and the router and reveal your usernames, passwords or everything else that's sent between your devices, regardless of whether you are using SSL. This attack is known as "Man In The Middle" or MITM and it can easily be performed by even a rookie hacker rather quickly. Securing your Wireless will greatly lessen the chance of this occurring. Almost all hackers that try to get into WiFi's will quickly give up attempting to hack a secure wireless network as there are countless insecure networks out there which provide a considerably simpler target.

All of the approaches that are going to be explained here require that you log in to your access point's user interface and change a few of its options. If you don't know how to do that then go over to your access point manufacturer's web site and look for the guide for your particular model. Try to find information about how to gain access to that router's web interface.

1. Make use of a secure encryption
Using a secure encryption is an essential course of action, this makes certain that you can only connect by using a password. Choosing this options is generally done from the security tab in the Wireless setup menu. You may generally pick from three or four options: Disabled, WEP, WPA, WPA2. You'll want to choose WPA2 or WPA - and absolutely under no circumstances choose disabled or WEP! WEP encryption is an extremely broken encryption algorithm that can be broken in a few minutes by a completely inexperienced hacker. If your router only supports WEP encryption but not WPA then you should replace that router ASAP.

2. Utilize a strong encryption password
I'm certain you hear this phrase a lot "Use a strong password" and numerous people are thinking to themselves that on WiFis it's not too important, new flash - On WiFis it's extremely important to use strong passwords. Its a piece of cake for a hacker to use a program that scans the WiFi for millions of password combinations in mere minutes and crack it. Use at least eight to ten characters and a mixture of numbers, special symbols and letters. Avoid using dates, names or phones numbers - This is the very first thing hackers try.

3. Alter the SSID name
The SSID is the name of your wireless network, it's that name you choose from the list of nearby networks when you try to join. It's recommended that you alter that name and not use the default name. Modify it to a name that doesn't completely reveal who is the one who owns this wireless network, such as your surname - this is especially essential if you're living in a dense population area for instance an apartment building.

4. Restrict the Wifi's range
Restricting the transmit range will decrease the possibility of someone looking to hack your network. In many homes the Wireless may be detected from outside of it and there's generally no reason for this. Limit the transmission range, go outside your property and look to find out if it could be discovered from there. When possible you may relocate your router towards the center of the household to gain optimum coverage without creating blind spots caused by the restricted Wireless network range.

5. Alter the router's interface security password
The router's password is the password you need to type whenever logging in to the web interface. Technically if the hacker can connect to the access point's web interface then it's already too late and the hacker has gained access to the wireless network already, but nonetheless, this is a good precaution step to take and it will limit the control that the hacker has over your wireless network. Modify the password to a one that's difficult to guess and is different than the one used for the encryption.

Article Source: http://EzineArticles.com/7613065

Wednesday, 1 May 2013

Secure Passwords Tips and Tricks

I saw an amusing video from Ellen DeGeneres recently, and it started me thinking about the issue of password security. The video shows an infomercial for a really stupid solution, but there are several real steps we can all take to safeguard our passwords.

Use Different Passwords
The infomercial is based on the idea that we use different passwords everywhere. This is an important first step, since if a hacker gets access to one password it limits the damage that can cause. The problem with this, of course, is how to remember all those multiple passwords.
You can save the passwords in a text file or spreadsheet, or you can use a password manager. Be sure to protect your master list with a password that is easy for you to remember but difficult for anyone else to guess. If you accidentally (or deliberately) attach this master list to an email, nobody can read it without the master password.
I use a password manager (Roboform) for most of my passwords, but keep a spreadsheet for my websites, since for those I need to keep a lot more information than just the password.

Use Strong Passwords
It's amazing how many people choose "password", "123456", or their name as their password. A strong password comprises 6 or more characters and includes numbers and upper and lower case letters. If the application allows you to use special characters as well, by all means use them.
For example, if you use "password" (not recommended!), you can write it as "9@$$w0Rd". It looks close enough to the original word that you can remember it without too much effort, but is much harder for hackers and their programs to crack.
Better still, use a password generator, such as that included with your password manager. to generate really strong passwords.

Change Passwords Frequently
Yes, I know changing passwords is a pain, but it's a lot more of a pain if you get hacked! I make a point of changing the critical passwords, such as banks and credit cards, every month or two, but I must admit that I often forget. Some applications - banks, for example - require frequent changes: this is where a good password manager eases the chore.
If you choose to use Roboform, you will find the free version is only useful to see how it works: you will need to pay a small annual fee for real application. (By the way, I am not affiliated with Roboform in any way - it's just what I use.)

Article Source: http://EzineArticles.com/7660640