Why is the computer security important?

Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your computer system. Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done. We use computers for everything from banking and investing to shopping and communicating with others through email or chat programs. Although you may not consider your communications...

What is method required for internet security

 1. Use a firewall We strongly recommend the use of some type of firewall product for Internet security, such as a network appliance or a personal firewall software package. Intruders are constantly scanning home user systems for known vulnerabilities. Network firewalls (whether software or hardware-based) can provide some degree of protection against these attacks. 2. Don't open unknown email attachments Before opening any email attachments, be sure you know the source of the attachment. It is not enough that the mail originated from an...

Home Computer is most wanted target of hacker's

The Your home computer is a popular target for intruders. Why? Because intruders want what you've stored there. They look for credit card numbers, bank account information, and anything else they can find. By stealing that information, intruders can use your money to buy themselves goods and services. But it's not just money-related information they're after. Intruders also want your computer's resources, meaning your hard disk space, your fast processor, and your Internet connection. They use these resources to attack other computers on the Internet....

HOW YOU CAN IMPROVE A SECURITY OF INTERNET EXPLORER

There is no question that Internet Explorer is the most popular web browser in the world, but with great popularity comes great responsibility. Since one program is used by approximately 75 percent of the world to browse the web, you are forced to deal with the majority of the world’s hackers who are all trying to break down your defenses. Luckily, there are certain things you can do to improve the security of Internet Explorer so you don’t fall victim to the same problems that have already infected millions of computers already.These days, most...

Be careful when reading email with attachments

We’ve all heard stories about people receiving an item in the mail that in some way caused them harm. We’ve heard of letter bombs and exploding packages, and in 2001, we learned about Anthrax-laden letters. Although their frequency is low, they do make news.These unsolicited items are sent to unsuspecting recipients. They may contain a return address, a provocative envelope, or something else that encourages its receiver to open it.You probably receive lots of mail each day, much of it unsolicited and containing unfamiliar but plausible return...

The keys for firewall protection

Firewall protection primarily uses packet filtering to detect and block intruders. Some also include application filtering. In addition, these applications typically generate alerts and log intrusion attempts.Packet FilteringIn packet filtering, the firewall software inspects the header information (source and destination IP addresses and ports) in each incoming and, in some cases, outgoing, TCP/IP packet. Based on this information, the firewall blocks the packet or transmits it. The firewall uses the port information to block idle or nonstandard...

How To Trace an Email Address And Original Sender?

Hello Guys Nowadays spamming is the Most common .. Out of the 5 emails you receive 2 are spams... And Out of 5 spam Mails 1 contains Virus or Botnet.. Its hard to believe but its truth... So Today I am Going to share with you HOW TO TRACE THE EMAIL ADDRESS AND ORIGINAL SENDER?? .. So guys Read On.------1.TRACING AN EMAIL ADDRESS------The purpose of this guide is to show the process involved in tracing an email. The first step required to tracing an email is finding out the headers of the email. What are headers? Email headers are lines added at...

Top 3 Tips For Deploying NETWORK ACCESS CONTROL

A few things you'll need to know before you get started.1. Explore requirementsShould you really be buying NAC? Jeff Falcon, senior security specialist with solution provider CDW, said customers often lack a clear understanding “as to why they may need, or not need, a NAC solution.” He recommends identifying high-risk and high-value data that needs protection as an initial step. Next, customers may look at network traffic in monitor mode to analyze threats, he added.2. Pursue policyBefore implementation, organizations would be well advised to focus...

The 25 Most Common Mistakes in Email Security

25 tips to bring newbie Internet users up to speed so they stop comprimising your network security.I still remember receiving my first phishing email in my AOL account. I had won the AOL lottery! As good as it sounded, I was skeptical at best. So without much thought, I opened the email and clicked on the link inside to check if I truly was a millionaire after all. Almost instantly, my computer crashed, and with each subsequent restart would crash again.Countless computer crashes and thousands of spam emails later, I had learned the lesson that...

What is spyware?

What is spyware?Spyware is a general term used for software that traces user activity on the PC and collects personal info or confidential data without user consent. Spyware can register the websites you visit, the time of visits, all clicks on the keyboard (this is how credit card numbers and pin-codes are often stolen) or monitor and register secretly for software that is in turn installed on a PC.The most dangerous spyware one which self replicates via e-mail, and installs itself without your consent using software bugs. Software intercepting...

How do I protect my PC from spyware?

Most spyware programs are integrated into freeware that you have to install on your computer, but some are automatically downloaded when you enter a Web site. If a message pops-up on your screen proposing you install a program providing access to Web site content, don't hurry to press “OK” without checking the software. If there is no need to install some special software to view the Web site, it’s better to refuse downloading extra software.On some Web sites you can find lists of programs containing harmful spy modules. Looking through these lists...

How do I protect my PC from spyware?

A firewall is considered to be the most popular tool to protect a computer from spyware. Firewalls are integrated into operating systems (OS) and permanently examine incoming and outgoing addresses to computer network ports. They analyze data packages coming to Internet ports and mail ports according to the type of request and the addressee. Most firewalls allow or deny some types of addresses, but this is a weak point because spyware may be integrated inside many packages or disguised as a Web browser. This type of spyware cannot be detected by...

World of Warcraft Attacked by Phishers

World of Warcraft players desperate for a new mount to traverse the online role-playing game's fantasy world are getting a reality check from hackers who have devised a clever pop-up phishing scam to spread malware.Security technicians at F-Secure Security Lab on Tuesday posted a blog entry Tuesday detailing the latest scam making its way through the world's most popular massively multiplayer online role-playing game (MMORPG).With more than 11.5 million monthly subscribers, Blizzard Entertainment's World of Warcraft is not only the most successful...

Security Report: Firefox Most Vulnerable

Application security vendor Cenzic today released its security trends report for the first half of 2009 application. In it, Cenzic claims that the Mozilla's Firefox browser led the field of Web browsers in terms of total vulnerabilities.According to Cenzic, Firefox accounted for 44 percent of all browser vulnerabilities reported in the first half of 2009. In contrast, Apple's Safari had 35 percent of all reported browser vulnerability, Microsoft's Internet Explorer was third at 15 percent and Opera had just six percent share.The 2009 figures stand...

Sensible Password Policy: Longer is Better

The SANS Institute recommends passwords should be at least 15 characters long, which effectively means that these password can't be carried around in end users' heads. Let's take a look at how secure a password this long would be.If we take a scenario in which user passwords are made up of upper and lower case letters and numbers, each password character can be one of 62 possible characters. A fifteen character password thus has 62^15, or more than 750 million, million, million, million possibilities. That's a lot. If you got a pool of a million...

14 More Open Source Tools to Protect Your Identity

AS IN PREVIOUS POST I DID EXPLAIN 14 OPEN TOOL FOR SECURE YOUR DATA,IN THIS POST I ADD SOME MORE TOOL AND EXPLAIN TO--SO READ AND APLY THEN GIVE COMENT...AS ADVICE....YOUR ADVICE WILL PROVIDE ME A WAY AND ENERGY TO COLLECT MORE INFORMATION ABOUT YOUR NEEDTo help you keep from making the same sort of mistake I did, we've compiled a list of 14 more open source apps that can help protect your identity. Some of these fit into traditional security categories, like anti-spam, anti-virus, and firewalls. Others, like browsers, e-mail, and PDF tools, we've...

14:-Open Source Tools to Protect Your Identity

Usually these lists of open source software start with statistics or general observations on current trends in the open source community. This one starts with a personal story.I used to use a thumb drive to backup my budget software, and I also kept a copy of our tax returns on the same drive. While the files were password protected, I didn't encrypt them because the drive never left the house, and we don't exactly live in a high crime area.Then one day my friend was looking for a drive to carry some files to the school where he teaches. As you...

How to Be Safer on Twitter

“Twitter is insecure. Twitter is the root of all evil.”Right. Much has indeed been written about Twitter’s security – or lack thereof– in just the past couple of months. In taking in what others have to say, though, I can’t help but think it’s being unfairly attacked.Let’s take a fair and objective view of some of the issues, and see what, if anything, a user can do to reduce her risk.Twitter, the wildly popular micro-blogging web site, has roared onto the scene in an amazingly short time, even by Internet standards. Twitter users can post short...

How to Keep Cloud Computing Secure

How to Keep Cloud Computing SecureWorking off an external network in the cloud brings the benefits of offsite storage backup, but also comes with some dangers: Viruses, spam, malware and identity theft are among the threats you may face.Along with the dangers of sharing your data externally with outside parties comes some security benefits as well, according to Eran Feigenbaum, director of security for Google Apps. Although companies now allow cloud vendors access to their data, "just sharing a document and not an entire infrastructure is a tremendous...

Devious Trojan Attacks Online Banks

A new Trojan called "W32.Silon" is the latest headache for online banks and their customers, packing a one-two punch that helps it evade security tokens and steal customer log-in information at the same time.The two-headed Trojan, according to online security software vendor Trusteer, uses a "two-pronged payload" to steal log-in information and commit financial fraud at popular online banks."This new Trojan illustrates how advanced malware writers have become in their ability to dynamically execute multiple, bank-specific attacks with a single...

How hackers find your weak spots

A look at some of the ways hackers use social networking tools to gain access to victims' systems While there are an infinite number of social engineering exploits, typical ones include the following:Stealing passwords: In this common maneuver, the hacker uses information from a social networking profile to guess a victim's password reminder question. This technique was used to hack Twitter and break into Sarah Palin's e-mail.Friending: In this scenario, a hacker gains the trust of an individual or group and then gets them to...