Computer Security Threats--Backdoor Trojan

A backdoor Trojan(security threat) allows someone to take control of another user’s computer via the internet without their permission. A backdoor Trojan(security threat) may pose as legitimate software, just as other Trojan horse programs do, so that users run it. Alternatively – as is now increasingly common – users may allow Trojans onto their computer by following a link in spam mail. Once the Trojan is run, it adds itself to the computer’s startup...

Computer Security Threats

We are living in a digital world, were computers are not just an ordinary thing anymore but a “necessity” to our everyday lives. Most of us only knew a little about computer security threats, the most common were “virus” and “worm”. But did you know that there are 34 different types of Computer Security Threats? A lot huh? You’ll know more about them below, so keep reading and i hope that you’ll be more cautious and knowledgeable in using your computer. ...

Types of Computer Viruses

Computer Virus is a kind of malicious software written intentionally to enter a computer without the user’s permission or knowledge, with an ability to replicate itself, thus continuing to spread. Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system. A virus should never be assumed harmless and left on a system. Most common types of viruses are mentioned below: Resident Viruses This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and...

Best Antivirus Software----KBSMP CHOICE

3>>>>> Norton Antivirus 2009 Main Features: Advanced antivirus with anti-spyware Best proactive protection Rapid pulse updates every 5 to 15 minutes Rootkit detection, two way firewall Defends against Web-based attacks Automatic Virus Pattern Updates...

Hardware Security

v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} w\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} Normal 0 false false false false EN-US X-NONE X-NONE ...

uAndroid's Security Framework

                            uAndroid's Security FrameworkThe Google Android mobile phone platform is one of the most anticipated smartphone operating systems. Android defines a new component-based framework for developing mobile applications, where each application is comprised of different numbers and types of components. Activity components form the basis of the user interface;...

How to secure network

                      NETWORK SECURITY 1. Perform regular network security testing. 2. Don’t provide more or unwanted access to any network user. 3. Must have an updated antivirus program. 4. Operating system should be regularly updated. If you have windows based operating system you can update it from the Microsoft website. 5. Keep inventory...

Computer And Internet

Have you seen any coin without head or without tell----NO.Same situation in computer and internet.In 1940 computer came in picture and In 1969 internet came into picture and after this both them became most important part society.      NOW The question come how computer and internet are related,how they work.before describing  these two i want to define some terminology related computer and internet What is internet-----The...

CBI website hacked by 'Pakistani Cyber Army'

In a major embarrassment, the website of premier investigating agency CBI was hacked on Friday night by programmers identifying themselves as "Pakistani Cyber Army".    Intelligence agencies have been often warning the government that proper cyber security was not being ensured in government offices and that no security audit was being carried out. The Pakistani Cyber Army has also warned that it would carry out "mass defacement" of other...

Internet Security

                        Tips for browsing internet safely The concern for internet safety is a global phenomenon, mostly for those who are new-fangled to internet. While the prevalence of social networking websites, online communities and internet-enabled processes should be great news for individual, corporate and government users, the concern for safety remains a major source of concern. The 21st century is the age of computers and...

LATEST VIRUS NAME..

    1.     Virus Name:     Virus:W32/Sality    A malicious program that secretly integrates itself into program or datafiles.It spreads by integrating itself into more files each time the host program is run.                    2.     Virus Name:           Trojan-Downloader:W32/Hiloti                    This...

Email Security...some Basic point

In today’s electronic world, email is critical to any business being competitive. In most cases it now forms the backbone of most organisations’ day-to-day activities, and its use will continue to grow. According to the The Radicati Group’s study, “Microsoft Exchange and Outlook Analysis, 2005-2009,” the worldwide email market will grow from 1.2 billion mailboxes in 2005 to 1.8 billion mailboxes in 2009.[sintuhack] As email becomes more prevalent in the market, the importance of email security becomes more significant. In particular, the security...

Secure Sockets Layer(SSL) versus Transport Layer Security(TLS)

               SSL AND TLS -What’s the difference and which one is more secure... BEFORE WE DECIDE WHICH ONE IS MORE SECURE ,WE MUST KNOW WHAT IS THESE?---Simply these are protocols that provide data encryption and authentication between applications in scenarios where that data is being sent across an insecure network, such as checking your email.[sintuhack] Now which one is more secure?[sintuhack] While SSL and TLS differ in ways that make them inoperable with each other, they...

Internet Surfing Security

 we people cant leave without internet,our life is completely depend on GOOGLE.This is not bad thing,but we must know some important security tips.how to keep save your data,as well as PC.Yesterday my friends PC is hacked during net surfing,and he lost all data.I am adding some security solution hope you people will adopt it  during net surfing and during downloading.                            Internet...

Shopping Safely Online

Why do online shoppers have to take special precautions?The Internet offers a convenience that is not available from any other shopping outlet. From the comfort of your home, you can search for items from countless vendors, compare prices with a few simple mouse clicks, and make purchases without waiting in line. However, the Internet is also convenient for attackers, giving them multiple ways to access the personal and financial information of unsuspecting shoppers. Attackers who are able to obtain this information may use it for their own financial...

Understanding Your Computer: Web Browsers

How do web browsers work?A web browser is an application that finds and displays web pages. It coordinates communication between your computer and the web server where a particular website "lives." When you open your browser and type in a web address (URL) for a website, the browser submits a request to the server, or servers, that provide the content for that page. The browser then processes the code from the server (written in a language such as HTML, JavaScript, or XML) and loads any other elements (such as Flash, Java, or ActiveX) that are...

What risks are associated with free email services?

Although free email services have many benefits, you should not use them to send sensitive information. Because you are not paying for the account, the organization may not have a strong commitment to protecting you from various threats or to offering you the best service. Some of the elements you risk are     * security - If your login, password, or messages are sent in plain text, they may easily be intercepted. If a service provider offers SSL encryption, you should use it. You can find out whether this is available by looking...

Understanding Hidden Threats: Rootkits and Botnets

What are rootkits and botnets? A rootkit is a piece of software that can be installed and hidden on your computer without your knowledge. It may be included in a larger software package or installed by an attacker who has been able to take advantage of a vulnerability on your computer or has convinced you to download it . Rootkits are not necessarily malicious, but they may hide malicious activities. Attackers may be able to access information, monitor your actions, modify programs, or perform other functions on your computer without being detected. Botnet...

Cyber Security Tip ST05-006

How do you know your computer is infected? Unfortunately, there is no particular way to identify that your computer has been infected with malicious code. Some infections may completely destroy files and shut down your computer, while others may only subtly affect your computer's normal operations. Be aware of any unusual or unexpected behaviors. If you are running anti-virus software, it may alert you that it has found malicious code on your computer. The anti-virus software may be able to clean the malicious code automatically, but if it can't,...

China Set to Fight Against Cybercrime by Issuing New Laws Against Hackers

ccording to Gu Jian, Deputy Director of the Network Security Protection Bureau of the Ministry of Public Security (MPS), China is all set to fight against the hacking attacks as the government is drafting law governing the punishment of hackers and other cyber offences, as reported by ShanghaiDaily on November 11, 2010. He further highlighted that presently, lawmakers are working on the judicial interpretations of the new law, which will be released by the end of 2010. Gu stated that nearly 80% of the machines in China are facing the problem...

Cyber Laws in India

                         Cyber Laws in India In May 2000, both the houses of the Indian Parliament passed the information bill. The Bill received the assent of the President in August 2000 and came to be known as the Information Technology Act, 2000. Cyber laws are contained in the IT Act, 2000. This Act aims to provide...

Cyber Law Cases in India and World

MYSPACE CATCHES A MURDERER MySpace has played an important role in helping Oakland police apprehend a 19-year old man accused of shooting a San Leandro High School football player Greg "Doody" Ballard, Jr. Oakland police had a street name of a suspect and were able to identify Dwayne Stancill, 19 of Oakland from a picture they found on a gang's MySpace page. Police brought the suspect to their headquarters where detectives say he confessed. What was most troubling to investigators was the lack of motive for the killing. OFFICIAL WEBSITE OF MAHARASTRA...