Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide
Windows user passwords can easily be compromised by any geek who has physical access to the PC. There are lot of tools to crack, reset, disable windows accounts and password such as Hiren’s Boot CD, OphCrack, Active@ Password Changer and more… To enhance login security, Windows has a hidden security feature called syskey [...]
Many people care about their important data after they vanished or destroyed in some cases. Backing up data is one of the method to keep it secure. While having a backup storage it’s difficult to check and transfer only the files we’ve changed. There are many tools for automatically sync the changed files and keep local and [...]
Most people keep in mind that people called hackers are criminals who destroy or gain unauthorized access to Network systems, Stealing government’s confidential information and so on. Yes it is, but those people are one kind of hackers. So in this article let’s see who really are the hackers. In hacking world people called [...]
With increasing anti-virus security in place against email-aware viruses and malware, hackers are turning their attention to less well-defended routes such as USB drives. This is the latest method that’s used by hackers to torment innocent users. However, there are ways you can protect your computer from USB and Pen drive viruses.
Tor is a free software which will let you surf the Internet anonymously while protecting your privacies. In this guide I’ll be explain on how to install and configure Tor in Ubuntu to use easily with GUI. Tor is also available for other OS platforms (cross platforms). Step 1 Go to Ubuntu Software Center and Search for [...]
If you want to reach your friend through the phone call you’ll need his/her phone number. Likewise in IP Network environment to reach a host or a server you need an address called IP Address Eg- 192.168.1.10. And the network services requesting on that host or server is separated by protocols which also have numbers assigned known [...]