Featured Content

Quick Navigation

About All Tech Buzz

Showing posts with label Tips. Show all posts
Showing posts with label Tips. Show all posts

Tuesday 27 May 2014

couch mode print story

Fraudsters Shall Not Pass - Simple Advices On How To Avoid Scammers In Social Networks:

Advices On Avoiding Scammers In Social Networks:
-----------------------------------
Social networks are always great for communicative people; they make you closer to your friends, relatives and hackers. Social networks are very attractive for such kind of people. You can ask me: “Why do they need that?” All they need is your account. The fraud schemes may be different. But the main aim of them is money. They can ask your relatives for help, especially when you’re far away. Why shouldn’t they believe their own child, when he needs money?

Fraudsters do not disdain playing on the heartstrings. They can write everything, that there’s an accident, you’re in a hospital, etc. So today we’ll study to confront fraudsters and keep our nerves and money safe.


Consequences:
------------------
The most people don’t think about possible risks when creating their profile on social networks. The more personal and professional information you give, the easier it is for fraudsters to rob you. Let us discuss the easiest scheme. Some criminals are simply searching for people living in the same city to plunder their houses. Why does it happen? Different people are writing perfect information, like “We’re going to visit California next weekends. Hoping it’ll be great” Of course it will be great. For the robber, because now he knows that the house will be empty during weekends and it’s the perfect opportunity for him.

The second thing is the photos. When you’re downloading images and photos on social networks not only your friends like them. It’s also the perfect resource for burglars. From home-made photos, they can receive information about your welfare and house structure. When you have a dog, the robber will be prepared, because everyone has photos with their home pets. That’s why we earnestly advise you not to put in the Internet photos of your house, and some things that can attract robbers, for instance your new car or a brilliant ring.


Advice:
---------
The next our advice – create a complicated password. We’ve just discussed what fraudsters can do with the access to your account, so try to protect yourself, your friends, and relatives as good as you can. Don’t make a password consisting of just your birth date. Remember, that it’s the first combination fraudsters try. Also, don’t put your birth date as the answer to the test question if it’s mail. Check out below article on password cracking.

Let us imagine that you have a complicated password, you don’t download the “rob-attractive” photos and one day you receive the link from your friend where he asks you to vote for him. Stop now. This can be a trap. If you’ll link, the fraudsters receive your personal data, such as login and password. Such scheme is called “fishing”. So, in this case, ask your friend something personal. The other variant is just to make him a call and ask about this. If you’ll receive the answer like “What are you talking about?” you should explain him that he was hacked and offer to change the password. Check out below tutorial to know about popular hacking method used to acquire sensitive information about oneself.

Phones are really helpful things. Explain to your friends and relatives that you can be hacked and if they receive messages with money requests, they must call you at first and ask about that. Remember that your security is in your hands and be careful.

Saturday 10 May 2014

couch mode print story

Top 10 Useful Add-Ons & Extensions for your Google Chrome 2014

Chrome-logo-2011-03-16

Everyone knows Google. Almost Everyone uses Google Chrome, but did you know that are lots of extensions and add-ons, & Pugins out there that could enhance your user experience? Well, here’s a list of Top 10 Useful Google Chrome Add-ons, Plugins for your enjoyment!


Before I you head straight into the extensions, here are some things you should do prior to installing extensions:
  •  DO download your extensions from the Google PlayStore

  •  DO check the permissions they request from your account. Be aware that there are 3rd party add-ons out there that breach your browser’s security. Most extensions require your approval prior to installation, so do check for anything suspicious before installation.
  • DO read any terms and conditions it may have as they may differ from other extensions.

Now, before you get all scared, these are necessary precautions for ANY extensions for ANY browser. It’s just a quick reminder. :D
Here is a list of top 10 Google Chrome Plugins and Addons that help in various aspects.

1. Google Chrome Backup

This particular plugin helps you to create profile, wherein you can store your favorite bookmarks, web browser history and much more. You can restore, backup, delete or create shortcut to your Google Chrome profiles.
_______________________________________________________________

2. Last Pass

This particular addon helps you to manage all your passwords in Google Chrome browser. It also helps you to fill up forms online.
_______________________________________________________________

3. Goo.gl URL Shortener

This plugin assists you in shortening any website URL with the URL shortening service of Google – Goo.gl. Once the URL is compressed, it is then copied to the clipboard automatically. Therefore, you can distribute and communicate the shortened URL to your friends in Facebook, Twitter, Digg, Blogger, MySpace, Delicious, Gmail and Google Reader easily.
_______________________________________________________________

4. Offline Gmail

This particular addon helps you to access your Google Mail account during situations wherein there is no internet connection available at your end. You can read emails that had been downloaded already and also compose new emails in the interface of the browser. Whenever you go online, you can send them and receive new ones automatically.
_______________________________________________________________

5. AdBlock

This plugin helps to hide advertisements that are present on the webpage that you visit. It is actually a javascript that delineates the CSS rules according to the website you are viewing to put out of sight page elements that tend to illustrate the advertisements.
_______________________________________________________________

6. Portable Chrome

The name itself suggests the use of this plugin. You have to unzip the small file to your USB Flash drive and then run ChromeLoader.exe. Your profile details and Chrome settings will be save in your thumb drive.
_______________________________________________________________

7. XChrome

This plugin works as a theme manager for Chrome. It allows you to install any Google Chrome skin within seconds. It also permits you to know various details about the skin before you install it.
_______________________________________________________________

8. Google Dictionary

With the help of this addon you can learn the definition of a phrase or word. You have to just double click on a particular phrase or word to know its definition.

_______________________________________________________________



9. Google Talk

This plugin permits you to stay connected with your family and friends in GTalk without having to login separately into your Gmail account. It actually adds a GTalk icon to the launcher which pops up whenever you open it.

_______________________________________________________________



10. Session Saver

This handy plugin helps you to manage, save and reload several web sessions in Google Chrome.
_________________________________________________________
Like Us On Facebook : The Cyber Freaks

_______________________________________________________________


Thursday 8 May 2014

couch mode print story

Some Security Tips By World's Most Wanted Hacker Kevin Mitnick | Cyber News

Kevin Mitnick came by his security expertise the hard way. In the 1990s, his electronic penetration of some of the biggest companies in the world made him a notorious tech boogieman, and ultimately landed him five years in prison.

Now free and clear, Mitnick has reinvented himself as a computer security consultant and writer. He travels the world teaching organizations how to secure their information in a world of corporate spies and younger versions of himself. He took a break from his jet-setting to share some practical security tips. Clip them and stick them on your parents' refrigerator or your IT administrator's white board.

Here is Top 10 list of steps you should take to protect your information and your computing resources from the bad boys and girls of cyberspace:



  • Back up everything! You are not invulnerable. Catastrophic data loss can happen to you -- one worm or Trojan is all it takes.    
  • Choose passwords that are reasonably hard to guess -- don't just append a few numbers to a no-brainer. Always change default passwords.
  • Use an antivirus product like AVG or Norton, and set it to update daily.
  • Update your OS religiously and be vigilant in applying all security patches released by the software manufacturer.
  • Avoid hacker-bait apps like Internet Explorer and disable automatic scripting on your e-mail client.
  • Use encryption software like PGP (pretty good privacy) when sending sensitive e-mail. You can also use it to protect your entire hard drive.
  •  Install a spyware detection app -- or even several. Programs that can be set to run frequently, like SpyCop, are ideal.
  • Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.
  • Disable any system services you're not using, especially apps that could give others remote access to your computer (like Remote Desktop, RealVNC and NetBIOS).
  • Secure your wireless networks. At home, enable WPA (Wi-Fi protected access) with a password of at least 20 characters. Configure your laptop to connect in Infrastructure mode only, and don't add networks unless they use WPA.

Today, Mitnick has been able to move past his role as a black hat hacker and become a productive member of society. He served five years, about 8 months of it in solitary confinement, and is now a computer security consultant, author and speaker.

Friday 18 April 2014

couch mode print story

How to Use Smartphones as Keyboard and Remote.





How to Use Smartphones as Keyboard and Remote.

Android-Powered Smartphone Allow you Control your Mouse Cursor and Keyboard from a Distance. Smartphones are Fast Becoming a Necessity with Current Generations. You Use it to Maintain your Physical and Online Presence with it, So Long as there is a Secure Internet Connection and you have the Tight Application to get you Connected, Smartphones can be the Perfect Alternative to any Working Device out there Especially Since your Smartphone Follows you Everywhere you go.

GPad Cliant :-



gPad is a Wireless Touchpad, Configurable Remote and Keyboard for PC/Mac. Control your Computers via Wifi, Usb or Bluetooth (Bluetooth in Free Version is Beta and Temporar). Similar to Gmote, Remote Droid, XBMC, Unified Remote, You Can Configure and Share your Own Remote’s..!!


How To Use? :-

  • First of All, you Need to Download and Install gPad Client on your Android Smartphobne. Click Here For Download
  • Now Install gPad Server Client on Your PC and Laptop (Window/Mac).
  • When Installation is Done, That Time you Need to Pair Both your Smartphone to your PC or Laptop Through USB Cable, Bluetooth or WiFi Connection If you are Using WiFi Connection, Make Sure You Know your Computer’s IP Address (In Case the Connection Fails that Time u Need Your IP Address).
  • The Pairing Must be Done Before Proceeding with the Next Step.
  • Now Open gPad Software in Your PC or Mac
  • Now Open the gPad Application on your Phone, Select ‘Settings’ and then Select the ‘Connection Type’ and Select Between Bluetooth, WiFii and USB Connection.
  • Now Go Back to the “Settings” Page, Scroll Down to the Relevant Setting (Bluetooth, WiFi or USB) and Click “Scan”. Select your Computer as the Pairing Device.
  • Now Go Back to the gPad Main Menu on your Phone, Click open “TouchPad”, and Now u Done! You Should be Able to Remotely Control your Computer’s Cursor from your Smartphone.                                                     
Source : http://techreviewpoint.com/                                                                 

Categories

  • Internet Tricks
  • How To
  • Other Tricks
  • Android Apps
  • Blogging
  • Free Software
  • Android Tricks
  • Featured

Search This Blog