Skip to main content

Posts

Showing posts with the label Secure

Connect To JioFi Device Without Knowing The Passwords Using WPS

If someone in your home or your friends are using Jiofi device and he/she is not sharing the password with you then i am going to share you a simple trick, so you can easily connect to the jiofi router without the need of password and start using the unlimited internet. This trick can be achieved using the WPS technology (Wi-Fi Protected Setup; originally, Wi-Fi Simple Config) is a network security standard to create a secure wireless home network. Follow the steps to get the internet for free using the "WPS Push Button Method" Go to your Wifi Settings in your smartphone device like Android  Turn on your Wifi  Click the option button and select the  "WPS push button" and you will be seeing the popup window like this below picture. Now take your JioFi Device and in the right side, you will seeing the WPS button  Hold the WPS button for few moments and see the Jiofi display, so the wifi icon will blink. After few seconds, your smartphone device would hav...

Ubuntu Vs Windows Vs Mac : Which Is More Secure

Which operating system is best in security , whether it is an Ubuntu 12.04 or Windows 8 or Mac OS X for the following categories, VPN (Virtual Private Network) Disk Encryption Authentication  Platform Integrity Application white listing Secure Boot Application Sand boxing Malicious Code Detection Prevention Security Policy Enforcement Device Update Policy Event Collection for Enterprise Analysis External Interface Protection Incident Response The Communication-Electronics Security Group (CESG) is the UK National Technical Authority for information assurance and they've done a series of test to find out the best operating system in security matter and they have found the best operating system that passed out most of the test is Ubuntu 12.04 when compare to Windows 8 and Mac OS X. Ubuntu is free open source software operating system that is available for desktop, servers and mobiles. Ubuntu supported by Canonical.

Google Security Alerts for Password Change

Receive SMS and Email whenever your google account password is changed. So far we were receiving email alert for password change but now Google introduced a new way to protect account from hackers. Google stores your ip address and user agent whenever you makes a login and also google has algorithm that checks the login access with a certain area or city or state or county but at the same time if you makes login from different country or state or city or area then google and other websites started asking some more information like choosing right friends from your contacts and etc., to verify that the original user is you or not but this time google will send your notification to your mobile as sms and email notification to your personal email id so your account will be safe. How to activate notification for your Google account Login to your Google and go to your account security page Go to Notifications Select the check box of Email and phone for Password Change and Suspicio...

Public Wi-Fi Hotspots – Are They Really Secure?

Public Wi-Fi hotspots are very common these days. They allow you to freely access the Internet while on the move. This is very advantageous and convenient but is it secure? Is it possible for a hacker to compromise your sensitive information when you access the Internet using public Wi-Fi hotspots? Wi-Fi hotspots are not safe and have security risks. However, it is very easy to protect yourself. All you how to do is take a few security measures and your data will remain safe. The main problem with public Wi-Fi hotspots is that you do not have control over it. On the other hand, you have complete control over your Internet connection at home. It may be possible for a hacker to create a public Wi-Fi hotspot within name sounding similar to a genuine one. When you connect to the Internet using such a compromised Wi-Fi connection, there is a possibility that your data may be intercepted. Just think of the consequences if someone succeeds in stealing your bank and credit card details. For ...

How to Track Your Google Account Login Activity

Always have a habit of tracking your Google account activity to protect your account or you can enable Google 2 step verification to protect your account. Recently one of our visitor asked me that "How to track his Google account activity " to check whether the account is safe or someone else is using it. Steps to track the Google account Login activity Login to www.gmail.com  and login with your Google account After successful login of Gmail  Go to bottom right corner and click on the details  New popup window will open there you can see the last 10 login activity and also you can see the concurrent session activity if you accessing account from other browser or mobile phone browser Signout all other session - if this button is enabled means you may be used your account but forget to signout it that's why the session is still in active. Learn how you can sign out google account remotely 

Hack Saved Password In Firefox

Learn How you can crack the saved password in Mozilla Firefox. Whenever you made a login in website, firefox asks you to save password but this is not good security one because its shows your password when you open the Security Option. To View the Saved Password Select Alt+ T -> Options. Select security tab and click the “Saved Passwords” button. Click on the “Show Passwords” button to see the stored or saved password.

Google Second Step Verification - Google Account Secure

Google 2 Step Verification allows you to make your account more secure and also it protects your account from hacker. When you enable this feature what will happen? After successful login of Google Account it will take to the second step verification where Google will send you a sms to your registered your mobile number or call or backup code verification. By default Google will send you a sms to your phone no which is 6 digit you need to be entered during second step verification. If your network provider is sending sms delay or any network response is too slow at that time you can click phone call so that instantly you will receive call from Google and you need to be hear carefully a 5 digit verification number and then enter it. suppose neither you are not receiving any call nor any sms then Google will provide a unique backup no for every second step verification use that one you will be getting your second step verification registration. How Do I Enable This Feature ...

How to uninstall VMS Anti Theft in Nokia and Symbian S60

VMS Anti Theft is a great security application for symbian based mobile phones and also it help you to track your mobile phone when you lost it. This application has some startup police ringtone which rang when you change your sim card so it make irritation and many of them want to remove this application because of low performance ,keypad problems and etc., This application doesn't added in application manager to be manually remove it.Even if you are formatting your mobile to remove this apps then also this application is not uninstalling. Here is the procedure to uninstall VMS Anti Theft By Manually Download X-Plore apps from Lonely cat games and then Open it. Press "0"(Zero) to open the configuration then Check on the following System files/folders, System Application and Hidden files Click Menu > Tools > Processes Delete the following Process VMSStorage, VMS_CBS and VMS_demon_2nd Now, Go to C: Drive and Open the System folder Click "Apps" (i.e., Appli...

Make Your Internet Banking More Secure

Internet Banking is playing a vital role in our daily life.Technology delivers internet banking secure and fast shopping but the fact is only secure on server and network communication not in client side.See how client side is not secure in this article i am going to explain you how to make your internet banking more secure.   Key-Logger is a software which monitor your keyboard activities and store all keys which you strokes from your keyboard. So whenever you make internet banking either from home or browsing center(Cybercafe) then dont use your computer keyboard its better that you can user on-screen keyboard. In all Operating system there On-Screen Keyboard (OSK) is available in accessories for example in windows XP you can found Start -Programs - Accessories- System Tools - On-Screen Keyboard. Use this "OSK" when you enter your user name,passwords,credit card information and etcetera where ever you need it you can use for More Security.

How to Send Secured Data in Internet - Steganography

Image Description: Hackers Growth of Science and Technology finds innovative ways to find patches over attacks made by hacker.In the Internet there are millions of computer are interconnected by network.If some people want to share some personal things like bank accounts or premium login accounts through email or any other share media but hacker who is surfing anonymously in the Internet find the personal documents and trying to modify the original message as well utilizing the original message so that the receiver who receive fake message from hacker thought that the message sended by sender.. In order to confuse hackers technology made another innovation in new technique called "Steganography" What is Steganography? Steganography is new technology innovation which hides text messages in image,audio,text and video files To Make your data very securely just what you need to do is find the best steganography software from Internet and download it and then encrypt your me...

Best Antivirus Software For Free Download

Best Antivirus Software For Free This Free Antivirus Software only for Home Computer not for Enterprises.Some Anti-virus Software company providing free software only for limited period of time and Some other providing software only for scan Memory Disk Drives not for internet Sending and receiving files but this Anti-virus providing free of cost as well as it detects virus from your computer Memory Disk Drives and Internet Sending and receiving file as well as it provide one year licence for individual for those who registered during download of home edition if somebody skip the registration step then it will work for 60 days after that also you can go to http://www.avast.com and there register with valid email because the organization will send you mail with licence key that key you validate it with your Anti-virus software and enjoy 1 year free Licence Anti-virus Software. To Download this Antivirus Software please Click here To use this Software for one year please Register ...

Which e-mail Server is More Secure

Which Mail Server is More-Secure People thinking that all mail server is secure but there is only one mail server is more secure than any other mail server . Mail Servers specially designed for sharing the contents between the end user with more secure connectivities but these all mail server is secured with SSL(Secure Socket Layer)and it provides encryption at a sender and decryption in destination so that Mail Server is more secured but transport of data's between communication is not so secure in SSL. In Google Mail the server is secured with SSL(Secure Socket Layer) and TSL(Transport Secure Layer) to provides more secure server than any other server and it takes the responsibility to protect data's over network such as internet. Subscribe to TECHNOLOGY INNOVATION by Email to receive more updates!