Protect your important data while using Wi-Fi hot spots in 6 easy ways

Protect your important data while using Wi-Fi hot spots in 6 easy ways

Author: Theodore Sumrall

Today internet is being widely used for number of purposes and at different places. Mostly all the activities related with computers need to have internet access. Internet facility is being provided on mobile phones or homes or some public places. Mobile phones and personal computers at home are quite safe but public Wi-Fi hot spots are dangerous and insecure. They are prone to viruses, hacks, data tempering and many more such risks. So we recommend you 6 ways in which you can use public hot spots without any risk.

Firstly, you should be very aware that the system you are using is not your personal one, so there must be many people, who accessed it before and after you. So always remember that it is not safe at all. There are number of security features that are inbuilt in Windows and Mac OS that provide you much security. So what you have to do is enabling the firewall and turn off the ‘Block all incoming traffic’ option. File sharing should be disabled to make the public network safer.

Even an immature computer hacker can easily retrieve your saved passwords and can monitor your key strokes through any software installed on the system. An easy alternative to this problem is to Install Last Pass (a browser that stores your password and info on the cloud storage which you won’t have to re-type or store in your computer). virus removal support The internet sites that have HTTPS in their address are encrypted so these sites are highly secured ones. You can also download Firefox extension ‘HTTPS Everywhere’ that encrypts your conversation with many websites. Or merely check if the URL has ‘https://…’ address.

The hackers took advantage by falsifying the network name from the user. So you must check that the network name is real or not. Because if you access a hacker’s network you will be totally in his control. The false or fake networks may resemble somewhat like -FREE Wi-Fi or anything. So while you are going to use the public network, the genuineness of the network name must be confirmed. Highly confidential data should not be retrieved on public networks like checking your account statements or any other personal stuff. You should always rely on just your own personal networks as they are safest. Above written points will be very helpful during the access of public wi-fi hotspots. these points will secure you from the unwanted access and keep your data safe.

Article Source: http://www.articlesbase.com/software-articles/protect-your-important-data-while-using-wi-fi-hot-spots-in-6-easy-ways-5955214.html

About the Author

Theodore Sumrall is a professional content writer working with Icybergenie.com which provides 24 x7 online technical supports for computer users. Learn about virus support and remove trojan horse virus as well as how to update internet explorer.

Discover How To Block Porn Sites

Discover How To Block Porn Sites

Author: Lori Mikell

These days days everyone from your kids to your grandfather is surfing the internet. While the information age can be a good thing it also can present problems uniquely it’s own. Chief among these are the boundless number of porn sites. This can be a major concern for parents whose kids spend a great deal of time online.

This problem is not easily solved without totally banning the use of the computer. However, one viable solution to this problem that has proven to be very effective is the use of software that was specifically developed to block adult or porn sites thus shielding your children from them.

With this software you don’t have to worry about your kids when they are online because it works amazingly well. To block porn sites simply install this software and let it run in the background.

The benefits you receive by using this software include:

  1. It works in the background and blocks offensive content before it appears on screen.

  2. It is designed to work with all search engines which prevents your kids from searching or even seeing links to any sites that have been blocked. This particular safety feature provides excellent protection against viewing adult pictures during an Image search.

  3. This software program blocks over 50 File Sharing Sharing programs which is a deterrent to illegal file sharing online.

  4. It’s content filtering is impressive and works with all of the popular browsers!

  5. The software operates in a “stealth mode” which runs totally concealed from the task bar, system tray, process list, start menu and add/remove programs sections of your computer!

  6. It can’t be closed or bypassed even by the cleverest users and it can accommodate any number of Windows users!

  7. It can be set to automatically record screen shots at predetermined times for you to review later. This allows you to secretly keep track of whats going on with your computer.

  8. Easy to use URL logging is included, allowing you to maintain a log of all websites visited.

  9. The ingenious keyword filtering system makes it easy for you to block a broad variety of offensive websites. This works with both old and new sites alike!

  10. When it comes to password control, only you can control this program. The only way the software can be bypassed is with the special password that only you as administrator will know.

That’s the porn blocking software in a nutshell. It is very easy to use. Simply install and set it for your PC!

Want to know more about this software and/or download it CLICK HERE

Article Source: http://www.articlesbase.com/spam-articles/discover-how-to-block-porn-sites-4025838.html

About the Author

Lori is a freelance writer from Jacksonville, FL.

Avail online McAfee AntiVirus support services to safeguard your computer with all online threats!

Avail online McAfee AntiVirus support services to safeguard your computer with all online threats!

Author: vnsupport

McAfee antivirus is one of the best security programs available in the market. Providing complete protection against viruses, spyware, malware and other online threats, the program has become hugely popular among internet users. McAfee is known for its ability to prevent your computer from all types of online threats irrespective of where they come from. Moreover, the antivirus does not cause any obtrusion in the normal functioning of your computer and works in a quiet yet effective manner. With efficient McAfee support available online, you can easily ensure that the antivirus functions at its optimum level.

One of the best parts about using the McAfee antivirus is that it does not require constant maintenance. However, there will be times when you’ll need some kind of McAfee antivirus support to ensure smooth functioning of the program. From installation to removal of McAfee products, McAfee support makes it much easier for you to use the antivirus. There are numerous online tech service providers that offer you the best McAfee support. With expert guidance and complete assistance provided by the online service providers, you can conveniently ensure that you get the best results. Some of the common McAfee antivirus support services offered by the online companies include installation of McAfee products, checking system compatibility, configuring various settings, activation of products, removal of McAfee products, scanning the computer and removing the infections. All these and more functions can be easily performed with online McAfee antivirus support.

The popularity of online tech service providers have grown multifold in recent times. They not just provide complete computer support but also make it easier for you to have your computer repaired in the convenience of your home and in a hassle-free manner. Antivirus support is one of the most significant services provided by online tech support companies. You’ll find McAfee support easily at various websites. Being a widely used antivirus program, McAfee antivirus support services are sought by countless computer owners who wish to safeguard their computers with all kinds of online threats. Online McAfee Support covers all McAfee products including McAfee AntiVirus Plus, McAfee Internet Security, McAfee Total Protection, McAfee Identity Protection, McAfee Family Protection, McAfee anti-theft, McAfee Online Backup, McAfee WaveSecure and McAfee virus removal service.

So, the best way to get rid of all McAfee AntiVirus troubles is to avail the McAfee antivirus support online. This will ensure that your antivirus runs smoothly on your computer and provides complete protection in an effortless manner!

Article Source: http://www.articlesbase.com/security-articles/avail-online-mcafee-antivirus-support-services-to-safeguard-your-computer-with-all-online-threats-5850112.html

About the Author

VNSupport is a fast growing technical support provider and provide online tech support for McAfee antivirus support, Microsoft Support, McAfee support, Outlook Troubleshooting, McAfee Help.

Overview of Security Issues in E-Commerce

Overview of Security Issues in E-Commerce

Author: Eamonn O’Raghallaigh

Introduction
E-commerce is defined as the buying and selling of products or services over electronic systems such as the Internet and to a lesser extent, other computer networks. It is generally regarded as the sales and commercial function of E-Business. There has been a massive increase in the level of trade conducted electronically since the widespread penetration of the Internet. A wide variety of commerce is conducted via E-Commerce, including electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. US online retail sales reached $175 billion in 2007 and are projected to grow to $335 billion by 2012 (Mulpuru, 2008).

This massive increase in the uptake of E-Commerce has led to a new generation of associated security threats, but any E-Commerce system must meet four integral requirements: a) privacy – information exchanged must be kept from unauthorized parties, b) integrity – the exchanged information must not be altered or tampered with, c) authentication – both sender and recipient must prove their identities to each other and d) non-repudiation – proof is required that the exchanged information was indeed received (Holcombe, 2007). These basic maxims of E-Commerce are fundamental to the conduct of secure business online. Further to the fundamental maxims of E-Commerce above, E-Commerce providers must also protect against a number of different external security threats, most notably Denial of Service (DoS). These are where an attempt is made to make a computer resource unavailable to its intended users though a variety of mechanisms discussed below. The financial services sector still bears the brunt of e-crime, accounting for 72% of all attacks. But the sector that experienced the greatest increase in the number of attacks was E-Commerce. Attacks in this sector have risen by 15% from 2006 to 2007 (Symantec, 2007).

Privacy
Privacy has become a major concern for consumers with the rise of identity theft and impersonation, and any concern for consumers must be treated as a major concern for E-Commerce providers. According to Consumer Reports Money Adviser (Perrotta, 2008), the US Attorney General has announced multiple indictments relating to a massive international security breach involving nine major retailers and more than 40 million credit- and debit-card numbers. US attorneys think that this may be the largest hacking and identity-theft case ever prosecuted by the justice department. Both EU and US legislation at both the federal and state levels mandates certain organizations to inform customers about information uses and disclosures. Such disclosures are typically accomplished through privacy policies, both online and offline (Vail et al., 2008).

In a study by Lauer and Deng (2008), a model is presented linking privacy policy, through trustworthiness, to online trust, and then to customers’ loyalty and their willingness to provide truthful information. The model was tested using a sample of 269 responses. The findings suggested that consumers’ trust in a company is closely linked with the perception of the company’s respect for customer privacy (Lauer and Deng, 2007). Trust in turn is linked to increased customer loyalty that can be manifested through increased purchases, openness to trying new products, and willingness to participate in programs that use additional personal information. Privacy now forms an integral part of any e-commerce strategy and investment in privacy protection has been shown to increase consumer’s spend, trustworthiness and loyalty.

The converse of this can be shown to be true when things go wrong. In March 2008, the Irish online jobs board, jobs.ie, was compromised by criminals and users’ personal data (in the form of CV’s) were taken (Ryan, 2008). Looking at the real-time responses of users to this event on the popular Irish forum, Boards.ie, we can see that privacy is of major concern to users and in the event of their privacy being compromised users become very agitated and there is an overall negative effect on trust in e-commerce. User comments in the forum included: “I’m well p*ssed off about them keeping my CV on the sly”; “I am just angry that this could have happened and to so many people”; “Mine was taken too. How do I terminate my acc with jobs.ie”; “Grr, so annoyed, feel I should report it to the Gardai now” (Boards.ie, 2008).

Integrity, Authentication & Non Repudiation
In any eCommence system the factors of data integrity, customer & client authentication and non-repudiation are critical to the success of any online business. Data integrity is the assurance that data transmitted is consistent and correct, that is, it has not been tampered or altered in any way during transmission. Authentication is a means by which both parties in an online transaction can be confident that they are who they say they are and non-repudiation is the idea that no party can dispute that an actual event online took place. Proof of data integrity is typically the easiest of these factors to successfully accomplish. A data hash or checksum, such as MD5 or CRC, is usually sufficient to establish that the likelihood of data being undetectably changed is extremely low (Schlaeger and Pernul, 2005).

Notwithstanding these security measures, it is still possible to compromise data in transit through techniques such as phishing or man-in- the-middle attacks (Desmedt, 2005). These flaws have led to the need for the development of strong verification and security measurements such as digital signatures and public key infrastructures (PKI). One of the key developments in e-commerce security and one which has led to the widespread growth of e-commerce is the introduction of digital signatures as a means of verification of data integrity and authentication. In 1995, Utah became the first jurisdiction in the world to enact an electronic signature law. An electronic signature may be defined as “any letters, characters, or symbols manifested by electronic or similar means and executed or adopted by a party with the intent to authenticate a writing” (Blythe, 2006).

In order for a digital signature to attain the same legal status as an ink-on-paper signature, asymmetric key cryptology must have been employed in its production (Blythe, 2006). Such a system employs double keys; one key is used to encrypt the message by the sender, and a different, albeit mathematically related, key is used by the recipient to decrypt the message (Antoniou et al., 2008). This is a very good system for electronic transactions, since two stranger-parties, perhaps living far apart, can confirm each other’s identity and thereby reduce the likelihood of fraud in the transaction. Non-repudiation techniques prevent the sender of a message from subsequently denying that they sent the message. Digital Signatures using public-key cryptography and hash functions are the generally accepted means of providing nonrepudiation of communications

Technical Attacks
Technical attacks are one of the most challenging types of security compromise an e-commerce provider must face. Perpetrators of technical attacks, and in particular Denial-of-Service attacks, typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, large online retailers and popular social networking sites.

Denial of Service Attacks
Denial of Service (DoS) attacks consist of overwhelming a server, a network or a website in order to paralyze its normal activity (Lejeune, 2002). Defending against DoS attacks is one of the most challenging security problems on the Internet today. A major difficulty in thwarting these attacks is to trace the source of the attack, as they often use incorrect or spoofed IP source addresses to disguise the true origin of the attack (Kim and Kim, 2006). The United States Computer Emergency Readiness Team defines symptoms of denial-of-service attacks to include (McDowell, 2007):

  • Unusually slow network performance
  • Unavailability of a particular web site
  • Inability to access any web site
  • Dramatic increase in the number of spam emails received

DoS attacks can be executed in a number of different ways including:

CMP Flood (Smurf Attack) – where perpetrators will send large numbers of IP packets with the source address faked to appear to be the address of the victim. The network’s bandwidth is quickly used up, preventing legitimate packets from getting through to their destination

Teardrop Attack A Teardrop attack involves sending mangled IP fragments with overlapping, over-sized, payloads to the target machine. A bug in the TCP/IP fragmentation re-assembly code of various operating systems causes the fragments to be improperly handled, crashing them as a result of this.

Phlashing– Also known as a Permanent denial-of-service (PDoS) is an attack that damages a system so badly that it requires replacement or reinstallation of hardware. Perpetrators exploit security flaws in the remote management interfaces of the victim’s hardware, be it routers, printers, or other networking hardware. These flaws leave the door open for an attacker to remotely ‘update’ the device firmware to a modified, corrupt or defective firmware image, therefore bricking the device and making it permanently unusable for its original purpose.

Distributed Denial-of-Service Attacks
Distributed Denial of Service (DDoS) attacks are the greatest security fear for IT managers. In a matter of minutes, thousands of vulnerable computers can flood the victim website by choking legitimate traffic (Tariq et al., 2006). A distributed denial of service attack (DDoS) occurs when multiple compromised systems flood the bandwidth or resources of a targeted system, usually one or more web servers. The most famous DDoS attacks occurred in February 2000 where websites including Yahoo, Buy.com, eBay, Amazon and CNN were attacked and left unreachable for several hours each (Todd, 2000).

Brute Force Attacks
A brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example, a large number of the possible keys in a key space in order to decrypt a message. Brute Force Attacks, although perceived to be low-tech in nature are not a thing of the past. In May 2007 the internet infrastructure in Estonia was crippled by multiple sustained brute force attacks against government and commercial institutions in the country (Sausner, 2008). The attacks followed the relocation of a Soviet World War II memorial in Tallinn in late April made news around the world.

Non-Technical Attacks

Phishing Attacks
Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing scams generally are carried out by emailing the victim with a ‘fraudulent’ email from what purports to be a legitimate organization requesting sensitive information. When the victim follows the link embedded within the email they are brought to an elaborate and sophisticated duplicate of the legitimate organizations website. Phishing attacks generally target bank customers, online auction sites (such as eBay), online retailers (such as amazon) and services providers (such as PayPal). According to community banker (Swann, 2008), in more recent times cybercriminals have got more sophisticated in the timing of their attacks with them posing as charities in times of natural disaster.

Social Engineering
Social engineering is the art of manipulating people into performing actions or divulging confidential information. Social engineering techniques include pretexting (where the fraudster creates an invented scenario to get the victim to divulge information), Interactive voice recording (IVR) or phone phishing (where the fraudster gets the victim to divulge sensitive information over the phone) and baiting with Trojans horses (where the fraudster ‘baits’ the victim to load malware unto a system). Social engineering has become a serious threat to e-commerce security since it is difficult to detect and to combat as it involves ‘human’ factors which cannot be patched akin to hardware or software, albeit staff training and education can somewhat thwart the attack (Hasle et al., 2005).

Conclusions
In conclusion the e-commerce industry faces a challenging future in terms of the security risks it must avert. With increasing technical knowledge, and its widespread availability on the internet, criminals are becoming more and more sophisticated in the deceptions and attacks they can perform. Novel attack strategies and vulnerabilities only really become known once a perpetrator has uncovered and exploited them. In saying this, there are multiple security strategies which any e-commerce provider can instigate to reduce the risk of attack and compromise significantly. Awareness of the risks and the implementation of multi-layered security protocols, detailed and open privacy policies and strong authentication and encryption measures will go a long way to assure the consumer and insure the risk of compromise is kept minimal.

REFERENCES
ANTONIOU, G., BATTEN, L. & PARAMPALLI, U. (2008) A Trusted Approach to E-Commerce. Secure Data Management.
BLYTHE, S. E. (2006) Cyberlaw Of Japan: Promoting E-Commerce Security, Increasing Personal Information Confidentiality, And Controlling Computer Access. Journal of Internet Law, 10, 20-26.
BOARDS.IE (2008) Jobs.ie Security Breached. http://www.boards.ie/vbulletin/showthread.php?p=55521004.
DESMEDT, Y. (2005) Man-in-the-Middle Attack. Encyclopedia of Cryptography and Security.
HASLE, H., KRISTIANSEN, Y., KINTEL, K. & SNEKKENES, E. (2005) Measuring Resistance to Social Engineering. Information Security Practice and Experience.
HOLCOMBE, C. (2007) Advanced Guide to E-Commerce, LitLangs Publishing.
KIM, B.-R. & KIM, K.-C. (2006) Improved Technique of IP Address Fragmentation Strategies for DoS Attack Traceback. Computer Science – Theory and Applications.
LAUER, T. & DENG, X. (2007) Building online trust through privacy practices. International Journal of Information Security, 6, 323-331.
LEJEUNE, M. A. (2002) Awareness of Distributed Denial of Service Attacks’ Dangers: Role of Internet Pricing Mechanisms. NETNOMICS, 4, 145-162.
MCDOWELL, M. (2007) Cyber Security Tip ST04-015. IN TEAM, U. S. C. E. R. (Ed.) United States Computer Emergency Readiness Team.
MULPURU, S. (2008) B2C E-Commerce Expected To Top $300B In Five Years. Forrester Research, 1-7.
PERROTTA, N. (2008) Be on guard for ID-theft schemes. Consumer Reports Money Adviser, 5, 2-2.
RYAN, E. (2008) DPC urges Jobs.ie customers to be wary. ENN. http://www.enn.ie/story/show/10124134 ed.
SAUSNER, R. (2008) Could the U.S. Be the Next Estonia? Bank Technology News. SourceMedia, Inc.
SCHLAEGER, C. & PERNUL, G. (2005) Authentication and Authorisation Infrastructures in b2c e-Commerce. E-Commerce and Web Technologies.
SWANN, J. (2008) Beware of Disaster Phishing Scams. Community Banker, 17, 15-15.
SYMANTEC (2007) Attacks rise as e-tailers lag finance sector on security. Computer Weekly, 4-4.
TARIQ, U., HONG, M. & LHEE, K.-S. (2006) A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques. Advanced Data Mining and Applications.
TODD, B. (2000) Distributed Denial of Service Attacks. http://www.linuxsecurity.com/resource_files/intrusion_detection/ddoswhitepaper. html.
VAIL, M. W., EARP, J. B. & ANTAN, A. L. (2008) An Empirical Study of Consumer Perceptions and Comprehension of Web Site Privacy Policies. IEEE Transactions on Engineering Management, 55, 442-454.

Article Source: http://www.articlesbase.com/security-articles/overview-of-security-issues-in-e-commerce-5842708.html

About the Author

Eamonn O’Raghallaigh is Head of Technical Operations and co-founder of Life Science Recruitment, a specialist science recruitment consultancy based in Dublin. Trained in pharmacology, neuroscience, E-Business and marketing, Eamonn is a keen follower of the latest trends in science, marketing and E-Business. Life Science Recruitment specialises in finding science jobs and engineering jobs for jobseekers in Ireland and the EU.

Hack/Reset Windows XP, Vista, Windows 7 Administrator password

Hack/Reset Windows XP, Vista, Windows 7 Administrator password

Author: Rajesh

It becomes a tedious task when you want to login to any windows administrator and it is protected by Administrator password. So, you are blocked from making any changes to computer or installing any software. At such times, it is necessary to hack / reset Windows administrator password. So, I am writing a simple trick to hack/reset Windows XP, Vista or Windows 7 administrator password to help you login to any computer protected by Windows administrator password.

Hack/Reset Windows XP, Vista, Windows 7 Administrator password:

Windows Key is popular windows password recovery software used to reset windows XP, Vista or Windows 7 administrator password. Simply, boot the system using Windows Key bootable CD or flash drive and you’re able to reset windows administrator password.

1. Free Download Windows Key software to reset windows administrator password.

2. The downloaded folder contains image file. Burn it to disc using any image burner software say Nero.

3. Now, when burning process is finished, you have bootable disc ready to hack/reset windows administrator password.

4. Restart your computer and boot via CD/DVD just created. Windows Key will start loading its files and show its interface like this:

Hack Administrator password

5. Windows key will ask you to select the Operating system, account of which you wanna reset administrator password. You have to enter 1, 2 or such numbers corrresponding to your choice.

6. Finally, Windows key will display message “Password has been reset”. Now, press any key and computer will be restarted and now, you will be able to login to administrator account without any password. So, Windows key has removed or reset windows administrator password helping you to loging without any password.

Note: I have tested this on Windows XP, Vista and found this working perfect. The version I have provided doesn’t work on Windows 7. I will provide link for Windows 7 soon.

Thats it friends. You will be thus able to hack windows XP, Vista or windows 7 administrator password using this windows password recovery software. If you have any problem in using this Windows key software to hack / reset windows XP, Vista or windows 7 administrator password or if you have any other useful software to reset windows administrator password, please let me know by mentioning it in comments.

Enjoy n reset windows XP, Vista, Windows 7 administrator password…

Article Source: http://www.articlesbase.com/security-articles/hackreset-windows-xp-vista-windows-7-administrator-password-1774370.html

About the Author

Rajesh is currently pursuing BEIT (Information Technology). He interested a lot in blogging and computer tricks. He shares all his tricks and hacks at Reset Windows Xp password.