Skip to main content

10 Tips To Make Your PC Secure

These Days many anti social elements  like to access computer of other people. For this Purpose they would use trojans ,viruses worms, malwares etc. the list goes on. So, it is highly important that one should take care of his system and not get trapped into any malicious programs. Therefore  for this purpose I discuss  some tips to make your PC  more secure. 

  •  Always use genuine software.

Not only using pirated software is illegal but all websites which provide these pirated software downloads are full of malwares and viruses.
More than 90 percent of pirated software’s contain worms in their crack file.
If you are really serious about security of your accounts and information then genuine software’s are recommended.


  • NO trial Antivirus.
Antivirus helps protect from viruses, worms, Trojans etc. But you should update it regularly to be safe from latest threats.
Never use trial, free or pirated antivirus programs, most of them are gateway for viruses and worms.
Haven’t you noticed your system hangs or reboots whenever you antivirus is about to expire.
Don’t buy security software in response to unexpected pop-up messages or emails, especially messages that claim to have scanned your computer and found malware.
Scammers send messages like these to try to get you to buy worthless software, or worse, to “break and enter” your computer.
  • Update your OS.
Update your operating system regularly, automatic update is recommended. This helps to remove bugs and prevents viruses and bad guys from exploiting them. Every user must install updates, especially security updates.
If you don’t install latest updates then you are leaving your computer at risk.
  •  Use secure passwords.
Secure password helps unauthorized access.
Avoid common words like names, birthdays, etc
Use different passwords for all your accounts and connections, if you cant remember all of them then use a password manager.
A secure password consists of at least eight characters and contains a number, an uppercase letter and a special character. Read more about secure password here.
  •  Update your software’s.
Similar to OS updates you must update your browsers, any any other software which connects to internet for whatever reason it may be.
Update other software’s like Microsoft Office, Adobe Reader, Adobe Flash, Adobe Shockwave, and Oracle Java. Adobe Flash player and java are the main target of the bad guys.The Tutorial is provided by Cyber Elite.
Cracked or pirated software’s contains viruses and worms, better use genuine.
  • Install a Firewall.
Firewall blocks the security holes in your OS or any other software. Some antivirus programs provide firewall with them. Better use total protection antivirus.


  •  Be cafeful while using P2P software.
P2P software’s like torrent, bit torrent, etc.
Files downloaded through this type of software’s may contain worms, Trojans and viruses.


  • Enable file extensions.
Sometimes viruses are hidden in images or document file.
File name displayed will be “abc.doc”, but the actual name of the file may be “abc.doc.exe”.
However, this is not a problem for win7 or win8 users.


  • Keep Administrator account different.
If you use an administrator account on your PC, malware may also execute as admin.
Vista, win7 and win8 provide User Account Control (UAC), still better is not to use an admin account.
Create a new user with required permission and then use it.

  • Use a Router when you are online.
It prevents direct attack on your system. Nowadays ISP provides modem cum router.
Change router password from default to any other password, because everyone knows default password is "admin" for most routers.
Update firmware of router, this helps in closing security holes in the router.


Comments

Popular posts from this blog

SQL Injection ,Hacking PHP 4.4 sites in seconds

Today I am going to teach you how to hack a certain type of websites with very least efforts. Websites with PHP  4.4 have a SQL injection vulnerability in them which makes their Admin control panel easily accessible,and in just few steps you will access the admin's account of that website. Remember,this tutorial is applicable on PHP 4.4 machines with Apache running in parallel with them. Also,since I will be hacking REAL websites,I will not be displaying their URL’s or else I will be sued!!!. Also this tutorial is only for educational purpose. Here we go!!! Step 1 – Search for them Yep,make a Google dork to find sites running Apache and PHP 4.4 . Its quite easy.You can do this by searching inurl:adminlogin . Step 2 – Scan them Start by scanning them using Nmap ,Do and intense scan and find the open ports. If you find port 2000 open,then you have almost got it. most websites running PHP4.4 have this port for admin login. Now just login using port 2000 ie - ...

Bellmanford Algorithm C++ Program

The  Bellman–Ford algorithm  is an  algorithm  that computes  shortest paths  from a single source  vertex  to all of the other vertices in a  weighted digraph . It is slower than  Dijkstra's algorithm  for the same problem, but more versatile, as it is capable of handling graphs in which some of the edge weights are negative numbers. Here is the Source Code: #include<iostream> #include<stdio.h> using namespace std; #include<conio.h> #define INFINITY 999 struct node {     int cost;     int value;     int from; }a[5]; void addEdge(int am[][5],int src,int dest,int cost) {      am[src][dest] = cost;      return; } void bell(int am[][5]) {     int i, j, k, c = 0, temp;     a[0].cost = 0;     a[0].from = 0;     a[0].value = 0;     for (i = 1; i < 5; i++)     { ...

Software Testing through Fuzzing

Fuzz testing or fuzzing is a software testing technique used to discover coding errors and security loopholes in software, operating systems or networks by inputting massive amounts of random data, called fuzz, to the system in an attempt to make it crash . Fuzzing is  often automated or semi-automated, that  involves providing invalid, unexpected, or random data to the inputs of a computer program. The program is then monitored for exceptions such as crashes, or failing built-in code assertions or for finding potential memory leaks. Fuzzing technique is commonly used to test for security problems in software or computer systems ans also used to discover coding errors and security loopholes in software, operating systems  or networks by inputting massive amounts of random data, called fuzz, to the system  in an attempt to make it crash. If a vulnerability is found, a tool called a fuzz tester (or fuzzer), indicates potential causes. There are two forms ...