Pages

Monday, July 12, 2010

How to choose passwords

The era of inland letters and postal greetings is approaching end. Today we could hardly find a person who uses postal service to get in touch with the relatives thanks to the technological developments. The arrival of new players like telecommunication and internet had pushing out the traditional services like postal out of the play ground. Today it is very hard to find a person without email ID. We all of us have email ID and a password to open the email account. The password is created at the time of creating the email ID. Since password can be stolen or guessed, most of the email service providers allows to change the password. While creating password most of the users create password carelessly. Some of them even forget the password after the account is created. The password must be chosen very wisely since internet is the best way to spread bad impression of a person to a great number of people.
Microsoft recommends the password must be at least 14 characters long. The strength of a password is determined by the different types of characters you use. It is always better not to use the words find in dictionaries as passwords. If words from dictionaries are used, the hacker can easily guess the password of your account. Also bear in mind do not use common passwords. Most of the people uses 123456 as password. How simply a hacker can find such a password ? Also don't use locally used words as password. It is very common trend in Kerala to write the PIN number over the ATM cards. It is like handling key of your account to the thief.
You can check the strength of your password at:  https://www.microsoft.com/protect/fraud/passwords/checker.aspx?WT.mc_id=Site_Link

          Add to Technorati Favorites         Bookmark and Share

Real Time Protection

Real Time Protection is one of the features provided by most of the anti viruses. On-access scanning, background guard, resident shield, autoprotect are the other terms that represent real time protection. The term real time protection refers to the feature of the anti malware programs that monitors all the files in the system as well as the data coming into the computer from the internet. It also scans the files in the memory. If any change in the file or the data coming to the computer is found suspicious, then it will be reported to the user. If necessary the user can consult the recommendations from the experts by submitting the suspicious files to the anti malware manufacturer. The real time protection monitors the changes made in the files located in the hard drives and memory and also the data flowing to the computer from the internet while browsing checking emails and also when downloading files. Real time protection also includes monitoring the removable drives like CD, floppy, pen drives etc. In short the real time protection enables even the beginner to use the computer safely without even having the basic knowledge related to security issues.
Most real-time protection systems hook certain API functions provided by the operating system in order to scan files in real-time. For example, on Microsoft Windows, an antivirus program may hook the CreateProcess API function which executes programs. It can then scan programs which are about to be executed for malicious software. If malicious software is found, the antivirus program can block execution and inform the user.
Avast, Avira, Comodo Internet Security are some of the programs with real time protection. It is recommended to use an antivirus with real time protection so that malware can be blocked before it infects the PC. If viruses like Sality infects the PC, the whole security of the computer will be compromised. So it is better to prevent it before entering the system.

        Add to Technorati Favorites          Bookmark and Share

Friday, July 9, 2010

PC AntiSpyware 2010

PC AntiSpyware 2010 is a rogue anti-spyware program like Home Antivirus 2010. If it got installed in your PC AntiSpyware 2010 will create numerous harmless files on your computer that will then be displayed as infections when the program scans your computer. These files are named using random characters and are created in various locations on your hard drive. These files are created solely to validate the scan results that state that the infections exist on your computer, when in reality these files cannot harm it.





 PC AntiSpyware 2010 will also display a window that impersonates the Microsoft Windows Security Center. The Security center window created by the AntiSpyware 2010 will suggests that you purchase PC AntiSpyware 2010 in order to protect your computer. It will also hijack Internet Explorer so that while you are browsing you will randomly be shown a page stating that the site you are visiting is a security risk. It will then try and sell you PC AntiSpyware 2010 to protect you from this site.

The number of malware programs that disguise as useful programs are spreading at a increased rate in recent days, thus increasing the number of victims. So one must be watchful in selecting the software that is to be installed in his/her PC.

Removal: Download the latest version of Malware Bytes Anti Malware and do a scan, then remove the infected files.

                            Add to Technorati Favorites
Bookmark and Share