Menu Close

Category: content (page 1 of 2)

My WordPress website was hacked, what should I do ?

First of all, you need to calm down. Almost 30,000 websites get hacked everyday, chances of attack on your wordpress being a targeted one are fairly less. Most of the times the ‘so-called-hackers’ test newly released vulnerabilities in wordpress core or plugins. Once tested, they do not harm the website. Here’s a step by step guide to assist you if you wordpress website was hacked.

Note: You think you have been victim of a hack and want immediate professional assistance?

Read the full article

Protecting WiFi from Hackers

In our last post we talked about how hackers can hack WiFi. To complete the series, today we will be talking about WiFi security and steps of protecting WiFi from hackers:

WAYS TO PROTECT YOUR WIFI

  1. Give Cryptic Administrator Username and Password: Wireless routers (and access points) give provision to the administrators to manage their Wi-Fi network through a special account. Anyone who knows this account’s username and password can log into the router and acquire all info. You

Read the full article

These 8 Mistakes will lead to your social media account getting hacked

Malicious hackers are always in quest for vulnerable social media accounts. How about your personal information like pictures, messages, videos etc. being hijacked by an anonymous attacker? Terrible! Isn’t it? You can be a victim of social account breach if you do not take adequate steps to ensure your account’s security.

Here are 8 mistakes which make your social account hackable :

  1. Weak and Guessable Passwords: The most common passwords people use on social media sites are “password”,”123456”, etc.

Read the full article

SSL is nothing more than “False Sense of Security” to Website Owners

While you might be overwhelmed by the fact that an E-Commerce portal is “secured by SSL”, and hence you can perform your online transactions without any worry, the truth is that SSL isn’t the end of the road.

It often misleads people into thinking that an SSL secured website means that it is completely safe in every way. But SSL only ensures the security of the information while transmission. While it secures a connection from being spied upon, …

Read the full article

Basic commands of CMD – Startup

In our last article we went through an Introduction to CMD, its benefits and limitations.
In this article we will go through the basic CMD commands.
So lets get started !

NOTE : Click/Open image to view it properly and understand the working of commands.

OPENING CMD AND HELP OPTION

First thing first! How to open command prompt (CMD)? Open start menu and search ‘cmd’ and it will show up ‘cmd.exe’ open it, as simple as that.

2.1

If a user …

Read the full article

Introduction to CMD – First step to be a hacker!

What comes to your mind when you think about the word “HACKING” ? Is it a black screen with green text on it? Then you are imagining the CMD terminal!!

Command Prompt is popularly known as CMD. It is used to write several system commands in “Command Line Interface (CLI)” to perform various tasks as mentioned in the article below.

What it CMD?

Sounds and looks like some complicated hacking stuff right? But it is way easier to understand and …

Read the full article

All You Need to Know About “Google Hacking”

googleDorkCzarSecurities

The concept of “Google Hacking” can be traced back to 2002, when Johnny Long started collecting extraordinary Google search queries that revealed vulnerable systems and/or sensitive information disclosures – branding them as googleDorks.The list of googleDorks grew into a dictionary of queries, which were eventually categorized into the Google Hacking Database (GHDB) in 2004.

In simple terms, it is a method of computer hacking that utilizes Google Search and other Google applications to locate security loopholes in the configurations …

Read the full article

© 2018 Czar Securities. All rights reserved.

Theme by Anders Norén.