Menu Close

Category: Security Gyan (page 2 of 3)

Cyber Security related articles. How to protect yourself, your website and your online presence.

These 8 Mistakes will lead to your social media account getting hacked

Malicious hackers are always in quest for vulnerable social media accounts. How about your personal information like pictures, messages, videos etc. being hijacked by an anonymous attacker? Terrible! Isn’t it? You can be a victim of social account breach if you do not take adequate steps to ensure your account’s security.

Here are 8 mistakes which make your social account hackable :

  1. Weak and Guessable Passwords: The most common passwords people use on social media sites are “password”,”123456”, etc.

Read the full article

SSL is nothing more than “False Sense of Security” to Website Owners

While you might be overwhelmed by the fact that an E-Commerce portal is “secured by SSL”, and hence you can perform your online transactions without any worry, the truth is that SSL isn’t the end of the road.

It often misleads people into thinking that an SSL secured website means that it is completely safe in every way. But SSL only ensures the security of the information while transmission. While it secures a connection from being spied upon, …

Read the full article

Security still an important reason for people not using E-Commerce portals!

While I was handing over my credit card to the waiter in a restaurant, my mother was staring at me in shock. She asked me “what if they draw out all the money from your account?” Just then a question came to my mind; we rarely do even think twice before handing over our credit cards to a waiter or a store clerk, then why do we often feel jittery while purchasing something online, or going for online banking? What …

Read the full article

NSA Spying – A Myth or Reality?

We all enjoy privacy in our personal matters. But when it comes to our cyber life, we hardly care whether we are being spied or tracked. Why is it so?

Most people in our country believe that working in a secluded room with a personal computer is all they need to maintain privacy. Well… the actual situation out there in cyberspace is quite grave and you might just turn out to be an arbitrarily chosen victim.

There has been much …

Read the full article

CMD – You companion for network information

Here we are back again with some more new stuff to learn. In our first article we went through an Introduction to CMD, its benefits and limitations. In second article we went through the basic CMD commands like creating, copying, renaming, deleting files using CMD.

In this article we will get into some networking stuff like looking up IPs, checking your internet connection and much more.

SYSTEMINFO

It works as it sounds, it gives you all available hardware information about …

Read the full article

WordPress Security for Bloggers

The main security risk of having a website is being hacked. Many believe that since their website is not in limelight, or since it does not hold any sensitive information it is not a target of the fraudsters.

Get your notions corrected. Hackers are after everything that your website has. They might hack a website to host and transfer warez and other forms of illegal files, so that they can use free bandwidth, which you pay for. Or they can …

Read the full article

Basic commands of CMD – Startup

In our last article we went through an Introduction to CMD, its benefits and limitations.
In this article we will go through the basic CMD commands.
So lets get started !

NOTE : Click/Open image to view it properly and understand the working of commands.

OPENING CMD AND HELP OPTION

First thing first! How to open command prompt (CMD)? Open start menu and search ‘cmd’ and it will show up ‘cmd.exe’ open it, as simple as that.

2.1

If a user …

Read the full article

© 2020 Czar Securities. All rights reserved.

Theme by Anders Norén.