Showing posts with label SECURITY. Show all posts
Showing posts with label SECURITY. Show all posts

Thursday 8 October 2015

Android Privacy apps

Posted by Unknown
How to hide various file formats and apps in android?
Most of the people search for the apps which provide the best privacy for their files such as music,videos,apps,etc.All at one place!
So here are the best android apps to have the best security options.
Take a look!!!
1:Audio Manager:
Nobody can even think that this is the privacy vault app.
This is the best android privacy app one can get.

Audio manager comes with one in two apps that can be used as the privacy purpose as well as the app that can control the volume levels of your smartphone.
Regarding the name Audio Manager;no one can guess the app they are watching on the screen is the app used for hiding.
When one open ups the app this screen appears.

android privacy vault apps
After the specific time(which is customizable); this app opens the next screen which is nothing but yours' vault where you can hide your personal pictures,videos even apps in the menu too.
Read More

Sunday 24 August 2014

Tips For Chrome Security.

Posted by Robonist.in
Chromebook is reputed browser in safety issues, but the fact is that whenever you are using internet or using any kind of cloud services your information is at risk. Now the thing is how to secure your chromebook ?
Don't worry guys we will provide you few tricks to secure your chrome easily. Just follow the post and read it carefully. Google claim for internet security for chrome and yes it's true for a certain extent. Sometimes your laptops do protect you by encrypting locally stored data, protects you from phising attack, blocking traditionally malware installs. But keep in mind that chrome rely on Internet and make use of cloud storage services which can put your data at risk. To avoid this and make your browser secure follow the post as below.

1. Make use of Guest Mode.

If you are just surfing on web then surely make use of Guest mode feature because it does not need your Google ID. The main purpose of the Guest mode is to allow your friends to use chromebook without any access to your google account. Google is tailoring the activities you do. Using Guest mode can make sure that any particular of your online sessions is excluded from other information google collects about you.
You should note that the browsing data from the guest sessions aren't saved, but google warns that some websites still may have records of visit.
To enable Guest browsing mode press the keyboard shortcut key Ctrl+Shift+Q and to exit press the same shortcut keys.
Note: You can visit and download the files but but cannot install app from the chrome store by Guest mode.

2.Make Use of VPN.

As the chromebook make use of Internet heavily you should be familiar to the VPN service and should enable it. Your data is also at high risk when you use it on open campus level like free open WiFi in school, colleges, malls etc. People can interfere when you use open Wifi. This can be protected by using VPN services as it provides a layer of protection any time you use free, open WiFi networks. It prevents you from hackers from snooping your activities. Many VPN services also provides you a new IP address to your computer which masks your actual geographical location and therefore hides some important information about you and ayour computer. 
They also encrypt the information flowing between your computer and internet.
You can find many free VPN services or Low cost VPN services and setting anyone for your chromebook is however tricky because not all the VPN services work.
Only few services are supported by the Chromebook like L2TP over IPsec with PSK, L2TP over IPsec with certificate-based authentication and open VPN.

3.Be safe from Phishing scams and suspicious apps.

Your Chrome book provides you alerts all the time of phishing and malware as the alerts are turned ON by default. Don't ignore and disable them instead pay attention when those alerts appear. 
There is always a chance that you could download a spammy chrome app or extension. Yes there are only few threats in Chrome store. But nevertheless don't ever download or click on anything that looks suspicious. You also get phished by clicking on the suspicious email links, avoid it. Be on safer side always.

Conclusion

To use a fully secured Chromebook you need to keep in mind the above things. It secures your data. Using Internet is also not secure, your important data is always at high risk but the security is in your hand. Make yourself on safer side. Enjoy Chrome and do let us know your reviews after after using the above tips. Let your friends know about this.



Read More

Tuesday 5 August 2014

JackPair: A Device To Secure Your Voice Calls By Encrypting It.

Posted by Robonist.in

Feeling unsafe when you talk on phone calls ? Do you think that your phone call is being spy by someone ? I assure that this newly invented gadget can help you. JackPair a new device which is used to encrypt the voice calls. It works with the device through standard 3.5 mm audio jack. Make your phone line fully secure with a pair of jackpair connected to your phones. You just need to do is put the button on. That's it ! No need to remember password, No need to install any software, no subscription needed and work ability to get connected to any phone of standard audio jack connection.

What is JackPair ?

A device which will encrypt your voice while talking on phone is JackPair. 
For example : Suppose your phone is getting wire tapped and you want to protect your privacy. To secure yourself from spied you just need to a new JackPair. ( Readers be careful and read further ). Follow the below steps for getting your privacy tight and get your call protected with this new device .
  1. You will have to make a call to friend with whom you wanna talk. Next you do is to connect the Jackpair gadget to your smartphone, or landlines with the medium of 3.5mm audio jack.
  2. 2nd step is that you have to connect your headset with the JackPair gadget. 
  3. Now your side is protected but it is of no use if the other phone receiver to whom i called is not connected to the JackPair with same style.
  4. It would work only and only if both the phones are connected with this new gadget.

Working of JackPair. 

Both Phone's on call are connected to gadget as mentioned above, interesting is how actually the device works? Here is your answer.
  • While talking on phone when we push the button ON the device gets activated. 
  • When both caller's as well as receiver's button is ON, one device produces a One-time-secret-key (OTSK) on the LED screen of the device the same key is developed on the receivers screen. 
  • There is no need to learn that key, nor is to type it. OTSK is automatically created and self-destroyed. It means that no one can break this OTSK which has encrypted your voice.
  • None other device, nor any other technology can trace the voice call which you have encrypted with this JackPair.

Benifits.

JackPair is without loss full benefit device. Security issues of phone tapping is no more a worry for user of this this device. No need to take any extra efforts other then to purchase it. No need to install it, nor to remind any password or anything else. Easy is to make safety, privacy is maintained on high level. Pay once and then just feel safe to talk any private talks. enjoy the freedom of speech.

Conclusion.

This device is just the kickstart to make the world to enjoy their privacy. If you really is in need or if you really think that your phone should not be spy ever then start the use of JackPair as soon as possible. It codes your voice which can't be able to break easily. Please let your friends family and friends know about this device.
If you have any problem or question regarding this post feel free to comment below or fill the contact form.

Read More

Saturday 19 July 2014

Online Shopping Security

Posted by arvind
Now a day, online shopping has become a part of our day to day life. We get to see a large range of merchandise with efficient cost. Further, it has become easy and quite convenient for the buyer to shop and make payments online. But have you ever wondered about the safety of your payment? Are you sure about the privacy of your bank cards? If no, then here I have some amazing tips to lock the web security and prevent cyber attacks. First let’s know how we are prone to such attacks.

Read More

Sunday 18 May 2014

Computer Hacks and Security

Posted by arvind
Computer plays very important role in our life and almost everyone reading this post have computer's in there houses. We all need computers for being in touch with our family and friends, for business work, for shopping and for other activities to. Computer saves a lot of sensitive and personal information. But have you ever thought of your computers security. So in this post I've collected some important precautions one must take to secure their PC.

How Hackers Can Hack your Computers?


Key loggers. (Keystroke logging)

Key loggers is nothing but a tinny software which a hacker sends into your PC for logging your keystrokes.
In simple words key loggers is a software which records all the things which you have been typing, whether it can be your chatting, your emails, your password, credit or bank details or any sensitive information. Hacker can send key logger via emails they can directly install it if they physical contact with PC. Key logger are very tiny software.

Trojans Horse.

Trojan virus is the most dangerous virus for Computers. Trojan is similar as Key loggers but come with many advanced features like it can give remote access of your computer to the hacker, it allows the hacker to keylog all the key stokes, It allows hacker to access your webcam, hackers can shutdown your PC and more. Trojan virus are small in size and can be attached in the emails or can be hidden in other software's.

Bat Viruses.

Bat viruses are nothing but the viruses which are created by using Batch Program. Bat viruses are very famous virus as they can do a lot of evil things in your PC. A Bat virus can delete all your windows files or can delete all your important files as programmed. And the worst part of a bat program is that no anti-virus can detect bat virus. Hackers modify bat virus into .exe files and change their Icons to any famous software and can share with you to harm your PC.


How to Protect your Computers from being Hacked?


Use Anti virus Software's.

If you have a computer then it is a must to have Anti-Virus Software Installed in your PC. Anti Virus will detect all the viruses and remove it from your PC. It doesn't allow dangerous viruses like key loggers and Trojans to send your information to hackers. You must update your Anti-virus daily to keep it update with the recent viruses.

Avoid Viruses.

Stop click on random links from any source such as Social media, Emails or any website and forums. Only click to links which you are sure of and which are legit. Clicking on links makes your PC download new viruses.

Protect your computer with Firewall.

Firewall is very necessary as it create a wall between your computer and hacker try to get access to your computer or network. Hardware and software firewall helps to keep your safe when you are online.

Keep your Operating system updated.

As soon as you see any update is available then do update your system and make sure you daily update your system time to time. Updating your systems help to keep thieves away from your PC and detects new viruses.

Secure your Home Network Security.

Mostly a hacker will hack you from a network so it is necessary to first update your Network Security.
Broad band connected PCs should be behind gateway/router even if there is only one PC.
Use Firewall Encryption (WPA/WPA2)

Use a Spam Filters in your Email Programs.

As most of the Hackers send you spam emails and most of the spam email consist of phishing site, Key logger software or Trojan software so to avoid these things one must Use spam filter program.

Backup Your Data.

Creating a Backup of your data is very useful as it contains our Important and Sensitive Information. If your PC gets attacked by a virus and it deleted all your files so to keep the documents safe always make a backup of your important files.

Remove Unnecessary Software's.

Always Avoid keeping unknown software or unused software in your PC as it will make your PC chances high of getting attacked by virus. So try avoid unnecessary software's.

Password Protect your PC.

Always Keep your PC password protected as it will not allow other user to access your computer and use your personal information.

Treat your Computer like your toothbrush. Don't let anybody else use it

Related Post

Here in this post you saw some important things to be followed in order to protect your PC from Hackers and there is a similar post which will tell you about How Hackers Hack Email Accounts and How to protect them from being Hacked.


Conclusion :

Guys these are the security precaution one should take to prevent there PC from getting Hacked. I've been searching these all security measures from a long time and been taking this precaution and My PC never got hacked or got infected with any Virus. 
If you are having any problem or Question about this post please do comment below or you can contact me.
Read More

Email Hack And Security

Posted by arvind
Today we will be discussing about Email Hacks and Security. As Emails consist of sensitive information such as our bank account details, credit card details, Paypal details and much more personal information. Emails are already protected with password systems but is that enough for Email Security? The answer is no. We need to know about all the email security to protect our account.


Read More

Wednesday 7 May 2014

Phishing Attacks

Posted by arvind
Phishing is a type of Internet scam which is used to acquire a users sensitive information by deception. It includes theft of usernames, passwords, credit card number, bank account details and other sensitive information. These days phishing attacks are getting very advanced in their exploitation of social engineering techniques. So in this post I am going to tell you how phishing works and how to prevent yourself from being a victim of a phishing attack.

How to protect yourself from phishing
Read More

Friday 2 May 2014

Facebook Account Security

Posted by arvind
As you know many people are Hiring hackers to hack your Facebook account as they can spy on your facebook account so today lets talk about Facebook Hacks, Scams and Security. There are hundreds of people working full time for your Facebook account security and Facebook is one of the most secure social networking site but still some people's account get hacked. In this post i will tell you how to secure your facebook account and what are the attacks mainly used to hack your facebook account.

Secure your facebook account
Read More

Thursday 13 February 2014

How to Identify Facebook Fake Profile?

Posted by arvind
Facebook was made for Connecting People around the World. But some people are misusing it by creating fake profiles and It happened to me, Someone was using a girls account with a Beautiful Girl's Picture and I was suspicious on that account if it is fake on not, so I searched and found a awesome trick that allows you to Identify if the account is fake or not.  To Find out which profiles are fake and which profiles are real we can use a simple method. We can find out with the help of google Images.
How to identify facebook fake profiles

Read More