Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Friday, June 15, 2012

How to keep android safe and secure


The popularity of Android devices seems evident from its 48% hold in thesmartphone market. Being an open source operating system, it evidently remains vulnerable to cyber crime and hacking. With increasing number of downloadable Android apps, the concern for keeping your device healthy and protected can be demanding.
What’s your Device
Android can be a tempting platform for both users and hackers alike. Going by March 2011 data, about 260,000 devices got infected creating security concerns. With the credible community of developers, there has been a boost to Android based utility apps and functionality providing easy and appealing avenues for users.
It is practical to know your device in a closer context (if you are already not aware of the smart phone features). Much of the resolution to security concerns is obtainable by knowing your gadget and its functionality. Even though no application can be 100% secure, you can watch out for the android phone updates providing latest security platforms to your device.
Adopt simple security measures like password and backup of (important) files. Avoidrooting your device. Instead of surrendering to the easily accessible applications, judge their credibility and usability before allowing them to access your device. Rely on the official android market for applications. It can be dangerous to increase vulnerability by risking your confidential information.
Being open to endless applications does not necessarily mean you should attempt all. Be selective and logical and stick to those you actually need. Do some research before exposing yourself to keep potential threats at bay.
Your smartphone’s security features can also play significantly in keeping the phone safe. Consider configuring its location and security settings in order to keep the phone from falling into wrong hands. Important considerations include keystroke pattern, password lock option and fingerprint lock option. Keep away from unsecured Wi-Fi connectivity and other unreliable sources. Open wireless networks can be detrimental to the crucial data in your device.
Tips to Deal with Security Concerns
There can be several techniques to handle security threats and viruses to keep your device in the pink of its health.
Applications
There are many applications which can secure Android phones from bugs, Trojans and viruses. The Lookout Security & Anti-virus app for Android is one such application. It can protect your device from local network or online threats. With the application, you can also protect crucial data and locate phone (if misplaced). It also facilitates backup for your important files and documents. Its ‘Routine Check’ feature allows you to schedule scan of the downloadable apps.
Another useful Android based application is the AVG Antivirus. This popular software enables to scan apps, set files and media card (in real time) and deal with threats like Trojan and spyware. The incoming screening of SMS is another useful attribute of this software. The AVG Antivirus is an advantage for your device as it ensures maximum speed of your phone by implementing a task manager to kill off any apps and tasks that slow the device down.
A renowned mobile protection app, McAfee WaveSecure, can be your rescuer in the event you lose your mobile. It is an award-winning app which can track your device and also wipe data from getting accessed by hackers. It can serve the preferred portal to backup and restore personal data.
The Norton Antivirus & Security is another security application for Android devices ( iOS 2.1 and above). It can be implemented in case of theft and malware attacks. The leading software company’s application can do many tasks including searching and removing mobile security threats and remote wiping of data.
There are many other promising applications, like Avast Mobile Security and NQ Mobile Security & Antivirus to keep your device and data safe. Judicious usage of the device can minimize potential threats although it is better to be prepared with a support system before the hue and cry begins.

Friday, May 25, 2012

see who used your pc in your absence

Want to know Who Used Your Pc In Your Absence & what Did He Do?

just follow these simple steps

start > run >eventvwr.msc


Events are stored in three log files: Application, Security, and System.

These logs can be reviewed and archived.

For our purposes we want the System log. Click on "System" in the left-hand column for a list of events.

Look for a date and time when you weren't home and your computer should have been off.

double click on the eg: info n it will show u the detail.

You can also use this log to see how long someone was on the computer.

Just look at the time the computer was turned on and off for that day.

Tuesday, April 24, 2012

50 TRICKS TO GET MORE PEOPLE TO LIKE YOUR FACEBOOK PAGE

There are over three million active facebook pages, and these pages are gaining millions of new fans every day.

Yes, I just said fans.

top 10 tips for Facebook

Below is a listing of our top 10 tips for the popular social networking website Facebook.


Hide users, games, polls, etc.
It quickly gets annoying seeing some users posts, game invites, polls, etc. Hovering your mouse to the right of the post and clicking the Hide button as shown below can hide any post. Once this button is pressed you'll be prompted with the option to hide that user or in the case of a Facebook application the option to hide that application from ever showing up on your profile.
Hide Facebook users, games, polls, etc.
To unhide someone or unblock an application click the Edit Options link in the bottom right corner of the news feed as shown below.
Facebook unhide friends
Greasemonkey and FB Purity

Saturday, March 17, 2012

How to find open port in pc | How to find open port inremote pc

In any Windows version , you can use the PortQry command line port scanner to see all the listening ports on a remote computer. If this tool is not installed on your computer, you can download it from the MS Download Center. Click here to go to download page.

Friday, January 27, 2012

Google new Privacy and policy | Overview of Google new Privacy and policy



Easy to work across Google

Our new policy reflects our desire to create a simple product experience that does what you need, when you want it to. Whether you’re reading an email that reminds you to schedule a family get-together or finding a favorite video that you want to share, we want to ensure you can move across Gmail, Calendar, Search, YouTube, or whatever your life 

Download Avast Mobile Security Beta For Android


Friday, January 20, 2012

How to block any website in PC | Disable any website in PC | Block any website manually in PC

Blocking the website directly from the pc is best choice for parential control.You might have noticed that in some of the websites are not opening in particular computer, or for parential control. Here i am going to explain how to block any site manually in computer