Today's Question:  What does your personal desk look like?        GIVE A SHOUT

 DATA SECURITY


  How to Encrypt Your Online Conversations

Do you ever get the feeling that somebody might be listening to or reading your private conversations? You're not crazy. Online platforms don’t hide that they use data from chats, searches, emails, and other places for targeted advertisements. Aside from being a massive invasion of privacy, it also puts your security at risk. But it is possible to prevent people from snooping on you. All you need is a little encryption. Check out these different ways you can add encryption into your life right now. TextingOn average, people send and receive 94 text messages per day. It inc...

4,946 0       VPN DATA SECURITY


  How to password protect a Winzip file

Winzip files are great ways of sharing documents and images of large sizes over the web or through email, since their reduced size makes it possible for them to be sent and received. Also, it is easier to manage one attachment than multiple. But what if the file contains sensitive information you don’t want snoopers to see? Simply add a password protection in Winzip. Adding a password will ensure more security and reliability of the transported files.How to add a Password to your Zip FilesBelow are some methods of creating a password to protect the confidentiality of a zip file:Make use ...

4,601 0       DATA SECURITY WINZIP


  Top 10 Tell Tale Signs Your Computer Has a Virus

The true genius of the 'computer' is its ability to make human lives easier. This is only achieved from the ability of running software such as word processing, number crunching with Excel or learning from the worlds largest source of knowledge, via web browsers.Today being connected to the internet is fundamental to leading a productive modern life. While internet is a boon it comes with its own share of problems. As internet users increase so does the instance of computer virus attacks. Computer viruses are a common problem for millions across the world. It ther...

4,228 0       COMPUTER VIRUS INTERNET SECURITY DATA SECURITY ANTIVIRUS COMPUTER REPAIR


  Speed Hashing

A given hash uniquely represents a file, or any arbitrary collection of data. At least in theory. This is a 128-bit MD5 hash you're looking at above, so it can represent at most 2128 unique items, or 340 trillion trillion trillion. In reality the usable space is substantially less; you can start seeing significant collisions once you've filled half the space, but half of an impossibly large number is still impossibly large.Back in 2005, I wondered about the difference between a checksum and a hash. You can think of a checksum as a person's full name: Eubediah Q. Horsefeathers. It's a shortcut ...

4,008 0       SECURITY SPEED HASHING MD5


  WireGuard VPN: Setup WG_VPN client App on Android phone and connect to local WG_VPN server on VM

We will show the detail steps about how to setup the WireGuard VPN client on an Android phone/pad and configure the VPN client to connect a WG_VPN server in local network. The setup process contents three main steps:Install WireGuard and create a key-pair in WireGuard client.Add the Android client peer information in the WireGuard server’s config file.Config the Android WireGuard client to connect to the server.The test environment network configuration: Step 1. Install WireGuard App and create a key-pair in WireGuard client.Open the Android phone/pad Google App Play Store and searc...

3,767 0       TUTORIAL VPN WIREGUARD


  When a CA becomes untrustable

Information security has become a vital part of people's life, especially for those people who spend much time online. Tons of data are being transmitted over the internet every second. These data include user ids, passwords, credit card information etc and some of them are sensitive information which needs secure way to transmit. Hence different protocols have been developed including SSL/TLS to encrypt data transmitted over the internet.The core of these security protocols is the certificate used to prove the identity of the server and client, and keys in the certificate will be used to...

3,633 0       APPLE SECURITY GOOGLE MOZILLA NEWS WOSIGN


  25 worst passwords in 2012

Weak password is a serious security vulnerability, but the majority of network users still use some universal simple character sequences as the password.SplashData recently announced the world's worst password list in 2012.  "password","123456" and "12345678" are still at top places, while others have varying,  some new passwords like  "welcome" "Jesus" "ninja","mustang"and "password1 "are in the list.With the risk of password loss, SplashData CEO Morgan Slain said we hoped network users should be more careful about ourselves network status, be more conscious about password secu...

3,502 0       SECURITY PASSWORD


  SameSite attribute in cookie

Starting from Chrome 51, a new attribute SameSite has been introduced for browser cookie. This attribute is to prevent CSRF attack.Cookie is normally used to store data exchanged between client and server. It frequently stores user login information. If a malicious website can forge a HTTP request with the valid third party website cookie, it may be called a CSRF attack.For example, if a user logins to a bank website your-bank.com, the bank server responds a cookie:Set-Cookie:id=a3fWa;Later the user somehow visits malicious.com and there is a form on the website.<form action="your-bank...

3,309 0       COOKIE JAVASCRIPT SAMESITE CHROME CSRF