Preview

Tips to Prevent Yourself from Being Hacked

Satisfactory Essays
Open Document
Open Document
900 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Tips to Prevent Yourself from Being Hacked
Name : Aditya Dubey
Website: www.cyberaditya.in

10 tips to prevent yourself from being hacked

hello every 1 i m back with my new post :- in this i will tell u 10 tips to prevent urself from being hacked ....
10 tips to prevent urself from being hacked

Tip 1 :- Always use the strong password combination :  Always use passwords that hard to guess (Mix of digits + letters in Upper case and lower case both) for your all accounts. the longer your password, the better.
 Never use any common word, your name, spouse, parents, birthdate etc.Explanation 1: * Week Passwords and be easily hacked using a Brute Force method which do combination of numbers and letters until the real password comes. * Common passwords containing name, birthdate, mobile number etc, that can be easily guessed by your friends, any known to you. note : do not choose too strong psswd that even u cannot remember :P

Tip 2:- Carefully Click on Links:

Always Check the links carefully before clicking on that because it may be a phishing page .
A phishing page is a fake login page that hacker create to steal the victim psswd even of facebook , gmail,yahoo.. that looks exactly same as reall page

example :- if u see a link send by a unknown person ( usually ur close frnd :P ) www.facebookpage.site11.com www.fbpage.superb.com www.fbadminadi.site7.com ( that page was created by mine and seriosly i hacked my many frnds account with that , with there permision.. :P )

Note :- i too got traped by a phish page from 1 of my cyber frnd called cyberboy..... :P

Tip 3:- Never Open Email Attachments without scanning: * Don’t open any email attachment from any unknown person. And if the person is known then also first scan the email attachment before open or download it.
Explanation 3: * Email Attachments can contain Executable Virus files, that can harm your system. These files usually comes with extension .vbs,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    This is when a hacker runs a program that will go through all the words in the dictionary and add any special characters such as numbers to try and guess the passwords. This can compromise the customer’s account information, so educating a customer on how to make strong passwords should be recommended.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Well the best remedy would be to use cash for everything and keep off of databases. It is easier said than done. As long as there is information available, for hackers to steal, then they will attempt to obtain it.…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * Messages often contain attachments that exploit weaknesses in client-side applications, or links to websites that exploit vulnerabilities in Web browsers or browser plug-ins.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    M6 Assignment

    • 387 Words
    • 2 Pages

    Online look up of phishing sites – which is a maintained list of phishing sites updated several times an hour.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    On each subsequent use, the user must know and use the previously declared password. The weakness in this system for transactions that are significant is that passwords can often be stolen, accidentally revealed, or forgotten.…

    • 711 Words
    • 3 Pages
    Good Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    After gathering much information from the supervisor who received the original email in question, as well…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Don’t run executable (.exe) files from unknown sources, including thoseattached to e-mail or downloaded from Web sites.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Don’t use common words, phrases, keyboard or sequential patterns as passwords. It is risky. Online criminals and hackers could potentially gain access to your accounts with such…

    • 599 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A phishing scam is an email or website that's designed to steal from you. Often times, a hacker will use this email or website to install malicious software onto your computer.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    mis 535

    • 2196 Words
    • 8 Pages

    In a typical phishing attack, the attacker puts up a Web site that looks nearly identical to the victim's Web site. Technology changes fast, our genetic code and learned behaviors not so. As security professionals, we must concentrate not on technical measures, but on education, education, education. Phishers often set up the fake sites several days before sending out phishing e-mails. One way to stop them from swindling customers is to find and shut down these phishing sites before phishers launch their e-mail campaigns. Companies can outsource the search to a fraud alert service. These services use technologies that scour the Web looking for unauthorized uses of your logo or newly registered domains that contain your company's name, either of which might be an indication of an impending phishing attack. This will give your company time to counteract the strike Phishing attacks bring with them other risks and costs as well; including the direct IT costs to locate the source of data loss. Organizations should establish a cross-functional anti-phishing team and develop a response plan so that they're ready to deal with any attack. Ideally, the team should include representatives from IT, internal audit, communications, PR, marketing, the Web group, customer service and legal services.…

    • 2196 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Major corporations, governments, and other organizations are hacked each week, mostly by means of phishing attacks. Describe how users and IT organizations should arm themselves against these attacks.…

    • 1177 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In approaching preventative mechanisms that are effective against hacking, it is very important that both awareness and attitude is first changed, and then perceptions of information security and how to secure data must be allowed to…

    • 631 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    I have also contacted the media to ensure that this incident gets the coverage it deserves. In cracking this site, I have sent specially crafted requests to the server with my browser ID spoofed to that of an iPad. Please know that while this was not instrumental in this wondrous crack, it WAS poetic in many ways. I also gave Goatsec the same warning that they gave AT&T... none at all, to patch their gaping hole. User Accounts have been deleted, and passwords changed," the note said. (Mills,…

    • 1694 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Max and Min

    • 464 Words
    • 2 Pages

    Save all these passwords in your browser because it will be a HUGE pain to type them in every time you need them.…

    • 464 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Never mind creating a password with at least eight characters, two of which are numbers, one of which is a capital letter, and one of which is a symbol like (*&^%$). The easiest way for a hacker to weasel into your account is likely the "Forgot your password?" link.…

    • 666 Words
    • 3 Pages
    Good Essays