Showing posts with label Security Tips. Show all posts
Showing posts with label Security Tips. Show all posts

Saturday, December 24, 2011

How to Block a Website



There are many reason why you need to know how to block a website. Some of the most common reasons are you have been targeted by spammers who use adware and popups to attack your PC. Other reasons may be to prevent your children from having access to certain site content such as porn and gambling.

Depending on the level of security you wish, learning how to block a website may require a adjustments of your web browser, the use of internet filtering software or editing of your host file. At any rate you can try all methods to see which works best for you.

How to block a Website using Internet Explorer


Internet Explorer version 5 and later offer the ability for heighten security and privacy. You can block a site by following the directions below:

1. Load your Internet explorer
2. Click Tools
3. Click Internet Options
4. Click the Privacy tab
5. Under the Privacy window, Click Sites
6. Type in the site address that you want to Block and Click OK. Remember this technique only blocks on one site at a time. Parental control software will allow you to block multiple sites and categories.


Here are alternate instructions to block a website using Internet Explorer.
Tools ->Internet Options->Security->Restricted sites->Sites->Type in the site address and Click ADD then click OK





How to Block A Website in All Web Browsers


This action will require you to edit your Host file. Your host file is a computer file used to store information on where to find a node on a computer network. For more a more detailed description. Check out this link Host File Description Link
In Windows XP
1. Click Start->All Programs->Accessories->Command Prompt.
2. Click Command Prompt This will open a DOS command window.
3. Type: notepad C:/Windows/System32/drivers/etc/hosts
4. Locate the line 127.0.0.1 localhost
5. To block the website google.com for example, just add this text under 127.0.0.1 localhost:
127.0.0.1 google.com
127.0.0.1 www.google.com
You can add as many sites any site, However you will need to prefix it with "127.0.0.1".

6. Save the file
Google will now be blocked in all web browser. This is an advanced but easy method on how to blow a website. 

Source : http://makeonlinetricks.blogspot.com/

Friday, December 9, 2011

Set a password in a Word document - 2007


To encrypt your file and set a password to open it:
  1. Click the Microsoft Office Button , point to Prepare, and then click Encrypt Document.
  1. In the Encrypt Document dialog box, in the Password box, type a password, and then click OK.
You can type up to 255 characters. By default, this feature uses AES 128-bit advanced encryption. Encryption is a standard method used to help make your file more secure.
  1. In the Confirm Password dialog box, in the Reenter password box, type the password again, and then click OK.
  2. To save the password, save the file.
Remove password protection from a Word document

  1. Use the password to open the document.
  2. Click the Microsoft Office Button , point to Prepare, and then clickEncrypt Document.
  3. In the Encrypt Document dialog box, in the Password box, delete the encrypted password, and then click OK.
  4. Save the file.

Set a password to modify a Word document

In addition to setting a password to open a Word document, you can set a password to allow others to modify the document.
  1. Click the Microsoft Office Button , click Save As, and on the bottom of the Save As dialog, click Tools.
  2. On the Tools menu, click General Options. The General Options dialog opens.
  3. Under File sharing options for this document, in the Password to modifybox, type a password.
  4. In the Confirm Password dialog, re-type the password. Click OK.
  5. Click Save.
 NOTE   To remove the password, repeat these instructions and then delete the password from the Password to modify box. Click Save.

Wednesday, December 7, 2011

How to make your ATM Transactions Safe?


You can make your ATM (Automated Teller Machine) operations safe, by observing some simple precautions: 
  • Memorise your PIN. Do not keep your card and PIN together.
  • Do not share your PIN or card with anyone.
  • Stand close to the ATM while entering your PIN.
  • Do not take help of strangers for using the card or handling the cash.
  • Always press the 'Cancel' key before moving away from the ATM.
 
If your card gets stuck in the ATM, or if cash is not dispensed after you having keyed in a transaction, press the 'Cancel' key and call your bank immediately.

Courtesy : http://www.investmentkit.com

Wednesday, August 31, 2011

How to easily stay secure online? Simple and easy tips!

Every single time you connect online did you know that you face dangerous Computer security hazards. Viruses, Trojans, Root-Kits, hackers, and junk e-mail await you at every turn. The truth is that these menaces are forever going to comprise a constituent of being connected and also doing business online.

There are a number of safeguards you will be able to take to make yourself and your computer systems safe.

I will now list out to you the best proven tactics to enhance your Internet security whenever you are online:

Virus Protection. Make certain you've the up-to-the-minute virus updates installed on your system and allow the software to exhaustively scan your entire computer every day to guarantee that no computer virus are successfully embedded themselves on your disk drive. Use a modern anti-virus like VIPRE Antivirus Software to scan both your computer and your email. AVG, McAfee and Norton likewise offer similar products.

VIPRE used to initially produce CounterSpy which was a leading spyware and malware protection software online from many years.

Spam Blocker. I've a junk e-mail blocking agent that I use with Microsoft Outlook called Cloudmark Desktop that fares a excellent task of assisting my Microsoft Outlook to distinguish junk e-mail.

Use a Alias E-mail address : For instance, whenever I'm signing up for a free technology mailing list / product news, I might use something like jasonblr+technology@gmail.com, which will then end up with a special label in my gmail Inbox. Therein, you do not have to divulge your "real" e-mail address, and you will be able to ascertain whenever the list holder trades or leases your e-mail address to another. Therefore, if you all of a sudden start to get emails to your jasonblr+technology@gmail.com e-mail address from a hard disk maker you have never heard of, you'll know that the technology mailing list folks traded or leased your e-mail address to others.

Firewalls: Always make certain that you are using a firewall protection. At a lower limit, to protect your computer from being hacked while you're online you can use Windows Firewall. Or, use a free firewall like COMODO. Whenever you use a wireless router, make sure to configure a password to secure it so that anyone going past your residence or office can't hijack your signal and possibly hack your computer network. I was readjusting the wireless connection on my laptop last night and came across several unsecured wireless connections in my vicinity. I reside in a residential area without any business organizations, thus I cognize that these represented insecure wireless routers in my neighbors' residences.

Be safe and enjoy the internet super highway.

Sunday, August 28, 2011

Set SA Password in SQL Server Management Studio Express


During the installation of SQL Server,we select mixed mode authentication and give complex password for sa. Sometime we may need to change the password of sa.
To change the password of sa follow the below steps.
1.Open SQL Server Express Management Studio.
2.Connect to SQL Server using windows authentication.
3. Expand the server and choose security and expand logins.
4. Right click on sa, from properties modify the password and confirm password
5. Uncheck Enforce password policy.
6.Click OK

Saturday, August 27, 2011

Guidance for Using a Laptop Computer


Laptop computers are not ideal for continuous use. They normally have an elevated and compressed keyboard, a small display screen that is at an angle and position not ergonomically sound, even if they are at an otherwise entirely suitable workstation.

Incorrect or inappropriate use of laptop computers can cause health problems. This guidance offers some practical advice on how to avoid any problems.
Occupational Health has put this leaflet together as an additional aid for anyone who uses a laptop and it should be noted that general workstation set up etc. is covered in the guidance and code of practice documents for computer use.

The significant hazards associated with laptop use may include:

Ergonomics of use – the requirements for portability often means that the ergonomic standards developed for desktop computer workstations are largely ignored when an individual uses a laptop. Often laptops are used on laboratory benches, unsuitable desks and tables at home, on trains or in hotel rooms with limited legroom, poor seating and incorrect screen positions. There are therefore foreseeable risks of developing a wide range of health problems from such poor ergonomic environments.
Vision fatigue – often laptops are used extensively in environments, which do not have suitable lighting. Additionally, laptops often have screens that are not as clear, stable or as bright as normal computer monitors. It is possible that users may be exposed to a greater risk of developing temporary vision fatigue as a consequence.
Manual handling – laptops and their accessories are typically in excess of 5 kg. Although well within the ‘accepted normal load’, they may need to be carried in addition to other items for long periods of time when travelling.
Theft – There is also a real risk of theft and steps should be taken to avoid personal injury by being cautious whilst commuting with equipment. Brand name cases should not be used if possible as this draws attention to the value of the equipment that is being carried.

The following tips should help ensure that you can work comfortably and safely with your portable computer.

Purchasing:

Tip 1: Test the keyboard before purchase to make sure it fits your fingers - miniature keyboards are fine only if you have small fingers or do little data entry/word processing. If you must have a small keyboard and still want to type comfortably, consider fewer keys (with multiple shifts) or use a separate keyboard for such work.
Tip 2: Purchase laptops that have the largest and brightest screen you can afford. It is easier to create a more ergonomic position with such screens and they minimise the potential for vision fatigue. The angle of the screen should be approximately 90o to you line of vision to view the screen clearly.
Tip 3: If possible, buy a ‘docking station’ or attach a separate monitor and/or keyboard to a portable computer for prolonged use since the screen will inevitably be below the optimum viewing angle for comfort.
Tip 4: If you intend to work whilst travelling, make sure the pointing device (trackball, button or whatever) can cope with movement and vibration. Palm or wrist rests in front of the keyboard can help provide a stable base for use on the move, or in the office environment.

Health:

Tip 5: When using a trackball or glide pad, keep your hand relaxed with your fingers moving together. Do not screw up your fingers or hold them up in the air while working.
Tip 6: You dramatically increase strain if you twist your body or try to operate your laptop within a cramped environment, such as while travelling. Ensure comfortable working. Adjust your seat to support your back and place the laptop on a flat surface at the correct distance and angle from you.
Tip 7: If travelling, check the total weight you will need to carry. Although laptops are getting lighter, most still require external mains transformers and power leads etc. Additionally most people will also have to carry other papers, their briefcase and other articles. This can result in a number of musculoskeletal disorders over a period of time. The normal solution is a shoulder bag with a padded shoulder strap. Additionally, you can reduce the weight carried by ensuring the battery is fully charged so as to avoid carrying a spare battery.
Tip 8:  You may wish to consider purchasing a lightweight laptop stand, mouse and compact keyboard.

Friday, August 19, 2011

Windows Server - Groups and Rights


 Windows Server - Groups and Rights






Group
Description
Default user rights
Account Operators
Members of this group can create, modify, and delete accounts for users, groups, and computers located in the Users or Computers containers and organizational units in the domain, except the Domain Controllers organizational unit. Members of this group do not have permission to modify the Administrators or the Domain Admins groups, nor do they have permission to modify the accounts for members of those groups. Members of this group can log on locally to domain controllers in the domain and shut them down. Because this group has significant power in the domain, add users with caution.
Allow log on locally; Shut down the system.
Administrators
Members of this group have full control of all domain controllers in the domain. By default, the Domain Admins and Enterprise Admins groups are members of the Administrators group. The Administrator account is also a default member. Because this group has full control in the domain, add users with caution.
Access this computer from the network; Adjust memory quotas for a process; Back up files and directories; Bypass traverse checking; Change the system time; Create a pagefile; Debug programs; Enable computer and user accounts to be trusted for delegation; Force a shutdown from a remote system; Increase scheduling priority; Load and unload device drivers; Allow log on locally; Manage auditing and security log; Modify firmware environment values; Profile single process; Profile system performance; Remove computer from docking station; Restore files and directories; Shut down the system; Take ownership of files or other objects.
For more User Rights : Download   /    Visit:   http://makeonlinetricks.blogspot.com/


Thursday, August 18, 2011

When Blind copy of email is always safe?


We will always want to share interesting Emails with our friends. We successfully complete this mission by just clicking the forward button in our E-mail interface and filling up email addresses of our friends in the "To" address box or "CC" address box.
This method would serve the purpose. But is it a safe way for forwarding emails?
For any novice internet user this method may be sounding good. But basically it is a not safe way of forwarding mails.

 

Significance of TO, CC and BCC:

The "To" address box is of course the text field where you have to enter the email address to which you want the mail to be sent. Multiple email addresses can be entered in this field for one to many delivery.

CC:

The "CC" stands for the term Carbon Copy. This is similar to writing a letter to somebody and mark a copy of the same to others.

When to use CC:

We have to note here that the recipients who are the owners of email addresses you entered in the TO address box as well as "CC" address will come to know about the other recipients to whom the email was sent. So you have to use "CC" address box prudently in the cases where you should ensure that all recipients should know the email details of other recipients to whom the mail is sent. To put is simply, the email message received by the recipients whose email addresses are entered in the "CC" address box will contain the email address of the sender as well as the email addresses of other recipients.

BCC:

The "BCC" stands for Blind Carbon Copy. If you enter the email address of the recipient/recipients here, they will not come know about other recipients to whom this mail was sent, the ultimate email message would contain only the sender's email and other contents of the email. The email addresses of other recipients will not be figuring in the mail.

When to use BCC:

While you are in compulsion that the recipients should know the email addresses of the other recipients you have to use CC. In all other situations it is better to use BCC because it's safe way of handling email harvesters

What is email harvesting:

It refers to manual or automated way of collecting email addresses by bulk email senders for sending spam (unwanted/unsolicited emails to advertise/propagate something-especially illicit products, obscene contents etc), virus programs to harm the computers.
Email harvesters normally tend to make automated programs to harvest mail addresses from the web.
But for an email harvester, receipt of mails that are sent using CC address boxes will be like giving bank locker keys to a robber.
A typical email received by a recipient whose email address was entered by sender in the CC address box:
From: abc@gmail.com
To: bcd@gmail.com
CC: 123@yahoo.co.in, 234@gmail.com, 456@yahoo.com, 765@yahoo.com, xyz@rediff.com
I find this mail very interesting and thought of forwarding this to you……….
It will be a cake walk as he will add more email addresses to his kitty without any difficulty so that he can send spam to more persons and harm more computers.
But when BCC address box used the recipient will receive only the sender's email address apart from the content.
A typical email received by BCC recipient:
From: abc@gmail.com
To: bcd@gmail.com

I find this mail very interesting and thought of forwarding this to you……….
So, if we use TO CC and BCC address boxes prudently by understanding the functional difference between them, it  will be great help that we do to our friends and their friends by safeguarding them from spam, virus threat etc.

Courtesy : http://www.gconnect.in/

Sunday, January 9, 2011

What is "autorun.inf" ?

While opening some optical drives (CDs) or pen drives you might have noticed that they contain autorun.inf file in it. Some people assume that it is some Virus/Malware which might infect their computer. But actually autorun.inf is just a script for invoking any event when some CD or Pen Drive is Inserted in PC. This feature is actually a part of shell32.dll.

You can set your own custom icon and your own custom file to start when media is inserted in computer. If you are a geek, then you can accomplish much more and impress your friends with some smart autorun scripts while burning CDs for them!


A sample of autorun.inf file looks like as shown below:
[autorun]
open=autorun.exe
icon=autorun.ico
label= My Thumb Drive(98XXXXXXXX)

Taking above examples I’ll explain functions of commands here-

Open – Specifies which file to start when media is Inserted.
Icon – Specifies the Icon to appear in Windows explorer
Label – The Volume of Drive to Appear in Window Explorer
If you are lazy at writing this codes you can try a free tool, Autorun.inf Maker.

You can bypass events written in autorun.inf by pressing shift key while inserting Pen Drive or CD. This is useful when you are unsure about what Pen Drive or CD might contain. However, I recommend you to use some good antivirus like AVG or Avast which takes less load on system and detects any unwanted threats. There is also an antivirus Program which is made for this purpose only which is mentioned here.

Alasan Memilih Bergabung di Pulsagram Allowances Announcements APLIKASI HP APLIKASI PC Banking bisnis internet BISNIS ONLINE BOLA BSNL Business Cara Buat Akun Liberty Reserve (LR) Cara Daftar Di Neobux Cara kerja Copy Paste Cara mendapatkan uang dari duitbux Cara Mendapatkan Uang dari Facebook Melalui Like To Cash Cara Mudah Cari Dollar Via Donkeymails Cara mudah dapat uang melalui internet dengan Dollarsincome CEA CGHS Computer Guidelines Customer Care dapat dollar gratis Dollar Dari Clicksense Dollar Dari Neobux dollar gratis DOP News DOP Orders DOPT Orders DOWNLOAD Education Employees News Employment News Entertainments Events Exam / Result Exam / Syllabus FACEBOOK FAQ For System Administrators Forms GDS General Informations General Knowledge GOVT Orders Guidelines Hardwares Health Tips Holiday Home Honorarium / Incentives Income Tax INFO KITA Info Lowongan Kerja Internet Tips IPO JOB COPAS Jual KERJA COPY PASTE Kerja Sampingan Kode Bank Indonesia Latest Software Updates Leave Rules Lowongan kerja aman Lowongan kerja copy paste LOWONGAN KERJA ONLINE LTC MACP Mails MASTER BURUNG Membuat Account PayPal Menaikkan atau menurunkan berat badan dengan Herbalife Menghasilkan Uang dari PTC Lokal Wisbux Mobile Tips National Pension System (NPS) Network Trouble shooting News Obat Pemutih Gigi Membuat Gigi Putih Berseri Pay Commission Pension Persmin Pie Susu Bali Paling Enak dan Asli Yah Merek Kami... PLI and RPLI PointOfSale Postal Informations Postal Savings Schemes Printer Trouble shooting Printing Tips Project Arrow ptc terpercaya Questions / Answers Railway Recovery Tips Registry Tips Registry Tools Reimbursement rental mobil di surabaya RMS Rulings SanchayPost Savings Scheme SB Orders SBCO Security Guidelines Security Tips sewa mobil di surabaya Software Tips Softwares SQL Staffs and Welfare Tanya - Jawab Technology TEMPLATE Testimoni Tips and Tricks TN - தமிழ்நாடு Tools Training Transfer / Postings Trouble shooting UnCategorized Union News Useful Softwares Utilities Verifikasi PayPal tanpa Credit Card Virus Solutions Websites windows 7 Windows Server Windows Tips Windows Vista wootekh biolo slimming capsule wsc biolo world slimming capsule biolo