Wednesday, October 30, 2013

Files get corrupt by Hackers

An attacker may be able to insert malicious code into any file, including common file types that you would normally consider safe. These files may include documents created with word processing software, spreadsheets, or image files. After corrupting the file, an attacker may distribute it through email or post it to a website. Depending on the type of malicious code, you may infect your computer by just opening the file.

When corrupting files, attackers often take advantage of vulnerabilities that they discover in the software that is used to create or open the file. These vulnerabilities may allow attackers to insert and execute malicious scripts or code, and they are not always detected. Sometimes the vulnerability involves a combination of certain files or only affects certain versions of a software program.

What problems can malicious files cause?

There are various types of malicious code, including viruses, worms, and Trojan horses. However, the range of consequences varies even within these categories. The malicious code may be designed to perform one or more functions, including
Interfering with your computer's ability to process information by consuming memory or bandwidth
Installing, altering, or deleting files on your computer
Giving the attacker access to your computer
Using your computer to attack other computers

How can you protect yourself?

Use and maintain anti-virus software: Anti-virus software can often recognize and protect your computer against most known viruses, so you may be able to detect and remove the virus before it can do any damage. Because attackers are continually writing new viruses, it is important to keep your definitions up to date.

Use caution with email attachments: Do not open email attachments that you were not expecting, especially if they are from people you do not know. If you decide to open an email attachment, scan it for viruses first. Not only is it possible for attackers to "spoof" the source of an email message, but your legitimate contacts may unknowingly send you an infected file. If your email program automatically downloads and opens attachments, check your settings to see if you can disable this feature.

Be ware of downloadable files on websites: Avoid downloading files from sites that you do not trust. If you are getting the files from a supposedly secure site, look for a website certificate. If you do download a file from a website, consider saving it to your computer and manually scanning it for viruses before opening it.

Keep software up to date: Install software patches so that attackers cannot take advantage of known problems or vulnerabilities. Many operating systems offer automatic updates. If this option is available, you should enable it.

Take advantage of security settings: Check the security settings of your email client and your web browser. Apply the highest level of security available that still gives you the functionality you need.

Monday, October 28, 2013

Mail Account Security

This article describes the Login Activity feature from within the Yahoo! Account Manager that can show you what login activity your account has had over the past several days if you are suspicious that an unauthorized person may have broken into your account.

We know that there is much concern now as to how accounts, such as your Yahoo! account can be accessed by people not authorized to do so. Yahoo! is also concerned about this and has a new feature now that can give your key information about each login your Yahoo! account has had over the last several days. The feature is called "Login Activity" and here is how it works:
1.     Please go to the Yahoo! Account Info website ( http://account.yahoo.com ). 
Note: You may be asked to log in to your Yahoo! account.
2.     Towards the middle of the page under "Sign-in and Security," select View your recent login activity. You should now be able to see all the login activity for your account for the past few days.
3.     If you feel you need to go back further, then click View More towards the bottom of the page.
Once you get there, you'll see four columns:
·         Date/Time: This indicates the date and time the account was accessed.
·         Access Type: This is the method of access such as a browser (IE, Firefox, Chrome, etc..), a mobile device, or a Yahoo! product like Yahoo! Messenger.
·         Event type – This shows exactly how the login took place.
·         Location/ IP Address - This is actually a pull-down menu that allows you to select how you wish the physical location to be displayed. (Location is selected as the default.)
·         Location - Indicates the Country and State of the computer you logged in from.
·         IP Address - Indicates the Internet Protocol Address of the computer you logged in from.
These may be the signs that your account has been compromised:
·         You normally access from just one or two computers, but you see multiple geographic locations.
·         The Access Type column shows your account was accessed from a mobile device, but you never use mobile to access your account.
If you see anything here that looks suspicious to you, we recommend that you change your account password. It is the easiest way to prevent suspicious activity.
You can also create a Yahoo! sign-in seal to prevent such illegal activity such as spam and phishing.



Boost Computer Speed

Generally computers develop many problems when they used for long time. One of such problem is in computer speed because stack of temporary files and internet files, fragmented data on hard disk and too many start up programs. To improve the computer speed, just follow the steps:

Delete internet and temporary files
These files are created while you operate the computer and using internet, most of these files are not important to system. So if you keep these files for a long time they will create havoc in computer speed. To delete the files:

1.Open ‘My Computer’ and click right mouse button on ‘Local C Drive’
2.Click on ‘Properties’ in the shortcut menu.
3.In the ‘Properties’ window ‘General’ tab you will find a ‘Disk cleanup’ button, just press the ‘Disk Cleanup’ button.
4.Then it displays a message window click ‘OK’ button to continue deleting temporary files from computer.

Perform Disk Derangement
When a computer used for a long time the data on hard disk will be scattered and it makes the system to find data too much time. So to overcome this problem just do the steps:

1.Open ‘My Computer’ and click right mouse button on ‘Local C Drive’
2.Click on ‘Properties’ in the shortcut menu.
3.In the ‘Properties’ window select ‘Tools’ tab.
4.Click on ‘Defragment now’ button.

Then system starts defragmenting your computer, it may take time depending on the size of your hard disk and no. of files.

Note: Do this Disk Derangement once in 15 days.

Disable Programs in Start up
You might have installed too many programs on your computer and most of the software programs assign automatically to start up. In this case opening too many programs at start up the system get slow down and take more time than usual. To get rid of this problem follow the steps:

1.Type ‘MSCONFIG’ in the run command window or command prompt C:>MSCONFIG then press Enter key.
2.In ‘General’ tab select the third option ‘Selective Startup’.
3.Click mouse on ‘Startup’ tab and remove the selection of those unnecessary programs from the list.
4.Then click ‘Apply’ button and ‘OK’ button.

Now Restart your computer and check the difference, you will be happy now with the performance of your computer.