If you know some simple and easy-to-use methods to check that if your computer has been hacked you can confidently work online or visit any site without much worrying about your data privacy. The good news is that there are some simple ways to check that if your system has been hacked, which works well in most of the cases.At first you need to know the ways that can be used to access your PC, from a perpetrator’s perspective. A person can enter your computer directly in your absence or he can use the Internet or network connection to connect to your system.Before reading the following tips, make sure if any of the access route to your system was vulnerable.If your answer is yes, then there is a possibility that your computer might be compromised.Take a look at the following tips to check if anyone is secretively controlling your computer. [Read more…]
When you write a simple program, for example, to print user name with greetings. For this program to run you assign character string 38 in the following way
Char name (38)
Here “name” is the variable name. The above code specifies that you name or users’ input would not be more than 38 characters long because you have already assigned only 38 bit of data into the buffer. So, buffer overflow is such type of attack where the buffer memory is bombarded with more data than it can actually handle. [Read more…]
The major threats a computer user may expect are – the damage of his stored data or software and stealing of confidential information. A computer can get infected with malicious programs like virus, Trojan, crimeware, spyware, malware or anything else, but the main challenge in front of you is to keep your all the data safe and also to keep your confidential information private while you are online. Before you going online, have you ever thought that your every keystrokes is being tracked by a small code hidden in your laptop or your every online transaction with credit card are being screen shots by a spy software and sending all those confidential data to a cyber criminal sitting back miles away from your town. A malicious code even open a secret door (backdoor) to a rouge person to enter your computer when you go online. As you know that, every disease has its treatment, the same way every malicious code can be identified and tracked before it because any damage to your computer and it can only be done once you have Internet security or at least an updated antivirus solution.
Therefore, a computer user need to be concerned with safety and privacy of all his logical assents-software, database, emails, operations system. In addition, the good news is an average user can be quite efficient in keeping his computing environment safe and sound, if he follow a few guidelines and maintains a few instructions on regular basis. The following are very important steps that you may follow on regular basis and can ensure a great level of computer safety.
- Use Internet security solutions or at least keep good antivirus software
- Always keep updated your antivirus and Internet security software. Though this sounds like a very ordinary task, yet it is one of the most important tasks that many forget to do regularly. It is advisable to keep your antivirus software in auto-update mode.
- Keep your operating system updated. For example if you are Windows user then , right click on “My Computer”, select “properties” and then select “Automatic Updates” tab, click on “Automatic and then click on the “apply button” [Read more…]