Skip to main content

Free Stuff

Best Security Tips

After users repeatedly asking me about the security ways of avoiding data theft and sometimes identity theft too, i am writing this article on FRIENDSHIP DAY and dedicating to all my friends.


Disable Remote Registry Editing

Only you should be editing your Windows registry, so make sure this service is disabled by clicking Start, Run, and then typing "services.msc." Scroll down to Remote Registry and make sure the service is stopped, and then set it to either manual or disable.


Lock It Down

It's always a good idea to lock your PC if strangers are nearby and you step away for a few minutes. Just press Windows key+L to lock your PC. Alternatively, you can set your screensaver (via the Screensaver tab in Display Settings under Control Panel) to require a password if it's deactivated by checking the box in "Settings" that says "On resume, password protect."


Prevent Phishing Attacks

Protect yourself from identity theft and phishing attacks by using the the latest versions of Firefox, Internet Explorer, and Opera. These browsers include protection that double-checks URLs against a blacklist, and will notify you if you're about to visit a known phishing site.


Keep Your Software Up to Date

Hackers and crackers love to take advantage of exploits found in software, which causes the developers to release a patch to plug up the holes. Therefore, it's imperative you not only enable Windows Update but also download the latest version of any software on your system, especially your Web browser and antivirus program.


Be Wary of P2P Files

Virus makers love peer-to-peer file-sharing services. They name their virus "Angelina Jolie Wallpapers" or something similar and upload it. Then millions of people download it, launch it, and wonder why their computers are infested with viruses. Download with caution, and always use antivirus software. If you need an effective, free antivirus solution, we recommend AVG Free.


Wipe the Drive Before Donating Your Old Computer

If you are getting rid of a hard drive and want to render all or some of its data unrecoverable, you have two options. You can download Eraser to securely wipe any file or folder, and you can use Darik's Boot and Nuke SE (DBAN) to write over the entire drive. To use DBAN, download it and burn it as an ISO disc, then boot from it. It will provide you with instructions on the welcome screen.


Encrypt Sensitive Files

If you want to encrypt sensitive data, you can buy a portable USB drive with built-in encryption like the CMS ABS-Secure Encrypted Backup System, but if you just want to protect a specific folder or group of files, we recommend Truecrypt, which is free. It encrypts a custom-sized volume with 256-bit AES encryption, so it's extremely secure.


Verify Your Backups

Many people have a "set it and forget it" mindset when it comes to backups. Even after you establish a regimen, however, it's critical that you check the target folders periodically to ensure the proper files are being backed up. If not, re-configure your backup routine to make sure it's working properly.


Back Up Your Data

You must back up your data, period. If you have the means, we highly recommend an external USB drive like the Maxtor OneTouch 4 Plus. If you already have an extra drive in your system—but just need some good backup software—try the free version of 2BrightSpark's Syncback, which is sublimely easy to configure.


Turn Off Your PC During Lightning Storms

Even surge protectors can be overwhelmed during electrical storms, and we've seen the results first-hand—fried motherboards, processors, hard drives and power supplies. If you're experiencing a heavy-duty electrical storm, take our advice and unplug your computer from the wall socket—just in case. And buy a laptop to use until the crisis passes.


Enable S.M.A.R.T for Your Hard Drives

S.M.A.R.T (self-monitoring analysis and reporting technology) allows your drive to report whether it's about to fail, which can give you a heads-up to replace it. All the modern hard drives have it—go into your PC's BIOS (press Del or F2/F10 during bootup) and enable it.

U can also refer my previous blog about S.M.A.R.T here


Enable Extension Viewing

By default, Windows hides file extensions, and virus-makers exploit this feature by giving their executable program names like Popularsong.exe, which appears as a harmless audio file if you have extensions hidden. To enable extension viewing, open any folder and click Tools, Folder Options, and uncheck "Hide extensions for known file types."

Comments

Popular posts from this blog

History of HTML

I repeatedly hear from friends, all asking the basics of HTML. From today i am planning to start Basic HTML class free via Blog. Follow regularly and keep learning. We are here to help in each aspects. Origins:              In 1980, physicist Tim Berners-Lee, who was a contractor at CERN, proposed and prototyped ENQUIRE, a system for CERN researchers to use and share documents. In 1989, Berners-Lee wrote a memo proposing an Internet-based hypertext system. [ 2 ]  Berners-Lee specified HTML and wrote the browser and server software in the last part of 1990. In that year, Berners-Lee and CERN data systems engineer Robert Cailliau collaborated on a joint request for funding, but the project was not formally adopted by CERN. In his personal notes from 1990 he lists "some of the many areas in which hypertext is used" and puts an encyclopedia first. First Specifications:            The first publicly available description of HTML was a document called  HTML Tags , first me

Endhiran background

After completing Nayak: The Real Hero in 2001, Shankar announced a project with Kamal Haasan and Preity Zinta titled Robo , to be produced by the now-defunct production company Media Dreams . Despite, announcing the project, due to a lack of backing, the project was cancelled and Shankar began work on Boys . In 2005, Shankar made another project, Anniyan , this was mistaken to be the renamed title for Robot . In early 2007, Shankar stated that his next project would be produced by his production house, S Pictures for 3 months. Several websites claimed that he was set to take his maiden Telugu language film with Chiranjeevi , while others claimed that it was set to be with Mahesh Babu . Tabloid gossip columns reported that Ajith Kumar was considered for the film. Finally, in July 2007, Shahrukh Khan was signed on to be the male lead of Robot as well as the producer of the film. However, in October 2007, Shahrukh Khan and Shankar officially called off the project due to creative

New in ASUS Family of Phones

hen you hear about the word ASUS, you might think of processors, laptops and versatile tablets etc. To be little clear for the understanding, The New ear for smart phone industry have seen a verity and trend in phones. Each day new companies arise and bring out the best of them to the phone market and compete with the market giants like Apple, SAMSUNG and Microsoft.                                             Being a hard (even more harder) fan of new technology in PC, Laptop and mobiles, We daily go through lot of techies day to day lives. ASUS is one such emergent as it uses INTEL Atom Processor for their Zenfone series. Now A New technology is coming out from them.  A 3x OPTICAL ZOOM LENS CAMERA PHONE! It has a 3x optical zoom, but not one that’s inside an unsightly bulge like the Galaxy K Zoom.                           Instead, the Zenfone Zoom uses a system which sees two lenses slide horizontally beside the lens, producing extremely similar results, but taking up f