• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Computer Era

  • Android
  • How to Guides
  • Tech News
  • gadgets
  • Featured
  • Telugu Site

Security

Passphrases instead of Passwords

June 1, 2016 by computerera


Password1

These days each and everyone will use passwords and PIN’s to unlock several accounts like mail accounts, internet banking, especially smartphones etc.,
Now just think once, is your password secure ? Definitely we should check whether its safe or not. But for some people will use different validation processes, here is the tips why we recommend Passcodes and Passphrases.
What are Passcodes?

Passcodes are just a combination of characters and digits, which are generally longer that a normal password. So if your password is ComputerEra this you can translate into C0mput#rEr@2007!

ComputerEra is easy to guess. So changing the vowels and inserting numbers and special characters, adding the year this website was launched, finishing with punctuation is much more hard to guess. Make sure the word you choose is a difficult word, not the name of your spouse or name of your pet.
PINs

We depend on PINs (Personal Identification Numbers) while paying by credit or debit card. It is a four digit code which we have to set for contact less payments. Many of us set PIN to unlock the smartphones.
PIN1
It consists of the numbers from 0 to 9. Possibility if guessing your password is true if your password is 1234 or 0000 or any other similar popular number.
Hackers can easily guess the normal person password, your date of birth is one of the first thing. Hackers will try our four digit password with the help of a program runs through a multi digit system which might start with 0001, 0002 and continues similarly.

Normal Passwords

You will set a password with containing names of your pets, best friends, children, or your favorite bike and you might think that no one will ever guess right?

If a hacker knows enough details about you thy can guess what words you might use. Now your question is how a hacker will steal our details right? They could be stolen with the help of key-loggers.

If a hacker gains access to your email account, they can know all other accounts which you have by clicking “Forgot password”. So its very important to use a different and unique password to your email address.

Fingerprint
It is a intellectual way to secure your devices because finger prints are unique. It looks like impossible to copy someones fingerprints, but they can. Yes they can copy fingerprints too.
Where ever we go we leave a rich fingerprint marks on nay devices which we use. What if absolutely its a usable fingerprint ? A brilliant thief might easily examine those fingerprints and make use of to access your secrets.

fingerprint

So finally How to make Passphrases to secure your accounts.

Collapse a sentence by taking first letters of each word. For example lets say your Favorite Website Is ComputerERA by Sridhar Nallamothu, it can be converted into FWICESN. You may change ‘S’ to ‘$’ ‘O’ to ‘0’ ‘I’ to ‘!’ you may add launch year of website, 2007.

Finally your passphrase would be FWICESN2007. This looks strange and cannot be guess easily to others, but you can remember if you know the sentence.

You can insert some special characters too. Most of the people use ! or @, so why not we use a different special character in our passphrase ? I bet most of the people never uses a back-slash, so that’s always a better option.
Also you can mix upper and lower case characters. But make sure you start with first letter capitalized and rest lower-case for ease of remembrance. Why not add your name first letter and some special number to the phrase? So we take Vassanth as an example, add V to the phrase.

At last you will finally en up with an strong passphrase like…
FW!CE$N2OO7\v

Filed Under: How to Guides, Security Tagged With: Computer Security, security, technology

Beware of these Android Scams; Must Read

May 26, 2016 by computerera

Where there is a scope for technological evolution, there would generate the scope for vulnerabilities too. After android phones evolved rapidly in the span of few years, the spam and scams have also taken different shapes to hit the target victims. In this article, I’m going bring to your notice the top android scams that are being successful in looting the innocent victims.

 

 

1. Text message phishing scam

We have been seeing these message scams since the SMS times. These kind of messages have taken a new shape and are coming with the direct links imposting the legitimate sources like bank and insurance agencies. These messages try to gain the trust of the victim and gathers the personal details slowly.

Never respond to these kind of messages. Consult the bank or insurance office directly through phone or directly and inquire about it.

2. Imposter apps

Some hacking apps are available on the internet that deceive people with the logo of a legitimate app and HTTPS like connections. Take n example of the WhatsApp Gold that has been propagating through forwarded messages virally. These apps infect the phones with malware and theft the personal details.

3. Tech support scam

These are the scams of past two decades. These are also called as ‘high-tech’ scams. People call you claiming that they are from the company of the product that you are using and fear you with the false news that you computer is affected by some serious malware and can be deleted if not paid certain amount of money. These are the ransomware type scams that you should be careful about.

4. Recharge scams

These scams are the most popular and viral of all the scams. Apps claim to be providing the recharge amount of Rs.10 or 20 if it is shared on the groups in numbers. They end up with nothing at last just spreading the fake app news. These kind of scams might infect the phone in the background and induce the malware into it. Don’t get greedy over Rs.10 or 20 and risk your privacy and personal details for it.

These are the most famous and most viral scams that you should be careful about. Beware of the android scams that are spreading around you. Think trice before taking any action on those apps. Research on internet if possible and make a conclusion.

Be Safe online!

Filed Under: Android, Data Security, Security, Tech News Tagged With: online security, security, smartphone security, smartphones

Don’t Trust Whatsapp Gold Scam; it infects your phone

May 25, 2016 by computerera

whatsapp-gold-scam

A lot of spam messages with social engineering characteristics are circulating on Whatsapp. Few days back people believed Whatsapp Video calling spam and shared the malicious links without any further thinking about the security. Now another spam is widely circulating through Whatsapp i.e. “Whatsapp Golden Version” scam.

The scammer claims that the Whatsapp Gold Version was only available to the Top celebrities earlier, and the same Gold version with extra features is accessible to the limited set of the users right now. The Scammer grabs the Whatsapp users’ attention by promising exciting news features such as sending hundreds of photos at once, video calling, new emojis, and powerful security.

The entire scam hides in a simple text message with a hyperlink to the Whatsapp Gold version. Once the victim clicks the link, then it redirects to another malicious website which offers Whatsapp Gold download. Finally, the downloaded malware application steals your personal data from your phone.

So rethink twice before circulating such spam messages that redirect to unknown sites. There will be few people in our circle who don’t have sufficient technical knowledge. Sharing malicious content troubles their phones and valuable data.

Filed Under: Security Tagged With: android, malware, virus, whatsapp, whatsapp gold, whatsapp scam, whatsapp security

How to Recover Lost Office Files on Computer

May 24, 2016 by computerera

It would be very much frustrating if you lose any office files that you have been working on from the days or hours. If the corrupted or lost files are not recovered, it would waste a lot of your time working on the same files for the next few hours. It is now easy to recover lost office files on your computer without taking much efforts.

Is you are using the Microsoft Office to prepare your office documents, you an recover the files for some extent without using any other third party software. I’ll also be covering the recovery of office documents using the third party software and ultimate safe technique.

Recover-lost-office-files

MS Office 2013 and 2016 have a magical recovery feature that recover the recent changes in the documents. MS 2013 cannot recover the unsaved files but the 2016 version comes with that featured added.

1 Document Recovery

You can recover lost office files using the document recovery option in the MS Office 2016. Microsoft has added a feature that saves the unsaved documents in a temporary location as a backup. This backup can be accessed by going to Files > Manage Document > Recover Unsaved Documents.

2. Recover lost office files from temporary files

Go to file options and set the hidden files and folders option to show hidden files, folders and drives. This will show up the temporary files of the files that were not saved or lost with an extension .tmp. Find them and rename them to .Docx or .Doc based on the version of MS Office you have on your computer. When you are sure about the recovered files, revert back the setting to hie the hidden files or else your computer will look like  a trash can all unneeded information.

3. Use the Recycle bin

You might have checked the Recycle bin but might have overlooked in tension. Check the recycle bin clearly for the deleted office document files. Recycle bin can be your easy life saver.

4. Data Recovery Suite

7 Data Recovery Suite is a data recovery software that recovers the office documents, images, audio files and other type of files with a few clicks and option selections.

Watch the video tutorial of how to use the 7 Data Recovery Suite from here:

5. Always take backups

It is always take backups of the important files to the external drives. Because, Windows is not a stable operating system and it might not work the next time you boot the computer. There exist different factors for its instability but the bottom line is better not to depend on the computer to start up every time as good as last time.

If you are planning to buy an external hard disk after reading this post, consider WD Passport Ultra External Harddisk.

Hope this article helped you recover lost office files on your computer. Share this article to your friends if you like it.

Filed Under: Data Security, How to Guides, Security, Tech News Tagged With: Computer Security, Data Backup, Data Security, recovery

Security Issues Found in Lenovo PCs

May 21, 2016 by computerera

Bloatware is what companies are adding to the devices unpacked. Though it may promote the company’s useless applications that are purposelessly installed by default. The bloatware not only eat the memory on the device but also brings vulnerabilities along with them as per the observation kept on Lenovo PCs causing security issues.

The Lenovo computers that are shipped in between the years 2014 and 2015 have exposed a log of non-identifiable Pc information to the Lenovo resulting in the installing of OneKey Optimizer bloatware on the laptops in their first connection to the internet itself. There also found some other vulnerabilities that tend PC to clean install the OS with their malware activity.

malware-on-lenovo-pcs

The online security of Lenovo laptops has remained a question with the inclusion of unnecessary software on the computers. Many security issues of such behaviours that are found later didn’t follow the guidelines of anti-theft software.

Since the security systems are expelling the Lenovo’s bloatware and other suspicious behaviours of the computer, the company have stopped producing the machines like Service Engines for enterprises.

We have already seen a malware called Superfish Visual Discovery, a browser extension that recommends the cheaper alternatives to the product images on the webpage. it might sound useful but annoying when it overtakes the browser expereince.

Windows 8 operating system is some what constant in resisting these malware behaviours with its built-in Platform Binary Table feature.

However, if you using the Windows operating system that is lower than Windows 8, you should be aware of the unknown activity on the system. Think a while before buying the Lenovo computers.

Filed Under: Security Tagged With: Computer Security, online safety, security, Windows Security

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to Next Page »

Primary Sidebar

Recent Posts

  • Get Free Ebooks In A Really Easy Way From These Websites
  • How To Instantly Translate Text In Android Phones
  • Some Of The Excellent Screen Sharing And Remote Access Tools
  • How To Reduce Distracting Android Notifications
  • How To Protect An Android Device From Being Hacked

Copyright © 2023 · eleven40 Pro on Genesis Framework · WordPress · Log in