Skip to main content

Posts

Showing posts from May, 2014

Don't open short URLs if you get from unknown / un-trusted sources!

Many of us on internet have already came across short URLS/links that when clicked take it actual webpage. In many cases you would have wondered what this link is and where is it going to take me?  e.g. http://goo.gl/dFr2Xp which point to my another blog article.



What are short URLs?  URL shortening is technique used on internet to shorten the long URL/link to a smaller one and that redirects to actual URL when clicked. Its very useful in many cases, e.g. for twitter wherein message length is small and you wish to share a link.  Or you bought a book and it has website references using short URLs.
Long URLs are the way websites are developed and needs extra descriptive parameters and values that needs to be passed. E.g. see URL for this blog above, its the way blogger creates a link based on blog title. By shortening URLs, it becomes easy to pass on and type without errors

Advantages it brings in:
Short in nature and easy to type in from non-digital media (books, billboards, banners, p…

10 Ways your computer can get infected by viruses and how to avoid that

Getting infected by Virus on your laptop/desktop is easy as you read below. There is no one good way to be protected against all of them and thus you need to be cautious enough to keep your data and laptop secure. On other hand you don't need to be super paranoid or require geeky skills to be protected - just be aware about your actions and apply common sense.


1. USB/Pen-Drive:  The biggest reason to get infected is using extensively using USB/Pen drives to share data across multiple machines. This is the most exploited method use by viruses to spread and autorun on machines when inserted.

This is not restraned only to USB/Pen-drive, but all devices that exposes USB interface to connect to computer. E.g Camera which provides USB to copy photos/videos to your computer, or your mobile phones to copy music/files, Kindle to copy books and external hard-disk that host huge data.

Any USB/Pen-drive when connected to computer auto-runs set of files and viruses gets the entry point into co…

Know the unknown phone caller with TrueCaller

You got a phone call from unknown number and you wonder who the person is. A very common scenario for all of us; with marketing calls on rise you never know if its sales call or important call that you should be attending. You wish to keep your phone silent and block all unwanted calls? Solution is to use TrueCaller app (Android/iPhone).




Know who called you: 
TrueCaller maintains a huge database of contacts and help your display name and phone number of people who called you, even if that contact is not in your phone book.

Truecaller integrates with phone-call to show name and number of person if its unknown and helps you decide to receive the call or reject it.

In case you get a miss-call from unknown number, TrueCaller show you name/number of this caller. You don't need to return a call or text back to know who the person is.



How does TrueCaller gets this data: 
As per TrueCaller, they get it from public sources, yellow pages, people who wish to submit info about people from wh…

Be Bond online - Privacy on public network & computers

Browsing online brings in privacy and security issues. Browsing on public network or public computer, brings in higher level of privacy issues. What you browse, emails you send/receive , what you chat, your username/passwords all can be known to others by going online on public network/computer. Of course you don’t want all these to be known by others and used against you. So don’t use public network or public computers at all?



Solution is to use "Tails Linux" operating system running on your USB drive(Laptop/Desktop). Its that easy. Tails(The Amnesic Incognitivo Live System) is a Linux distribution crafted for privacy and security. Its built on free and open source software that everyone can use. Tails Linux gives privacy to anyone anywhere.

Tails Linux is around five year old and built on top of Debian Linux which itself is known for its high security standards. Purpose of Tails is to provide ready to use Operating system for people which is secure out-of-the box. Below …

2 Important settings for your Wi-Fi router

Wi-Fi has been successful due to its ease of setup, speed it provides and area it covers. Its perfect for home usage and most of us enjoy that daily. Various network devices (Smartphone, Kindle, Mac, laptops, tablets, XBOX) are Wi-Fi enabled and we connect them happily to Wi-Fi router to get internet access.



Wi-Fi however comes with two security issues. Wireless nature of Wi-Fi can hide all the security holes that a Wi-Fi router has opened up behind the scene.

Here are two must have settings for Wi-Fi router - 


Wi-Fi network password - That encrypts all data going from your device to Wi-Fi router and no body around can sniff what goes on wireless. Wi-Fi router password - This is the password that you use to login to Wi-Fi router to configure using web interface. This is the point which is most forgotten about and can cause major security issues.  

1. Wi-Fi network password set to WPA2: With newer Wi-Fi routers, it comes in with unique password setup that you have to use on smartphone t…

5 Reason to use Linux on Pen Drive

By now you would have heard about Linux Operating system (OS), (if not then do a quick read here).  Open source and free nature of Linux has given birth to many Linux distribution, each catered for different reason.

Linux has matured, stabilized and grown so much that its the most used operating system in world now. Huge number of servers has Linux, Your TV, setup-box, Washing machine, Wi-Fi router, Android, Car, Camera, Flight entertainment system, and many more system run Linux under the hood. This is all capable due to building blocks that open-source and Linux has provide for developers.

This blog talks about customizing Linux and installing it on Pen Drive and using it for various reasons. If you are new to Linux then you will have to read some more articles around Linux and give a try to install and run couple of Linux distros. You will learn lot in the process and know how system works. If you are Intermediate/geek then lot of things below will come easy to understand and work…

Password - The weakest factor online

Passwords has been a proven way to protect your account and keep your info secure and private.  Passwords are common and we do use it everyday. Access emails, your system,  Facebook, unlocking your phone, access bank online,  and many more. An average of 10 passwords are used by any individual (like you) everyday as per reports. 
With internet and the number of things you can do online, password has been a common practice. To play a game or post review, you need an account and thus the password. Concept of an account has been strongly developed in internet so that you can log back in anytime and continue to access the information back where you left. An account maps your work, activity on that website which can be saved and later referred back. Now that there is data associated with you account, websites wants to protect users data and thus the password which forms the easies way to authenticate a user. 
Hackers and malware are on their peek and always looking for access to your account …