www.1001TopWords.com |
How To Avoid Hackers From Destroying Your Site?
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm ) have been hacked maliciously for the purpose of getting all my online sales and transferring it to his/her account. I've learned a valuable lesson that I would like to share with you so as to avoid becoming the next victim for this hacker. Steps to protect your web site: 1. Don't give out your username/password to anyone else. Even if it's your own net/web/system admin. Chances are he/she already knows it for he/she can just login as admin to the control panel and look at your password. 2. Change your password once in a while. It's better to write them down instead of saving them on a hard disk with insufficient firewall protection. 3. Don't use any word that can be found in dictionary or anything that signifies your birthdate, your street number to make it difficult for the hackers to guess. 4. Disable the "Forgot Password" utility on your site. This utility is very convenient to most end users, so fast that it gives out password so easy to for hackers to play with. 5. Make your password question / password answer (the one used to remind your forgotten password) difficult to guess. Treat it as a password. If anyone can just guess it, chances are hackers will start exploring with your account. 6. Make sure you are in constant contact with your web provider so they know your real identity and they can help you out as soon as there's hacking going on in your site. 7. Don't use any irc (internet relay chat) based chat system for it connects to ports 6660 to 6669. Hackers will exploit these ports and will upload trojan virus in your computer that can get your username/password on most of your accounts. If you are going to use any irc chat system, don't even use it without the aid of psybnc or bnc. For more details and pricing of this tool, email: sales@nabaza.com with Subject: psybnc or go to http://www.nabaza.com/support.htm and post your request there. 8. Don't trust any email (even if it's an email message coming from your trusted friend) message that has .exe file attachment. Chances are it came from a malicious programmer and this .exe file already spreadand infected/duplicated in all email addresses in your addressbook including yours. For antivirus information, go tohttp://www.nabaza.com/antivirus.htm Nabaza.comspecializes in building, designing, implementing, managing and maintaining corporate website to boost sales of your company. Email william@nabaza.com for information on functional, dynamic webpage designing with affordable packages. Subscribe for free! http://www.nabaza.com/subscribe.htm Rebrandable ebooks, software for free
|
RELATED ARTICLES
3 Things You Must Know About Spyware 1)Spyware is on your system. Like it or not, statistically speaking, you probably have spyware on your machine right now. There are so many malicious programs floating around out there that one or two have bound to have gotten past all of your security settings. McAfee and Norton Anti Virus are both excellent programs, but even they can be beaten by the determined spyware makers and distributors. One recent computer repair man said, close to 80% of the machines that he services have spyware on them. I believe it. Spyware can be sneaky and it can install quietly without your knowledge. Your system probably has spyware on it; make sure it doesn't corrupt your data files or worse. How to Protect Your Child from the Internet When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time. Backup and Save your business! There you are busily typing away on your PC or yourLaptop, and all of a sudden the strangest thing happens.The screen goes black, extinquished like a candle in thewind. Blogs as Safe Haven for Cybercriminals? To blog or not to blog? Well, why not? Lots of people like either to write or to read blogs -- sometimes both. The much-quoted survey by the Pew Internet & American Life Project, says 27 percent read blogs. 38 percent of all Internet users at least know what a blog is. The survey was made in November 2004 and estimated that 32 million Americans to be blog readers by the end of 2004. So now there must be much more blog readers and writers. Another Fine Mess! I'm in the Anti-Spyware business, and I'm doing a lot of advertising to promote my website, but here I am online and on the phone, giving my personal information to.....who? Strangers basically, Geez! The majority of identity thefts occur thru contractors employing people in entry-level jobs that have not been properly screened. Not even Hackers,Phishers or Dumpster Divers account for as many! The ideal location for a Identity stealer would be in a out sourced agency that fails to use adequate screening processes. An Open Letter From a So-called Stupid Someone recently told me, "You would have to be a stupid to lose your personal information." While I respectfully responded to this person in the moment, the comment has stuck with me. I present on Identity Theft all over the Western United States, and thought I would respond to this particular individual in writing. Data Security; Are Your Company Assets Really Secure? Is your data secure? Think again. Securing data is unlike any other corporate asset, and is likely the biggest challenge your company faces today. You may not see it, but almost all of your company's information is in digital form somewhere in the system. These assets are critical because they describe everything about you; your products, customers, strategies, finances, and your future. They might be in a database, protected by data-center security controls, but more often than not, these assets reside on desktops, laptops, home computers, and more importantly in email or on some form of mobile computing device. We have been counting on our firewall to provide protection, but it has been estimated that at least fifty percent of any given organization's information is in email, traveling through the insecure cyberspace of the Internet. Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is A week or so ago, I received an inquiry from a man in Indonesia about buying multiple copies of certain items on my website. I immediately suspected fraud, so I explained that I only had one piece of each. The man, who wrote impeccable English, said that was fine. I asked why he wanted to buy so much money's worth of jewelry (it was around $250). He said it was for his wife and daughters. Secure Your PC From Hackers, Viruses, and Trojans Viruses, Trojans and Spyware: Protecting yourself. Temporary Internet Files - the Good, the Bad, and the Ugly A little bit of time invested into learning about internet security can go a long way in preventing mishaps on your computer. Temporary internet files are not something we should be afraid of, but we should certainly be careful in how much we trust them and how we deal with them. Ransom Trojan Uses Cryptography for Malicious Purpose Every day millions of people go online to find information, to do business, to have a good time. Alas, some people go there to commit crimes as well. Though crimes have been committed via the Internet almost from its very launch, now cybercriminals have become dangerous as never before. Why you Must Secure your Digital Product and Thank You Web Page A couple of years back, I paid my dues the 'hard way'. Computer Viruses - How to Remove a Computer Virus from Your Computer Computer viruses infect millions of computers every day. Viruses can destroy data, steal important information, and even make a computer completely unusable. When a computer is infected by a virus it is imperative that the virus be removed as quickly as possible. How To Prevent Spyware Attacking Your Computer Spyware is software or hardware installed on a computerwithout a user's knowledge. It gathers information andreports it back to its source. It ties up bandwidth, slowsdown CPU speed and generally is a nuisance. Spyware Attacks! Windows Safe Mode is No Longer Safe Many of us have run into an annoying and time-consuming error. With your machine running goofey you decide to run a scan for trojans and spyware. Following the scan, which usually takes fourty minutes or longer if you scan the entire system, you are hit with the "access denied" error. Frustrating, for sure, but being the savvy computer user that you are you decide to boot to safe mode to take care of the issue. No spyware can load when booted to safe mode, right? Identity Theft ? Beware of Phishing Attacks! "Dear Bank of the West customer", the message begins. I've just received an e-mail message, purportedly from the security department at the Bank of the West. The message explains that certain features of my account have been suspended due to "suspicious activity" on my account. The message then provides a link that I can follow in order to fill out an online form confirming my identity. It's certainly nice that Bank of the West is worried about the status of my account. There's just one problem ? I don't have an account at Bank of the West. In fact, I've never even heard of Bank of the West. Dont Allow Hackers to Take Out Money from Your Bank Account If you know what is the 'Fishing' then it's very easyto understand the definition of 'Phishing'. Justreplace letter 'F' from the word Fishing with 'Ph'.Yes I am not joking. I mean it! Phishing is higher level of spam. Phishing is nothing but fishing in the sea of Internet. The victimized Net users are the fishes hooked by the hackers. Firewalls: What They Are And Why You MUST Have One! A firewall is a system or gateway that prevents unauthorized access to your computer or private network. It is usually the first line of defense in protecting your private information or data. A good firewall will help protect you from malicious attacks of spyware, adware, malware, worms, trojans, and hackers. Steganography ? The Art Of Deception & Concealment The Message Must Get Through-----------------------------The year is 300A.D., and you're part of a war machine unlike anything the world has ever seen. You are a field General for the Roman Empire and charged with assimilating yet another non-Roman culture. Your current mission; get tactical information you've collected in the field to an outpost one hundred miles away. The land between you and the outpost is treacherous and filled with enemy. The information you've collected is critical to the success of the current campaign and must reach the remote outpost intact. This will call for ingenious deception. What is Hacking? Are You a Hacker? WHAT IS HACKING? |
© Athifea Distribution LLC - 2013 |