Tuesday, December 2, 2014
Security Tips By World's Most Wanted Hacker Kevin
4:31 AM
| Posted by
Unknown
|
Security Tips By World's Most Wanted Hacker Kevin Mitnick Kevin Mitnick came by his security expertise the hard way. In the 1990s, his electronic penetration of some of the biggest companies in the world made him a notorious tech boogieman, and ultimately landed him five years in prison. Now free and clear, Mitnick has reinvented himself as a computer security consultant and writer. He travels the world teaching organizations how to secure their information in a world of corporate spies and younger versions of himself. He took a break from his jet-setting to share some practical security tips. Clip them and stick them on your parents' refrigerator or your IT administrator's white board. Here is Top 10 list of steps you should take to protect your information and your computing resources from the bad boys and girls of cyberspace: • Back up everything! You are not invulnerable. Catastrophic data loss can happen to you -- one worm or Trojan is all it takes. • Choose passwords that are reasonably hard to guess -- don't just append a few numbers to a no-brainer. Always change default passwords. • Use an antivirus product like AVG or Norton, and set it to update daily. • Update your OS religiously and be vigilant in applying all security patches released by the software manufacturer. • Avoid hacker-bait apps like Internet Explorer and disable automatic scripting on your e-mail client. • Use encryption software like PGP (pretty good privacy) when sending sensitive e-mail. You can also use it to protect your entire hard drive. • Install a spyware detection app -- or even several. Programs that can be set to run frequently, like SpyCop, are ideal. • Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically. • Disable any system services you're not using, especially apps that could give others remote access to your computer (like Remote Desktop, RealVNC and NetBIOS). • Secure your wireless networks. At home, enable WPA (Wi-Fi protected access) with a password of at least 20 characters. Configure your laptop to connect in Infrastructure mode only, and don't add networks unless they use WPA. Today, Mitnick has been able to move past his role as a black hat hacker and become a productive member of society. He served five years, about 8 months of it in solitary confinement, and is now a computer security consultant, author and speaker.
Subscribe to:
Post Comments
(Atom)
Welcome to my Blog!
Bine ati venit pe blogul nostru.
Cand nu sunt pe blog calatorim!!!
When I'm not blogging, I'm traveling :-)
Email me atGuran
Search
Blogroll
© 2014 by Guran Cosmin.
You're welcome to link to this site or use a single image and brief description to link back to any post. Republishing posts in their entirety is prohibited without permission.
Pictures
Become a Fan
Find Us On Facebook
Contact Form
Video
720x90 AdSpace
Recent Videos
Movie
http://youtu.be/Yj0G5UdBJZw
guran. Powered by Blogger.
Wikipedia
Search results
Popular Posts
-
Tare !!!(guta mititel ) continuare
-
#unuro The Google Black Holes Code: inurl:"view.asp?page=" intext:"plymouth" >>Ok what this code does? So thi...
-
You can press these buttons on your keyboard to use Facebook faster. j , k — Scroll between News Feed stories p — Post a new status l — Li...
-
//// What is DNS ///// Did you know you could be connected to facebook.com – and see facebook.com in your web browser’s address bar – whil...
-
10 Free Keyloggers to monitor your Local PC or Laptop! Here is an exclusive list of top 10 free local keyloggers. However If you are plannin...
-
Your blog is your personal online diary which combines the text, images and other media, and links to other blogs, web p...
-
What is Role Of Cookie,types, uses, setting and Privacy Concerns About Cookies What is Role Of Cookie,types, uses, setting and Privacy Conce...
-
(5) KING OF HACKERS How to Lock Drive of Remote Windows 10/8/7 Victim PC https://www.youtube.com/watch?v=4CgNDXKXxVo Facebook fan page : htt...
-
What is a VPN and how does it work? A VPN or Virtual Private Network is a method used to add security and privacy to private and public ne...
-
(5) For Indians! Happy Diwali in Batch Style! :P ;)... - Legendary Hacking Learners For Indians! Happy Diwali in Batch Style! @echo off colo...
Followers
Contributors
Archive
-
▼
2014
(1156)
-
▼
December
(29)
- http://www.fakenamegenerator.com/
- FREE DOWNLOAD E-BOOKS
- http://youtu.be/pHJSEc3zU5E
- How To Trace Your Facebook Profile Visitors
- Steps to Unlock Android pattern lock:
- president to write a computer program
- Best Free Sites to find Any Softwares Serial Key 1...
- Make an Autorun Virus that Steals files as soon as...
- SQL
- AngryIPScanner is a very fast IP address
- CREATE A COOKIE LOGGER TO HACK ANY ACCOUNT
- How to convert Facebook Profile To a Facebook fan ...
- How to Change /Restore IMEI no on Android phones a...
- Retrieve Deleted Facebook Messages,
- HP DDOSER
- Penetrate setups first lesson:
- A hacker in tips 1-penetrating devices http://www....
- How To Hack Wifi Password with Android Hack wifi u...
- Ethical Hacking Course Part-10 Introductions to So...
- How to Easily Recover Deleted files from Windows P...
- How To Hide Media Files from Android Phone's Gallery
- In this post i will teach a simple trick or browse...
- Android Hacking tool Hack Code:
- Refer your friends to Goibibo app and earn 100 Rs ...
- How you Earn 50$ Daily from Url Shortning
- http://worldwideprogramers.blogspot.in/2014/10/how...
- Security Tips By World's Most Wanted Hacker Kevin
- How to build own Operating System.
- Circle around the moon, rain or snow soon
-
▼
December
(29)
0 comments:
Post a Comment