Tuesday, 31 March 2015

How to detect keylogger and remove it from your computer

System Protecting Tricks Steps to remove or detect keylogger from your computer You should trace the behavior of you PC in order to find the common virus symptoms because the keylogger symptoms have much in common with the symptoms of other computer infections. We can refer slow computer performance, new icons on your desktop or in tray, network activity and unexpected pop-ups to these symptoms. Also you can notice that the text that you type can appear with little delay – this is the direct symptom that will help you in keystroke logger detection. Open Task Manager in order to end the process of the installed keylogger. You should know that not every keylogger can be found in Task Manager. Many of them hide their traces....

Thousands of Hacked Uber Accounts Selling on Dark Web for $1

$US1 may be a very little amount, but it is enough to buy you a stolen Uber account and free car rides around the city. Two separate vendors on AlphaBay, a relatively new Dark Web marketplace launched in late 2014, are selling active Uber accounts with usernames and passwords for $1 each, Motherboard reports. Once purchased, these active Uber accounts let you order up rides using the payment information provided on the file. Additionally, other sensitive information that comes with the purchase includes partial credit card data (the last four digits and expiration date), trip history, email addresses, phone numbers, and location information of users' home and work addresses. Over on AlphaBay market, a vendor identified...

Monday, 30 March 2015

How to Automatically Clear Data When You Quit Your Browser

Most web browsers do save your browsing data and they keep this data with them until you manually delete it. This data includes the cookies placed by various websites, cache files, form data, and so on. In most cases, this can be useful as it allows you to check out your history and revisit the sites that you have visited last week. However, if you are sharing your computer (or browser) with others and you don’t want others to find out which sites you have been surfing, you may want to set an action that automatically clears data when you quit your browser. Here’s how you can get your Google Chrome and/or Mozilla Firefox to do that. Automatically Clear Data in Google Chrome Unfortunately, Chrome doesn’t have an option to clear all the...

How to Enable Background Playback in YouTube for Android

Not only is YouTube full of videos that you can enjoy watching in your spare time on your devices, it has got some really great music tracks as well. When you are working or chatting with your friends, you can listen to these music tracks and keep your ears busy. One of the issues doing so is that the video, along with audio, stops playing as soon as you move away from the YouTube app on your Android device. For instance, if you are playing a video in YouTube on your Android device and you move to, say an email app, the video will stop playing. So how can you keep the video playing when you move off from the YouTube app? Well, there’s a way to do that. An Xposed module called YouTube Background Playback allows you to keep your videos playing...

Sunday, 29 March 2015

How to Cancel Scheduled CHKDSK Operations in Windows

CHKDSK is one of the important command line utilities that is designed to repair errors that usually appear in the hard disk drive. In Windows you can run the chkdsk command manually by simply entering the command chkdsk in the elevated command prompt. Since chkdsk cannot check for the errors while the system is still running, Windows configures it to run when you boot your system the next time.The time to correct the errors in the next boot session will totally depend on the number of errors and the severity of the errors you have on the hard disk. But if you don’t want Windows to take its time when you next boot into your system, here is how you can cancel scheduled disk error checking in Windows. Cancel CHKDSK Using...

Have an Insecure Wireless Router? Here’s How to Lock It

Although wireless routers are a blessing for Internet users, they create a plethora of risks if they are left unlocked. In addition to having a slower connection, individuals with malicious intentions can easily gain access to your network when it is not secured.In order to ensure you are safeguarding your computer and Internet activity from unwanted guests, it is necessary to use the following tips to lock down your insecure wireless router sooner rather than later. Set Your Approved Devices List An easy way to boost security of your wireless router is to establish (and maintain) a list of devices that are allowed to access your network. Your mobile phone, tablet, and laptop have unique MAC addresses that can be used to allow access,...

Simple Q::-Computer ports explained| How many ports are there ?

Many of computer users have heard terms like USB, HDMI port, firewire, RJ 45 but only a few know about them,  in this post we will see how to identify the different ports and understand which devices use which plugs and ports.Computers come full of holes (ports) where every port has its own use. These ports change from time to time and we need to upgrade them accordingly. To keep in track with latest technology, it is important to know the basics about these ports. How many ports are there   1) USB   Universal Serial Bus port is a small rectangular port  that comes with every computer. A single USB port can be used to connect up to 127 devices such as mouse, modem, keyboard or external hard disk. ...

Page 1 of 8512345Next
Related Posts Plugin for WordPress, Blogger...
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
TRICKS AND TIPS CREATED BY SUSHIL UPADHYAY| Grants for single moms