security

The best online antivirus

As a way to promote their products, most major antivirus developers offer a website where, without having to install software, users can access analysis and cleaning our PC online.

The operation is similar to common antivirus. But beware, the online antivirus does not replace the antivirus installed on the PC, which we should download, install and update. We only will be useful in case of problems and not being able to access our usual antivirus.

The best online antivirus

BitDefender

A fully functional antivirus with all the necessary elements to locate and remove viruses from your computer. It is able to perform a scan of memory, all files, folders and drives, in addition to boot sectors.

By default, BitDefender will try to disinfect the infected files. If disinfection fails, the infected files will be deleted without notice. However, you can change this setting for the program to take other action in the treatment of infected files.

The best online antivirus

If you wish, you can try this tool by clicking on this link.

Trend Micro HouseCall

Trend Micro HouseCall is an application to check if your computer was infected by a virus, spyware or other malware. HouseCall performs additional security checks to identify and fix vulnerabilities and to prevent reinfection.

The best online antivirus

If you wish, you can try this tool by clicking on this link.

ESET Online Scanner

The ESET Online Scanner is a free online service, simple and fast, which makes a virtual anti-tracking threats. This service makes through a web browser a detailed scan of the computer to identify viruses, spyware and other online threats, in addition to remove them.

Using this tool, users of other antivirus solutions may certify the confidence level of your current antivirus and see if it is really effective. This service eliminates malicious code without the need to uninstall the current antivirus and has the same ThreatSense technology (available in NOD32).

The best online antivirus

The ESET Online Scanner does not replace the real-time protection, seen that it is a low-demand tool that detects and removes malicious code that are already on your computer. To have the real and permanent protection time is needed to install an antivirus capable of ensuring the full protection of your computer and the entire network solution.

If you wish, you can try this tool by clicking on this link.

Panda Cloud Cleaner

Panda Cloud Cleaner is perhaps the most interesting and useful option of all mentioned in this article. This is due to its impressive detection rates, indeed, Panda is able to find threats where all other antivirus failed.

This is closely related to the called “collective intelligence”, an analysis model based on the results obtained from the virus scanning of the millions of computers that use the software. This ensures that the level of security that is achieved is extremely high, and also that is updated almost instantly.

The best online antivirus

Notably Panda Cloud Cleaner can be used as the default antivirus system, provided of course have access to the Internet.

If you wish, you can use Panda Cloud Cleaner for free by clicking on this link.

F-Secure Online Scanner

Online version of antivirus F-Secure. It is ideal for scanning computers without antivirus or outdated software, or even suspected of contamination with updated antivirus. Use it to see if your computer is infected, and disinfect it if necessary.

The best online antivirus

If you wish, you can try this tool by clicking on this link.

All links were checked. If anyone gives you trouble, please notify us at the bottom of this page.

What is Cryptography?

Cryptography is a technique to allow protect documents and data. It works through the use of numbers or codes, which allows us to hide secret information and data in government documents, business or even home, so that they can move without being able to be read by anyone except those people that knows the specific key.

Its use is as old as writing. The Romans used the cryptography codes to conceal their war plans of those people who should not know these plans. To decrypt the encrypted content of these documents, the person must read must know the key to decipher the hidden content.

What is cryptography

From the evolution of computers, cryptography was widely publicized, used and modified, and then established with mathematical algorithms. In addition to maintaining user security, cryptography preserves the integrity of the web, user authentication as well as the sender, recipient and present the message or access.

The keys can be:

Symmetrical: The use of certain algorithms to decrypt and encrypt (hide) documents. They are groups of different algorithms that relate to each other to keep confidential information connection.

What is cryptography

Asymmetrical: It is a mathematical formula that uses two keys, one public and one private. The public key is the one to which anyone can access, while the private key is one that only the person who receives it is able to decipher.

If you liked this page, you can share…

What is a firewall? How it works?

As we know, every computer connected to the Internet, or any other computer network, be they home networks or business networks, is likely to be the victim of an attack by a hacker.

The methodology generally used by the hacker is rake the network, sending data packets randomly in search of a online computer, and then look for a “hole” in the system security, which used to access the data that there is found.

What is a firewall

This threat is even greater if the computer is permanently connected to the Internet. The reasons are several:

  • The target PC can be connected without being constantly monitored
  • The target PC is generally connected using broadband
  • The target PC does not change (or very little) the IP address

Therefore, it is necessary that business networks and internet users that have a cable or DSL connection, protect the system from intrusions by installing a protection device. At this point comes in action the Firewall.

What is a firewall

What is a firewall?

A firewall basically is a system that protects a computer or computer network from intrusions coming from a third network, specifically from Internet.

The firewall is a system that allows filtering data packets that walk the network. It is a “narrow bridge” that filters at least traffic between internal and external network.

A firewall can be a program (software) or computer (hardware) that acts as an intermediary between the local network (or local computer) and one or more external networks.

Operating a Firewall system

A firewall system contains a set of predefined rules that allow:

  • Authorize a connection (allow)
  • Lock a connection (deny)
  • Redirect a connection request without informing the issuer (drop)

What is a firewall

All these rules can install a filtration method that depends from the security policy adopted by the organization. Two types of security policies that allow commonly distinguished:

  • Allow communications only explicitly authorized: “Everything that is not explicitly authorized is prohibited”.
  • Prevent any communication was explicitly prohibited.

The first method is the safest, but it requires a precise definition of the communication needs of the entire network.

What is a firewall

If you liked this page, you can share…

How to protect folders with a password without using software

We all agree that one of the most important points to consider to safeguard the data integrity and security on a PC, is to keep safe from prying eyes everything that is related to our work or our social life.

One of the best ways to keep safe and hidden information in a PC is undoubtedly through a password protection. This method will allow us to maintain for safekeeping any information that we consider private, avoiding the possibility that anyone else can interfere in our private affairs.

Protect folders without software

Nowadays on the market there are many applications that can be used for this purpose, but if we are one of those users who like to have full control of everything that happens on your computer building our own software, this is the perfect opportunity to implement the latter skill, because then we will provide the necessary instructions to create a batch file that will allow us to lock a folder and prevent access to strangers.

How to achieve it?

Step 1. Firstly, open Notepad and paste the following text:

@ECHO OFF

cls

title Private Folder

if EXIST “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}” goto UNLOCK

if NOT EXIST Private goto MDLOCKER

:CONFIRM

echo Confirm before locking the folder (Y/N).

set/p “cho=>”

if %cho%==S goto LOCK

if %cho%==s goto LOCK

if %cho%==n goto END

if %cho%==N goto END

echo Select the correct option.

goto CONFIRM

:LOCK

ren Private”Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”

attrib +h +s “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”

echo Locked folder.

goto End

:UNLOCK

echo Enter the password to unlock the folder.

set/p “pass=>”

if NOT %pass%==

IN THIS SPACE WRITE A PASSWORD goto FAIL

attrib -h -s “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”

ren “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}” Confidential

echo Folder successfully blocked.

goto End

:FAIL

echo The key does not match! Enter the password again.

goto end

:MDLOCKER

md Private

echo The Private folder is created successfully.

goto End

:End

Step 2. Save the resulting file as pass.bat

Step 3. To run this file we must double-click on it. At this point a folder named “Private” will be created.

Protect folders without software

Step 4. Move the files and documents we want to remain locked and hidden to this new folder and double click on the file “pass.bat”.

Step 5. In this point it will open instance a Windows Command Prompt asking for confirmation of the action. Press the “Y” key.

Step 6. Once down the “Y” key, the program will start acting blocking and hiding the contents of the Private folder.

Protect folders without software

Note that if we want to access the contents of the folder to edit them, simply double click on the file “pass.bat” again, which again ask the password to enable edit content freely.

Protect folders without software

NOTE: It is very important to mention that this type of execution batch files are easy to edit by anyone with a certain level of computer skills, so it is advisable to convert your code to an executable file types such as exe.

If you liked this page, you can share…

What is phone cloning?

Basically, a cloned cell phone is a device that was reprogrammed to transmit the device code and subscriber code. Thus, the fraudster uses the cloned device to make phone calls and the same are debited to the account holder of the line.

This type of activity is more widespread than we all think, and even we even be happening at this time without realizing it. That is why in this article we will find enough information to understand how a cloned phone works and what the dangers are.

Phone cloning

As the cloning is performed

Generally the cloning fraud happens when the user is outside the area of mobility of origin, i.e. when the roaming mode is in use and operating in analog mode.

The unscrupulous people get the code of the device or the user code through the illegal monitoring of the cell phone. Supposedly, every cell phone has a unique code. But, after cloning, there will be two cell phones with the same device code and the same subscriber code. In this condition, the system of the cellular service provider fails to distinguish between a cloned telephone and a cellular properly enabled.

Fortunately, nowadays, there are several sophisticated detection and prevention solutions against the fraud and cloning, the providers have sought to have these resources as part of their operations solutions.

Phone cloning

Clues to see if our phone was cloned

Detect a phone that has been cloned is simple, if the following signs are taken into consideration:

  • Difficulty completing calls generated
  • Frequent connection falls
  • Difficulties to call your mailbox
  • Calls received from strangers, national and international numbers
  • Amounts for the provision of services much higher than average

What can we do?

In the event that we have detected fraud or cloning, or in the case of lost or theft of phone, the user must immediately contact the provider and request the blocking of the line.

If the act was denounced by phone, the user must log the full name of the person who has attended, date, time, case number generated and in the case of direct complaint, obtain hard copy of it.

Phone cloning

Plus: Basic precautions

You should try to repair your cell phone in authorized representatives by manufacturers or service you trust. This will prevent any malicious person can manipulate the phone.

Make a monthly review of the bill to verify any calls made.

When he was outside the area of operation of the provider, in the manner known as roaming, the connections are considered as a long distance, national or international. Fraud occur in that situation, since they will not be discovered until the call records are exchanged between the providers, which will require some time. Therefore, we must have more rigorous calls control when we travel.

Phone cloning

When purchasing a cell phone, new or used phone, require tax invoice and verify the origin, empowerment and control billing information, including the serial number.

In the case of a used cell phone, certify if it is not stolen by consulting to the provider to check if the device is not in that state.

In addition to the charge for calls made by the fraudulent user, the cloning fraud in mobile systems can cause temporary loss to the subscriber service and, eventually, the need to program the cell phone with a new number.

If you liked this page, you can share…

What is a Cracker?

A hacker is a person who creates and modifies computer software and hardware to develop new functions or adapt old ones, without these changes are harmful to the user thereof.

Hackers and crackers are individuals in modern society who possess advanced knowledge in the area of ​​technology and computers, but the basic difference between them is that hackers only build things for good and crackers destroy, as they believe something is solely for personal.

What is a Cracker

The cracker, is considered a “virtual vandal”. This uses her knowledge to invade systems, deciphering codes and passwords of programs and encryption algorithms, either to run games without a CD-ROM, or generate a key false registration for a particular program, steal personal information, or commit other computer crimes.

Some try to make money selling the stolen information, others just do it for fame or fun. That is why we must be extremely cautious with handling the information we have stored in our PC, and properly protect it with a good security system.

Cracker is a term for malicious programmers and hackers who act with the aim of violating illegal or immoral cybernetic systems, being a term created in 1985 by hackers in defense of journalistic use of the term.

What is a Cracker

Some types of crackers

Crackers systems: Name for programmers and decoders that alter the content of a given program, for example, changing expiration dates of a program to make it work as if it were a legitimate copy.

Crackers Cryptography: term used for those who are engaged in breaking cryptography (cracking codes).

Phreaker: cracker specializing in telephony. It is known to make free calls, reprogram telephone exchanges, record conversations from other phones and then to hear the conversation in your own phone, etc.

What is a Cracker

Cyberpunk: They are vandals that destroy web pages or computerized systems. They destroy the work of others.

In case you feel unsure, do not wait, seek information on the Internet or with people who are dedicated to computer security. This will allow store data on your PC with enough security to allow you to be calm.