SMART SCREEN

Windows Smart Screen is a reputation system for downloaded software. Smart Screen Application. Reputation was originally included in Microsoft Internet Explorer 9 but was moved into the core Windows 8 operating system to offer broader protection. When Windows Smart Screen is activated, an application downloaded from the Internet is compared to the Smart Screen database. … Read more

WINDOWS 8 SECURITY

PROTECTING THE CLIENT AGAINST THREATS Microsoft Windows 8 builds on the security features of Windows 7. It enables the enterprise to provide a secure and stable computing platform from which users can accomplish their tasks. Two primary areas are the focus of the Microsoft security approach. Those areas include the following: 1. Protect the client … Read more

WINDOWS 8 FEATURES

NEW FEATURES OF WINDOWS 8 Windows 8 focuses on users‘ lives. It is beautiful. Fast. Fluid. It‘s also perfect for a range of devices. This includes PCs, of course, but also compact, touch-enabled tablet PCs; lightweight laptops; and large, powerful all-in-one PCs with high-definition screens. Windows 8 is smooth and intuitive. Users have instant access … Read more

WINDOWS 7 & WINDOWS 8 SIMILARITIES

SIMILARITIES BETWEEN WINDOWS 7 & WINDOWS 8 Windows 8 is just an improvement of windows 7 features. But still there exists some points that are common in both & they are: Windows 8 uses the same management tools that you already use to support Windows 7 in your organization. The Windows 7 desktop features you … Read more

WINDOWS 8 INTRODUCTION

INTRODUCTION Windows 8 is the newest member of the Windows family, and everyone at Microsoft is very excited about it. Microsoft reimagined Windows 8 to reflect the way people work and play, the devices they want to use, and the explosion of social media. You might be tempted to think that Windows 8 simply is … Read more

CYBER LAWS AND IT ACTS

WHAT IS CYBER LAW? Cyber Law is the law governing cyber space. Cyber space is a very wide term and includes computers, networks, software, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc. It focuses on enhancing a jurisdiction‘s … Read more

DATA STEALING FROM E-MAIL

HOW TO STEAL DATA FROM AN E-MAIL? Social Engineering. Exploiting the Vulnerabilities in security. Keyloggers and browser monitoring. SOCIAL ENGINEERING- Social engineering is a collection of techniques used to manipulate people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery for information … Read more

MOBILE SAFEGUARDS AND SOLUTIONS

There are some solutions to secure our different types of mobile phones. Since new technologies are coming up we also need to be careful from our side to secure our mobile phones. ANDROID The most important steps you should take to sure your data is secure are: Keeping it private: The easiest way to keep … Read more

BLUETOOTH WEAKNESSES

ENCRYPTION The Bluetooth specification does not describe encryption, some manufacturers produce devices without encryption or the encryption mode is deactivated by factory setting. The E0 algorithm is used for Bluetooth encryption. The E0 encryption is a typical stream cipher. The plaintext is encrypted with XOR: plaintext XOR key-password. The cyclic redundancy check (CRC) checksum is … Read more

BLUETOOTH ATTACKS

BLUETOOTH ATTACKS ON MOBILE PHONES BLUESNARF: SNIFFING Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to a calendar, contact list, emails and text messages, and on some phones users can copy pictures and private videos. Currently available programs … Read more