Posts

Showing posts from May, 2019

How to Get Rid of 5 of the Most Dangerous Android Viruses 📱

How to Get Rid of 5 of the Most Dangerous Android Viruses   The virus is such kind of infectious or malware content in the system of any computing device or smart device that can turn out the whole behavior of the system go in the wrong way. This can also harm up to the hardware of the device too but only if the type of virus is extremely dangerous, and this is possible although it happens very rarely. Android is one of the most stable OS which is said to be the safest configuration from the virus attacks and most probably the users of Android does not pay any chance for Antivirus software as they never get any contact with any form of virus related issues. Although rare still there are some very dangerous viruses that can harm up to the Android. 2️⃣ Schedun 💯 A well known android malware that can cause your Android to root itself automatically without the user being known of that and then it makes up the pathway for the live streaming of the Ads all here and there. You ...

🏦Secure Banking Tips🏦💸💳

Image
Cases Tips Banking Security Tips Mobile Security – Do’s and Dont’s Password protect the mobile phone and never give your mobile phone to anyone. Choose a strong password to keep your account and data safe. Change your mobile PIN regularly at least once in every 60 days. Report a lost or stolen phone immediately to the Airtel Payments Bank, mobile service providers (Airtel / Vodafone / Idea/jio etc.) and law enforcement authorities. Use anti-virus, anti-spyware and personal firewalls and keep them updating regularly. Use licensed software. Software purchased from untrustworthy sources could have virus or trojans that could corrupt your files and reveal your confidential data. Don’t store sensitive information such as credit card details, mobile banking password and user ID on your phone Be cautious while accepting offers such as caller tunes or dialer tunes or open/download emails or attachments from known or unknown sources Be cautious while using Bluetooth in public...

How to use Digilocker

Image
                  Digilocker Digital locker is a facility that has been launched under Digital India scheme for  properly  organising & storing the documents of a citizen. It has been introduced by the Government of India to enable to keep essential certificates or documents of an individual for different purpose and for verification  of  sharing of the documents With the government organization or other entities as  & when  required. Every citizen has some or other certificates or license Which are required to be shown for Different purpose at many points of life.Such documents are to be kept very cautiously as they pertain to self-identity of a person. Such documents must be kept safe and have to be carried and produced or shown many a times, To different entities. Under digilocker facility, the copy of such documents can be uploaded and kept in a safe digital box and can be accessed from a...

What should you do with your phone or not?

Image
Important safety information Read all the safety information below before using your device. Using unauthorized cables, power adapters, or batteries can cause fire, explosion, or pose other risks. Use only authorized accessories which are compatible with your device. Use this device within the temperature range of 0°C ~ 40°C, and store this device and its accessories within the temperature range of -20°C ~ 45°C. Using this device in the environments outside of this temperature range may damage the device. If your device is provided with a built-in battery, don’t attempt to replace the battery yourself to avoid damaging the battery or the device. Charge this device only with the included or authorized cable and power adapter. Using other adapters may cause fire, electric shock, and damage the device and the adapter. After charging is complete, disconnect the adapter from both the device and the power outlet. Do not charge the device longer than 12 hours. Do not attempt t...

WHAT IS.....?

🔰 Proxy Trojan 🔰 A proxy Trojan is a virus which hijacks and turns the host computer into a proxy server,part of a botnet,from which an attacker can stage anonymous activities and attacks. Thewhole point of a proxy Trojan is to hide the attacker,making it harder to trace the true origin of an attack since the attacks will look like they are coming from random and multiple directions because of the proxy bots. ➖  ➖ Ⓜ️COMPUTER WORMⓂ️ 🌀Like a virus, a worm is also a self-replicating program. It differs from a virus in that (a.) it propagates through computer networks without user intervention; and (b.) does not need to attach itself to an existing program. Nonetheless, many people use the terms "virus" and "worm" interchangeably to describe any self-propagating program.🌀 ➖➖ 🔰Social media optimization (SMO) 🔰 Ⓜ️Social media optimization (SMO)is the process of increasing the awareness of a product,brand or event by using a number of social media ou...

Ⓜ️How you can access the developer options in Android:Ⓜ️

Image
Ⓜ️How you can access the developer options in Android:Ⓜ️ 🌀Step 1: First open the Settings section and then click on System. Some phones may not have this option so they can simply proceed from the seconds step. Step 2: Now look for the About Phone option and click on it. Step 3: Find the Build Number(or custom os version) and tap on it exactly 7 times, no more no less. Step 4: After my seventh click, you will be asked to key in your password. Then a notification will show up stating that I’m already a developer. (Some device not required a password) Step 5: Then go back to the System tab and you’ll now see the Developer Options section. (Some device it's showing additional settings)  Step 6: At this point, you can tweak your smartphone as per your preferences.🌀

⚠️List of terms used in the field of hacking.⚠️

Image
🚩Adware − Adware is software designed to force pre-chosen ads to display on your system. 🚩Attack − An attack is an action that is done on a system to get its access and extract sensitive data. 🚩Back door − A back door, or trap door, is a hidden entry to a computing device or software that bypasses security measures, such as logins and password protections. 🚩Bot − A bot is a program that automates an action so that it can be done repeatedly at a much higher rate for a more sustained period than a human operator could do it. For example, sending HTTP, FTP or Telnet at a higher rate or calling script to create objects at a higher rate. 🚩Botnet − A botnet, also known as zombie army, is a group of computers controlled without their owners’ knowledge. Botnets are used to send spam or make denial of service attacks. 🚩Brute force attack − A brute force attack is an automated and the simplest kind of method to gain access to a system or website. It tries different combinatio...