Showing posts with label Computer Security. Show all posts
Showing posts with label Computer Security. Show all posts

Wednesday, January 8, 2014

Security Task Manager




Security Task Manager provides comprehensible information about programs and processes running on the computer. For each process it shows in addition in contrast with Windows Task-Manger:
  • file name and directory path
  • security risk rating
  • description
  • start time
  • CPU usage graph
  • program icon
  • contained hidden functions  e.g. keyboard monitoring, Browser supervision, manipulation
  • process type e.g. visible window, systray program, DLL, IE-Plugin, service
The Security Task Manager recognizes also virtual driver software, services, BHO or processes which hide from the Windows task manager.

Download demo here

Friday, January 3, 2014

GS.Enabler and other 3 malware

Today I found GS.Enabler listed in the Programs and Features, whereas I remembered it was like I never install this software. Then quickly find information using Google, on average, say it is ad-ware.


Screenshot 1: Programs and Features (Windows 7)



All four of the first software in the list are not installed by me.

I starting to remove all four of them. When you click on uninstall, the software is gone from the list without any message, but only  ss Supporter 1.80 issued a message saying "Sorry to see you leave."

I will keep an eye on this. If something weird happened, I will update this post.

Update on 8th Jan 2014

If you noticed from the image of Screenshot 1 above, the forth item (GreatsauVer) has been removed from my computer through  uninstall button, but it is reappeared today in my Program Files folders. Maybe it did not completely remove during uninstallation process.

Monday, November 12, 2012

What is hacking?



The word 'hacking' has several meanings, but in the context of ICT, which means breaking into computer systems.

Who are hackers?

Hackers (hackers) in the context of computer security refers to computer hackers involved in computer security and able to exploit the system or enter without permission through skills, tactics and detailed knowledge.

In common usage, "hacker" refers to a black hat hacker (malicious or criminal hacker). There are also ethical hackers (commonly called white hat) and hackers are ambiguous position (gray cap).

Why do hackers hacking?

Hackers may break into the system because of curiosity or to test the extent of their ability to overcome a defense system. But, mostly they invaded to access data that has a value.

For example, if a hacker enters your computer and steal financial information like your credit card numbers, or passwords to your bank account, they can use the information to make a purchase.

If a lot of information about you is stolen, hackers can use this to impersonate you on-line. They may apply for a new credit card, take a bank loan, buy a car, etc.. All in your name. This is known as identity theft.

Are computers can be protected from Hacking?

Just like in the real world, there is no guaranteed way to stop someone from intruding into a building (you can make it very difficult, but every security system has flaws), however, you can make it quite difficult to move and switch to hackers an easier target.

You should:

  • Use strong passwords to protect your user login account
  • Never disclose your password to anyone login
  • Put a firewall between your computer and any network
  • Disconnect from the network when you are not using them
  • Encrypt any sensitive information (just in case they get in)


Google
 
Related Posts Plugin for WordPress, Blogger...
Note: English is not my first language.