• X

    security

    Google Enhanced Security with 2 Step Verification

    February 10, 2011
    default-thumb

    Security has always been a concern to all the people who work online. Gmail being one of the most popular Free Email service comes with Google Enhances security in the form of 2 step verification. Security is major concern when we work online. We use different methods to keep ourselves secure like using a complex password, using antivirus, Trojan remover, HTTPS encryption and so on. Gmail went ahead by adding 2 step verification method to ...

    Continue Reading →

    What is Phishing and Phishing SafeGuard Methods

    December 2, 2010
    default-thumb

    Few days back I have read an article by Mahesh at shoutmeloud on how do hackers hack your passwords. This was a good informative post for every one which helps in protecting your self from getting your password hacked. I had got hacked when my orkut account was hacked by this method. After reading the article I was interested to write one of the many methods used in hacking. That’s phishing. There are many other ...

    Continue Reading →

    How do Hackers Hack your Passwords?

    November 28, 2010
    default-thumb

    Many of you might have been victims of your email accounts being hacked, or your Facebook password not working. This maybe because your password might have been hacked by the Hackers. One way to keep your self secure is by knowing how do hackers hack password and what all methods and software’s they generally use. By knowing how hackers can get into your account, you will be in better situation to understand what are the possible ...

    Continue Reading →

    How to Protect Your Online Identity

    September 24, 2010
    default-thumb

    This is guest post by TechMaish.com, you can also write for ShoutMeLoud, Read ShoutMeLoud guest blogging guidelines. One of the most sensitive issues one can ever come across and should be aware of his/her online identity, even a common lay man using the computer for the very first time should be aware of this sensitive detail at all times. Usually when we are browsing the net, we come across different and very attractive sites that ...

    Continue Reading →

    AVH First Defense Against Spam WordPress plugin

    September 10, 2010
    default-thumb

    Is your blog getting high traffic. Are you getting thousands of spammers on your wordpress blog ? You might be wondering after so many blogs on Akismet &  other antispam  plugins why I am writing this blog  ? Reason is to make  webmasters aware that these spammers not only throng your blog for spamming, but also eat up your server’s bandwidth & increase your CPU cycles. Moreover if  you keep track of how many visitors ...

    Continue Reading →

    Protect any PHP/MySQL site from Spambots and Hackbots

    August 16, 2010
    default-thumb

    Ash has already shared a useful WordPress tutorial earlier, if you have missed it, Do read: Supercharge your WordPress blog in one hour. If you run a PHP/MySQL site, forum, CMS, or blog and want to keep hackers and spambots from filling up your content with spammy posts or comments, then keep reading. If you like free solutions, then keep reading. ZB Block is a free script from the famous Zaphod, who has been active on Usenet ...

    Continue Reading →

    7 Essential WordPress Security Tips

    July 5, 2010
    wp-security

    For any website, a security strategy is a must. And as wordpress is the most popular open source software for blogging, it is a primary target of many malicious attacks. Wordpress has many protective plugins, functions and techniques to save you. When used in an aggregate, these tools can defend you from vicious activity, hacks, spam and other threats. Let us have a look to few of these techniques today.

    Continue Reading →

    Facebook: New Facebook Login Account Security Settings

    May 15, 2010
    default-thumb

    Facebook has recently announced on their official blog site its new system designed to protect and secure users account from any sort of suspicious activity. They have tighten their account security system to the extent that log-ins using any non registered devices or computers by its user will be ask for account verification process. Users will be alerted and will be ask for some verification question such as date of birth or to identify a ...

    Continue Reading →
    `