Showing posts with label Tech news. Show all posts
Showing posts with label Tech news. Show all posts

If you are a celebrity, you are vulnerable to hack

By // No comments:

celebrity, celebrity logo, celebrity account compromised
No doubt that celebrities are more talented , good looking and intelligent than us but they are damn vulnerable to hack. For example, lets take the Oscar winner Jennifer Lawrence , recently whose’ extremely private photos were leaked by hackers from the Apple’s cloud storage service. Celebrities are being targeted because their private data are extremely valuable in the underground markets as well as many hackers try to show their skills to the world.

Why Celebrities are vulnerable to hack? That’s what this topic is about. When we forget our password of some websites we try to recover them from the ‘forget Password’ option, and there we have two or three option two reset or retrieve our password , first by receiving a password rest link in our email id, secondly we have to enter the ‘one time password’ received on our cellphone else we have to answer the security questions.Skip the first two options and lets try to answer the security questions.  Most of the account’s security questions based on the followings :

  • The place where you were`
  • In which year you were born?
  • Your childhood nickname ?
  • Which High school did you attend?
  • Your Childhood best friend name?
  • Your birth year?




If you are a celebrity or a popular person then all the answers of the security questions are already out there around the internet . Turn on the Wikipedia pages you will get all the biographical information from the birth year to yearly life story. A celebrity has to face different questions which belongs to their personal life, likes dislikes, hobbies as well as career . Hit the search engines and it will retrieve all the information published on the online portal of news and entertainment channels .   Their social profiles also yells various internal information about their daily life activities which can be the key of the security questions.

Well, nothing is secured in internet but one should adopt latest security features which are availe by their service provider such as Dual authentication systems , fingerprint recognition system etc so that a hacker have to access the celebrity’s device or have to plant malware to see the one time password which is not impossible but a difficult task.

Story of cloud storage security

By // 4 comments:
keyhole, digital keyhole, internet security wallpaper

The recent phenomenon of compromising the cloud account of Hollywood stars and leaking their private pictures around the internet , has been the hottest topic from last few days. As this incident has tickled the medulla of website moderators , security analytics and cloud service provider  that what to do. Really it is a million dollar question “What to do? “   Because it is the matter about security and privacy of the users.

Yes we can do a lot of things , but there is an one strong point which everyone should know. “Nothing is 100% secured in the internet”  Not mine, not yours and nor even the geeks who designs security protocols .  Internet is the game of codes, hardware, connectivity and we users . The things we human knows to build , does also know to break it, If it is not possible by punctual manner then there are lots of hammering and destructive way to break it.

Understanding the cloud storage

Cloud storage service has been built to bring flexibility of data sharing and migration anytime and anywhere. Once you upload your data then you can retrieve it from anywhere in the world. You don’t have to carry your own storage device , you just need an computing device with an internet connectivity .

So, here I have a question, where does you upload your files?
Sorry, don’t get me wrong,  but I have to say this.  Point to the line above “you don’t have to carry your own storage device” . So you are uploading your data to someone else’ storage media isn’t it? Where you don’t have any idea and control other than accessing your files and configuring your account’s digital security.  You don’t know where the storage media is,  about the physical security in the data warehouse of cloud service provider and so on. Its like handing over your important things to someone else.

Is your cloud account secured?

cloud storage service, cloud security

Keeping the point in mind “Nothing is secured in the internet” . But there are lots of way by which we can prevent or extend the duration to crack the security . Almost every cloud service provider has multiple security option some of them are by default and few of them have to configure by the user itself.

Two step authentication is one of the most important security measures that should be adopted by everyone , for not only your could account but also for your email and social accounts. In dual step authentication , first you have to enter your primary password and then the server will send you a text with a code, that’s your secondary password.

Authenticate by generating code using your smartphones cloud apps.

Pincode : It is generally generated once during enabling this feature. You will need to remember this incase you have enabled dual step authentication but you don’t have your cellphone with you.

Security question : Never choose an security question and answer which are know by anyone other than you.

Enable the SSL encryption.  Many cloud service has SSL by default and few have to configure by the user itself that he wants SSL encryption or not.

Secure your computer first

computer security, localhost security, hacker eye

What is your primary computing device? Your laptop, desktop, tablet, iPad, or smartphone?  Do a proper maintenance of your device on a regular basis. Don’t keep the unusual applications and programs as it may bring security flaws.  Use a total security program consist of anti virus, anti malware, firewall , spam/phishing detection system etc. Do the updates of your operating system once in a month to get security patches .
Apart from these, spend your little more precious time over internet to learn about worms, malware, virus and information security threats . It will help you to deal with daily life phenomenon.

How is your smartphone?

Smartphone is one of the most important daily life gadgets , without it we feel like we are out of this living world isn’t it?
 Yes it is,  it has more secret information than your social id does and can be the target for your competitors and malicious hackers.  Never Jailbreak or root your smartphone if you want to keep it safe. Root and Jailbreak can break the security level of your smartphone and becomes vulnerable to information security threats.  Keep a security program in your smartphone , by which you can wife the storage remotely if you ever lose it.


Few lines from my opinion.
Cloud storage is great innovation and technology for this developing IT infrastructure of this world. You can backup your data for emergency purpose, you can share work and office documents with clients and workmates , and much more. But I don’t recommend it keep your extreme private data on cloud storage as cloud storage device are not managed by yourself . If it’s the matter for your extreme privacy and security then there is no safer storage device  in the world other than your own isolated hard drive.




Did you get bored? Sorry about this :)  please express your anger by dropping your comment below :) 

My dream phone a real smart

By // 2 comments:

If it is possible to grab the world in my hand , use the technology to most then  I will use my smartphone to do that. In the modern era of high end technologies we have reached much ahead that we may not have imagined a decade back . An innovative trend of the product of technologies is smartphone , in which we carry our world, connectivity, accessibility , entertainment and captures in our pocket.
I wish If I can enhance the power and features then it can do what others can not do and It will really change the way of our daily life activities. Smartphone are something on which we are very much dependent like accessing the internet when we are away from computer , enjoying movies , sports and other videos when we don’t have a television by our side, a handy tools to click pictures, and so on, and if we combine more features within it something which is really innovative. Read my wish list that I want to combine all these to form a real smartphone and with which the stuffs that I can do and others can’t’ . Follow me :

Artificial Intelligence


Call it Artificial Brain. In the smart world everyone want their device to work smartly , effectively and efficiently . I want my smartphone to have an Artificial Intelligence system or artificial brain that will work like machine and act like human.  It will have pre installed initial features and programs but it will also learn to stimulate with users , from interaction of humans like a small grown baby then each and every day it will learn something new and its’ functions will increase may be limit to infinity.  The ability to learn, think analytical and react according to changing condition will really bring blaze in smartphone and computing.
For example, if someone is calling and the user(receiver) is not near by the device then the device will receive the call itself and talk like its user and save the conversation for him/her.
If  I want to write something , I don’t have to speak loudly or type , I can just move my lips and I will detect what I want to speak.  Or it will detect the words just by moving my fingers on air from a distance etc and so on.



Smart processor
Obviously a smart device needs a very smart and powerful
processor that can handle high end task effectively and efficiently without any hindrance . A smart processor which is going to work with artificial brain should be biologically inspired  modelled like real life neurons which is capable of learning from the feedback of users. It should be fast enough to do multiple task at a same time at the same speed.
One common issue for smartphone processor is extreme usage of battery,  but the smart processor will consume very less power and conserve the rest for rest of the process in the device as well as the device will be enabled with multi source of power such as it will absorbe power from geothermal  heat, heat emitting from human body  and solar energy in such way that If it is consuming one source of energy it will automatically charge it’s battery cell from secondary and tertiary source of energy so that I do not have to worry about losing or charging my smartphone.



Smart display screen with holographic interface 



Indeed a smartphone without a smart screen is incomplete since touchscreen has replaced the traditional approach of input now it screen is only the primary output and input device for smartphones. We can enhance it more by including a holographic input and output. Holographic display will give more impressive output , explore into more depth  of the things, as well as diaphragmatic view will express more of the content beautifully  for high tech gaming  The interface will be much better, one need not have to use the small touch screen anymore to type , draw slide and zoom,  with the holographic interface one can change the resolution size of the interface according to his/her preference which will stand as much better and user-friendly input method .  We can move the images around, push them right onto the table, interact with the area above table and do many other manipulation using see-through and reach-through mist screen.one can have many screen instead have single small screen with minimal display.


Accessibility, Connectivity and security.

The internet has already minimized the distance between the people and countries ,  and no doubt there will be much improved and advance connectivity within next few years and compiling these advance network features with such smart device there will be much  connectivity and accessibility to our online world. We can explore much better , we can build a much secure access by the security and defence system of artificial intelligence , as it know what is harmful and what is beneficial for your device , it knows what is your confidential data.

One in all

We prefer laptop instead of desktop for portability, tablets and pads instead of laptop , we prefer more in portability, so why not all in just one small handy device ? if it has a powerful processor , artificial intelligence , holographic input and output , connectivity, accessibility then it is possible to have feature of advance computing and heavy tasking like we do in our desktop or laptop.  The processor and artificial intelligence will do the real tough job of computer, holographic interface will be the primary means of input and output ,  connectivity which will connect the device to world in all means , and the intelligence security will provide smart a authentication and accessibility as It know the human behaviour  it will provide much better defence from hackers and spammers .

So I don’t need to buy a big damn computer for normal desk job, I can easily create presentation,  edit multimedia files , computer added design ,text  documents from just a small handy smartphone laying on bed. Isn’t good?  Imagine the capabilities of a smartphone with these features , It will create dynamic change in computing ,  network and communication  .


This post has been written for IN SEARCH OF INCREDIBLE blogging contest held by ASUS at Indiblogger. Follow the link http://www.asus.com/campaign/zenfone/IN/



How to securely delete all files

By // 1 comment:

Are you planning to sell your smartphone, tablet, laptop? Then you should be aware about few important things about privacy and protection of your data. Every mobile devices has an internal memory and it may have lots of your personal photos, documents , videos and other important files.
What normally people do is “Factory reset” or “Format” by plugging into the computer .

But beware, if you are going to hand over your device the it may not the correct way to securely wipe your every data.  Anyone who have a few knowledge about software can easily recover your deleted data by using freely available data recovery tools like windows kernel and recuva until you overwrites the data randomly. So, don’t fall in the prey of blackmailing your privacy is in your hand .

But there are always an way to get out of the problems which I am going to tell you.

How to delete all files securely in Android ?
                      
                        


If you are not having PC then don’t worry a single apps will do all the required work. It is FILE SHERDDER which is available in playstore.  It claims to delete all your files securely in your android device, I am not sure which algorithm does it use to overwrite the data but I have tested in my Micromax Bolt A56 and it works pretty well and I liked this apps very much.
I tried to recover the deleted files using Forensic imaginer and what all I got is overwritten data , which is not an easy task for a normal person  to extract data and meta data from a over written file. Isn’t it?

How to delete all the files securely in windows?

In our daily life we do many random things like we give our pendrive/usb drive to our friends , we try to sell our laptop and so on. Have you deleted your files securely? It’s the same case like I told you above , any files is not securely deleted until it has been overwritten by random files.  So before you going to hand over your device please wipe your important data properly and this applies to all flash drive, external hdd,  SD card, cellphones , laptop and so on.
Here I  have mentioned few tools which will do all the work for you.

CC-CLEANER


Its an tool with a complete package and most commonly used utility software. It have the features to wipe internet history, cookies, seasons. It can delete the system memory dumps to free up spaces, it can also edit and delete the registry. Apart from this in the tool section there are more important tools like drive wiper with many overwriting phases such as 1 passes , 3 passes , 7 passes, 35 passes .
You can choose the 7 passes that is complex overwriting to wipe your data securely. I am in love with this software.
Download CC-CLEANER


EARESR


It’s a tool which has been developed only to securely delete your files and it does its’ work very well. I personally recommend you this tool if your only intention is to wipe your files . Its an user friendly, overwrite and delete the data using 7 passes and 3 passes method. Even you can add the files and folder and schedule it to delete the data on that  specific time.

Download Eraser  




Power of cloud computing

By // No comments:

Technologies has pulled the world into a modern era , where internet has become our primary source to connect around the globe. From last two decades internet has played a vital role to pull the mode of communication, data transfer and work in the most advance way as it possible.

You know, we have fully adopted the technologies for our daily life, and when our life changes then the mode of our requirement changes too. The emergence of new generation computers, smartphones, tablets has brought an evolution in computing and world wide web.  I think you are already using the cloud computing service if you are using web based mail services such as Hotmail, Gmail, Yahoo Mail etc, through which you can access the email services from any device having a internet connectivity and from anywhere in the world.

So, What is cloud computing?
Cloud computing is delivery of computer resources over internet rather than storing those resources in our own personal computers. Cloud service allows us to use the software and hardware resources that are managed by third parties (cloud service provider) at remote location.  We can use the cloud computing service over internet from any location. We can retrieve our data and information from anywhere in the world being connected with cloud service.
Imagine you are running a company where each and every employee need a computer system and some software installed in their allocated system and who have to purchase licenses for those software. If you manage your own centralized database for your company then , you need system administrators , high storage space, server maintenance ,system cooler,  security, uninterrupted power supply and so on. If there is a new updates in the server’s  software & system then the entire system workstations will go down until they don’t get supportive update packages. 

You are already using some cloud computing services such Gmail, Yahoo mail, Hotmail, Facebook,  online file hosting service etc, do you need any updates? Do you need to run them by burning your own electricity? Do you have a technical team to keep on eyes on these? Do you need security enhancement every month? Its NO, all it gets automatically and you don’t have to worry about anything. That’s the pros features of cloud computing.

So, what if instead of running your own system and servers , let the third party company host the applications, storage spaces , hardware and other services for you, then  you don’t  have to worry about security, upgrades & updates, technical team etc., you have to pay only for those things you will use as a monthly subscriptions, no extra charges, no maintenance and upgrade expenditures , you will receive upgrades automatically . The only thing you and your employees will need is a cloud computing interactive software , just log in and get started.
The cloud computing have almost every services from commercial apps, business apps, online  business and marketing systems , live collaboration system and much more. You can even demand a service from you cloud service providers.



The Power of cloud

I am in love with cloud computing because of its extensive features, the live collaborating system is amazing , especially when I am doing online study, its helps me to interact with my fellow mates and mentors   with hands on coding , sharing  and editing the same data at a once .
I feel   proud  that, I have achieved the certification of  Certified Android Developer and Certified HTML5 Developer through online mode and practicals on cloud platform. Its fun when more than one people work on the same file, its makes me feel more than a class room.

The cloud storage, where I keep my personal data as backup,  I had to face hard disk crashes, lost my smartphone , but cloud storage helped me to come out of those depression , where I feel my data are safe, I can access my data from anywhere whenever I need, I don’t need to carry a giant laptop or hard disk where it is unsafe , only an internet connection and a small device can retrieve my all the data I need.
There are some business and word processing apps are freely available at some cloud service , I use them which cut the cost of purchasing those software for my computer .




NOTE (the privacy policy):
The biggest concern about cloud computing is the privacy  policy because in this system we handle over our personal/commercial data to another companies. It is necessary to read the ‘privacy policy’ of the company whose’ cloud service you are going to use. There are few more things that you should be concern  such as, does the company who claims to provide cloud storage space actually own it? Does the company has enough data security system to protect the clients’ data? Does the company has enough physical security for the data warehouse? And much more.








This post has been written for ‘I code with cloud power’ blogging contest held by Microsoft at Indiblogger.in
visit http://www.windowsazure.com/en-us/pricing/free-trial/













TOPICS
WHAT IS CLOUD COMPUTING
BENEFITS OF CLOUD COMPUTING
CLOUD STORAGE
WINDOWS AZURE

How to protect identity theft in online banking

By // No comments:


Online banking system has made our life easy and trouble free from daily hassle and save a lots of time as everything is a click ahead, but no doubt that there are lots of bad people around us due to which there is a possibilities of our account being hijacked or theft of our identity & banking information. 

Malicious people/hacker are always looking for  your personal information like bank login data such as id and password,  credit card numbers, social security numbers  etc. They will attempt various methods like by sending malicious email, backdoored software, fake call etc   to gain access  in your bank account. So when it comes about the matter of online financial transaction, we always need to be precautious.   You should follow the following steps to keep your account secured.

Secure Websites | Secured Browsing

secured banking website
If you need to send & receive confidential  like banking and company’s secret  data through a website, first make sure that the website is secured . Now a days almost every banking websites  and other important websites  have  secured socket layer , through which we can send the information to the server in encrypted format rather than in plain text. It will protect the sensitive data from being sniffed. To be sure the website is secured or not, look at the left of the address bar, if it is secured the address bar will have https protocol with green text and an icon of lock.

Malicious Website | Cloned/Phished Websites

cloned website, phished website
As I told above an important website must be secured over SSL , the malicious people may try to fool you by redirecting you to the fake websites that’s look like the real one. But a fake website will not have a SSL certificate or https encryption . So make sure that the security of the site is well configured and never ever click on any link send to you by other people says that it’s a banking website.  If you can’t conform yourself that the website is real of fake, then Google & Wikipedia is always there for your service.
You need some configuration in your browser too. In the cookie settings never set it to “Accept all cookies” , turn on the “Phishing filters” and also turn on the  “pop up blocker”

Malicious Email | Pop up message
If you receive any suspicious email saying that you have won a grand prize and your email id is in their random list, don’t give any response to these types of emails. Such emails are the traps to collect your personal information like banking  and other data .  Sometime pop up ads on website displays something greedy like You have won a IPhone,  you are their lucky winner and blah blah , don’t click on such ads. Go to your  browser settings and turn on the pop up blocker.

Fake Call | Social Engineering

If you receive any call  and says anything like this call is for security purpose and they need your bank account details like credit card number, log in id & passwords to verify your identity, Beware of such calls! It’s  a to hack into your mind and collect your personal data. Banks will never call you in such way, if banks have any security upgrading you will receive a postal letter from your bank or they will call you to visit the bank for confidential work.

Bank Statements | Credit card statements.
Kindly verify the bank statements personally from bank, if you see any unusual charges or transactions.

Malicious Software | backdoor
Beware of free software and email attachments which may contains malware and keylogger that may infect your system and record your every online activities , collects the important sensitive data and sends the information to the attacker. Use a good anti-spyware & antivirus to protect your system from unusual software. Antivirus and antispyware needs regular updates ,















TOPIC
HOW TO PROTECT ONLINE BANKING ACCOUNT
HOW TO PROTECT IDENTITY THEFT IN ONLINE BANKING
HOW TO DO SECURE ONLINE BANKING







How to stay safe online

By // No comments:

cyber security, cyber security tips, basic saftey tips, stay safe online
pic credit: www.shutterstock.com

Cyber security & it’s awareness is the need of the hour. In this modern world most of the people know how to use the internet but, most of the people don’t know about the online threats & how to secure the internet.  Everyone should be aware about the online threats .As the technology is progressing, we are getting more dependent on them to make our life easier by the online ways  of daily life stuffs. Let it be socializing at Facebook, online business deals & presentation, cloud storage, paying bills online, making reservations or sending  private emails etc. everywhere we need extreme privacy, authenticity , security & confidentiality . 

 But there are many threats around the internet such as information warfare, cyber terrorism, malware,  violation of data integrity, phishing, Disturbed Denial interruption of service and so on, by which the malicious hackers try to steal  private data, high sensitivity business information , and much more. They even collect our personal information and sell them to the other people for huge price of money. People who are not aware of these things can be easily a victims of such incidents.
Here I have some basic security tips for everyone that can be helpful to avoid such threats in our daily life activities.

PASSWORD: Don’t use the same password in every websites, because if a website’s security is compromised then a malicious hacker can have access to all your data, he/she will may use your LOGIN data at many other websites  to get access, If you have used the same password and user ID the hacker will gain access automatically.
Always use a unique & strong password that the word should not exist in any dictionary , consists of capital letters, small letters, numbers and special characters .example: ‘Xs&5@a3zt! M’

TWO FACTOR AUTHENTICATION : It means authenticating in two steps, in this feature you have to prove yourself twice that you are the real one, first by entering your user id & password , then in the second step you will receive a code in your cell phone which you have to enter in the website. It helps more to protect your account from unauthorized access in your absence.  Almost in every daily usage websites such as Google, Apple, DropBox, Microsoft, LinkedIn, Facebook, Twitter has this feature.

SYSTEM SECURITY: Use a good firewall & antivirus in your computer, update them regularly to protect your system from virus, worms & network attacks.  Stay away from junk software that’s says to make your system run faster, cracks & hacks of software & accounts. These type of software are mainly backdoors & key-loggers  that records your keystroke, interrupts in the normal process  and lead to  vulnerability of system .

HTTPS SECURED SURFING:  If you attempt to do any financial transaction online like online shopping, paying bills and online banking etc, always use https:// instead of http:// . The https protocol sends the information to the server over secured socket layer rather than in plain text. It will protect your financial data from being sniffed by malicious hackers.


 SMARTPHONE PROTECTION:  Smartphone has brought the world into our fingertips, It allow us to communicate , navigate, connect the internet, shoot the pictures and much more, that means we have thousands of data in our smartphone, data like contact numbers, personals images, email id, record of instant messages & much more. Now a days Govt. & some malicious hackers targeting the smartphones users for surveillance & to collect data. So beware of everything what you use, what you install from outside, with whom you share. Don’t install junky apps which are for fun & entertainment , because they are spam and backdoored  and can harm your phone.  Install apps from only the trusted apps market . And always notice what type of permission does the apps seeks
, for example an app for playing video will never require to access your contact book, if any apps ask you to permit for any unnecessary access , then it is for sure that the app is spam/malware/backdoor.

SOCIAL NETWORKING: Social networking is our another world where we spend most of the time than eating , sleeping & studying. According to recent survey of Indian Cyber Cell, about 40% of crimes against women originate from social networking websites.  It is an important place where we add strangers and make them our friends, we share images & videos with them , we chat for countless  hours without knowing much about them , so here we need  extreme security & privacy.
Before adding anyone into your friends circle make sure that the profile is legit and belongs to the actual person as it is named, check his/her profile updates that there is not any offensive contents. Change the accessibility mode of you photo albums & updates only to friends or  with the people only with whom you want to share. Hide your address & keep your contact number private, that means only viewable to you. If you see any fake profile or someone is bothering you then block them & contact the website’s help centre.

PREVENT IDENTITY THEFT: Hackers are all around, they can retrieve a lot of information about you, network connection &  your device just by your IP address (Internet Protocol).With the retrieved information the hackers can easily try to get access into your device , even they can mask their IP with your IP address.   If you are doing very confidential work and sending very sensitive data over the internet then you must hide the real identity of your device, by using secured proxy servers , or setting up own virtual proxy network or by using tor browser which hides your real identity.


BEWARE OF PHISHING: Phished website are cloned pages of original website, they looks almost real like the original website but these pages are trap to collect the User ID, Email id & passwords. Remember, any legit website doesn’t ask about the details of your email account.  For example, Gmail id & password, Facebook user Id & password etc. If any website ask you to enter these, then  no doubt that it is a fake/phished page.

INTERNET COOKIES :  Cookie is a small file that is generated from web server & placed in the user hard disk for the user identification. Malicious hackers can steal your cookie & hijack the season between you and webserver . If you use public computers at office, college, cyber café or somewhere else, then clean the cookies after use. You can do it by going into the browser settings.

“Remember, nothing is fully secured in this world, everything is breakable, we can only apply some tricks  and methods that will take time to break which is enough to aware ourselves  .”












TOPICS:
HOW TO STAY SAFE ONLINE
BASIC CYBER SECURITY TIPS
HOW TO SECURE YOURSELF ONLINE
TIPS TO STAY SECURE ONLINE



what is two step Authentication

By // No comments:


Most of us know how to use the internet but most of us don’t know how to secure the internet.
In this cyber world, security is very essential,  because most of our daily life activities from sending personal and business E-mails , banking transactions , to our virtual world of social networking  are done online.
Having online security doesn't mean only for your online bank account, it is also for your  email account, social networking  website such as Facebook, twitter  etc. Because everyone is associated with each other directly or indirectly and among which your email account is the main key to every websites. Well..

 What is two Step Authentication ?
 Authentication is verifying your identity to the system by entering your  user id , password  and gain access to use the services of the system.  Where as to ensure more security, two step verification is verifying your identity in two steps. First step is by entering your User ID/Email ID and password, then second step is  verifying by something  that you always keep with you that proves that you are the real one. So in second step you always need your cell phone , in which the website will send you a code and you just need to enter the code and get full access.

I know it’s a bit of lengthy process as you have to keep your cell phone always with you and wait for a minute every time you try to log in and its makes you feel painful, because in the E-world we want everything quick and easy , but these things doesn't matter if you want to secure your online assets .

Imagine your friends know your Email ID and Password , and he want to access your account in your absence to spy on your personal feeds, then what? He will enter your first authentication data correctly but he will stuck at the second step when the system will ask him to enter the code that has been sent to your cell phone. Isn't helpful?

Most of our primary usage website have two step authentication system, like in Google, Facebook, twitter, LinkedIn, Microsoft, Apple , DropBox etc.

How to Set two step Authentication 


Lets start with Google account.
Just  goto your Google account at http://accounts.google.com then move to ‘security’ section and enable “2 step  verification”. All you need is your cell phone number , if its not verified then kindly verify it. All the options are there.


DropBox  2 step authentication
No doubt that dropbox is an important website for cloud storage for personal or commercial purpose and it needs security indeed, It also supports authentication by SMS . You can set the 2 step process from your account settings and then move to security section. Whenever you will use a new device you need the SMS code to gain full access into your account.
image source: flicker.com 


  
Twitter ‘Two factor verification’
Twitter call this process ‘two factor verification’ . You need a verified phone number to get started. Go to your twitter account settings , Select ‘required a verification code when I sign in’ then click on add phone and follow prompts. You will receive a six digit code whenever you try to log in.





Microsoft
They lunched this system recently and obviously  people need this in their Microsoft account because with only one account it gives the access to Xbox, Outlook, Hotmail, Dreamsparks, SkyPe and I don’t know how much more . To enable this system goto account settings move to “Security Info”  then click on “set up two step verification”


Facebook Login Approvals:
Facebook supports  code generated only from their own mobile apps. Offline . Go to your security settings , edit the ‘code generator’ .
You can enable the apps. Password to use a special password every time you use the Facebook mobile apps from your cellphone.


                                           

Secure your online world










Topics
What is two step authentication
what is two step verification
how to enable two factor verification
importance of two step verification 

Top 5 Health Apps for your Android Smartphone

By // 2 comments:

Smartphones are versatile devices and more so when you combine them with the range of apps that an Android Operating System has to offer. An Android smartphone is slowly on the way on becoming a one stop solution to almost all our devices that we use in our day to day life. There are many ways an Android phone helps us in our day to day life but one of the lesser one uses of a smartphone happens to be in the health department. Android has many apps that can help us to take care of our health.

Noom Weight Loss Coach
This app has been highly rated by its users and quite rightly so. By allotting different tasks each day, the app slowly allows you to change your lifestyle into a much healthier one. These tasks are all scientifically designed so that you can lose weight effectively. There are also enjoyable and informative articles and a score system that makes losing weight a fun job. The app creates a personalized task schedule and is quite easy to use. Apart from these features, this app has a lot of in built utilities to help you in losing weight like a pedometer, logbook, food log etc.

Endomondo Sports Tracker
Endomondo Sports Tracker does exactly what its name promises to do. It tracks your exercise routines. All your outdoor exercises like running, cycling etc are tracked by this app using GPS. It then goes on provide you with details about your workout like calories burnt, duration, distance etc. this feature can also be used if you use a treadmill or any other such devices. You can also store these details in the form of history to see how much you have improved or even share it with friends and then compete to break your friends’ records. This app is a must have for those of you buying a new Samsung touch screen mobile and looking to measure your fitness levels.

WebMD
This app is a sort of a new age encyclopedia of diseases for laymen. You start by selecting the appropriate part of the body that is troubling you. Then you select the symptoms and the app provides you with information about the potential problems that your body might be facing. There is also a function available where you can read about conditions and their symptoms and cures. There is also a huge a database of the drugs available in the market along with their uses and side effects. All of the information is medically reviewed. There is also a body guide to creating a first aid kit along with the required method of treatment in emergencies.

Cessation Nation
Smoking kills millions of people worldwide every year and this app was developed in order to help people quit smoking. There a number of features that helps a smoker to quit. There are fun games that will help you to forget your cravings by distracting you from it. A scoreboard is maintained which lists various stats like the time of the last smoke and the money saved by not smoking amongst others. You can also share your stats on Facebook to help others.

Cardiograph
This is a very simple app and its very simple job is to measure and monitor your heart rate. By utilizing the camera of your smartphone you can actually measure the rate of your heartbeats. This is one app that can come in handy anytime as there may be times when it is necessary to know one’s heart rate like while exercising or if there is an existing heart condition. You can even create multiple profiles to keep track of your family and the results can be saved and tracked over a period of time.

Lead a Healthier Life
In this age of haste people rarely get time to take care of their health and if they do get time, they do not know where to start. Health apps are designed to help you lead a better life by showing you how to take care of yourself and others.


Author Bio – Sunil Khale

The author is a B.Tech in Mechanical Engineering and has since devoted his time to blogging on technology with PriceCheckIndia, where you can find the latest Nokia Mobile Price List from across all the major E-commerce stores in India.

Online Education in India

By // 5 comments:



As the technologies are getting advance our life is getting easy and technologies are being most
helpful amenity in our daily life. When we speak about the term “INTERNET” It is an amazing
technology which has converted our almost all activity to the keyword “ONLINE” & “E-…” .
In large and developing countries like India, all the faculties ,
resources and entity for every kind of education in not available at every corner of this nation.
People who want to gain more knowledge about particular course, and pursue more degrees they
had to move around the country to large town and cities to get an institute which cost heavy weight
to the pocket, or sometime people who can’t meet the expenditure for a good institute they lag
behind and loss hope about his career.
But online education has removed all these barriers of education, one just need a computer with an
internet connection. Now students can opt for study resources, certificate courses, tutorial, pursue
major degrees online sitting at home and most all study resources are freely available at different
websites. Working professionals no need to quit their job to get higher education, online college is
just a click away : )

Benefits of Online education are:

  •  All most every contents and resources of syllabus are freely available in the form of

Ebook, Pdf files, Docx files etc. at different websites and hence students do not need
to spend extra money to buy books from market.

  •  Working people do not need to quit their job for higher education, they can opt for

study any time any day during his/her free hours.

  •  Online Lectures can also be downloaded later to use it offline whenever required ,

this has changed the traditional system of attending class, once one have missed the
online class they don’t have to worry, they can view the lectures in video later.

  •  Online course are less expensive as it does not required transport expense, hostel

expense etc.

  •  Online instructors comes from different regions around the globe and students are

exposed to knowledge shared by the instructors which cannot be learned from the
book.

Here are few different online entities which might help everyone to learn something new and pursue
certificate course and degrees…

www.DreamSpark.com

DreamSpark is founded by Microsoft Inc. for betterment of students. It provides highly advance,
professional tools and software for the students for free of cost and also rich online resources and
tutorials for free. Its main aim to teach the students and enrich the knowledge of Windows
programming, Windows Apps building, web development and much more. The apps and software
which is built by the students are presented at Windows store which provide a new goal for
students. DreamSpark also provide Microsoft certification to students. DreamSpark is a amazing
foundation by Microsoft for those who want built his career in the field of programming.

www.w3schools.com

It is an online school for web technologies. One can learn HTML, CSS, CSS3, JavaScript, jQuery, XML,
XML Dom, ASP.NET, PHP, SQL from the free resources and can apply for a certificate by paying an
exam fee. W3schools is recommended by thousands of top universities and schools around the
world.

www.Code.org ™

Code.org is a non-profit foundation dedicated to growing computer programming education around
the globe with free of cost. It is founded and supported by many famous personalities such as Bill
Gates, Mark Zukerburg, many top experienced teachers and many online schools. It is an one
complete entity for kids to IT professionals to gain more knowledge. Code.org provide free
resources and online tutorials for Android , IOS, Xbox, Windows programming, core programming
languages, robotic programming, Web technologies and much more. It also provide major certificate
and degrees.

www.eduarrow.com

Eduarrow provide free education for student of KG to standard (XII) of CBSE, ICSE and other boards.
Its main aim to provide free education and mind set towards study for school children and children
from poor economic background. They cover all most syllabus of Maths, Science, English, Hindi,
Colouring, and other general studies along with worksheets.

www.EduKart.com

EduKart.com is India’s Leading Online Education Company, they deliver high quality degree and
diploma programs such as online MBA, MCA and BBA, International Diplomas, and industry relevant
certificate courses in areas of Retail, Finance, Telecom, Digital Marketing, Programming Languages
and Project Management at an affordable fees. EduKart.com is led by a team consisting of alumni of
Stanford University, Indian Institute of Management and University of Delhi. The courses available
on EduKart can really help the participants to get better job opportunities and achieve their career
aspirations.

In India most of the leading colleges and Universities such as IIT Madrass,
Sikkim Manipal University, has introduced online education for students in India. Even Leading
international Colleges such as Harvard University & Massachusetts Institute of Technology have
joined hand to offer free online course to students and committed more than $60 million.
Online education is the future and and next innovation in the field of education not only in India but
around the globe.

SMS is an important invention

By // 2 comments:

 What’s bigger and far more important than Facebook? Its low tech and dopiest need any smart phone or even an internet connection. And this year marks its 20th birthday , which means  that in internet it’s 140 years old.

 Got it? It is SMS - text messaging to you and me.Two third of the world’s population – that’s over four billion people have access to it because that’s the number of people who have mobile phones , and even the cheapest chunkiest handsets can send  SMS message. SMS was the brainchild of a European initiatiave. The first mobile phone was analogue devices and the market was bedevilled by incompatiable technologies and protocols. But in 1982 a European telephone confrence decided to tacle the problem and set up the GROUPE SPECIAL MOBILE (GSM) committee and established a group of communications engineer in Paris.

Five year latter 13 European countries signed an agreement  to develop and deploy a common mobile telephone system across Europe. The result was GSM  - a unified open standard based mobile network larger than that in US.
The idea for SMS was based around a really neat trick to transport message on the signalling paths needed to organise telephony during periods when those control channels were quiet. This was a fantastic idea because it meant that there was no extra cost involved in transporting the message . The only restriction was that they had to be short – no more than 160  seven –bit characters. So SMS was built into the GSM system from the begening.

The strange thing was that almost  nobody paid any attention at first, it looked like a truncated email. As a result  SMS use were remain low for years. The reason may be because in earlier days only adult could have mobile phones and adult didn’t seems to know what text messages were for.
Then in 1996 something changed: Pay as you go SIM cards were introduced. Suddenly teenagers could acquire mobile phones.And when they got them , they did know what SMS was for.  The graph turned skywards  and its been going in that direction ever since . SMS is now world’s most  intensively used data communication technology. One source claimed that over 6 trrillion text message were sent in 2010 , for example and that was more than triple number sent in 2007.

Source- Hindustan Times