![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
How To Avoid Hackers From Destroying Your Site?
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm ) have been hacked maliciously for the purpose of getting all my online sales and transferring it to his/her account. I've learned a valuable lesson that I would like to share with you so as to avoid becoming the next victim for this hacker. Steps to protect your web site: 1. Don't give out your username/password to anyone else. Even if it's your own net/web/system admin. Chances are he/she already knows it for he/she can just login as admin to the control panel and look at your password. 2. Change your password once in a while. It's better to write them down instead of saving them on a hard disk with insufficient firewall protection. 3. Don't use any word that can be found in dictionary or anything that signifies your birthdate, your street number to make it difficult for the hackers to guess. 4. Disable the "Forgot Password" utility on your site. This utility is very convenient to most end users, so fast that it gives out password so easy to for hackers to play with. 5. Make your password question / password answer (the one used to remind your forgotten password) difficult to guess. Treat it as a password. If anyone can just guess it, chances are hackers will start exploring with your account. 6. Make sure you are in constant contact with your web provider so they know your real identity and they can help you out as soon as there's hacking going on in your site. 7. Don't use any irc (internet relay chat) based chat system for it connects to ports 6660 to 6669. Hackers will exploit these ports and will upload trojan virus in your computer that can get your username/password on most of your accounts. If you are going to use any irc chat system, don't even use it without the aid of psybnc or bnc. For more details and pricing of this tool, email: sales@nabaza.com with Subject: psybnc or go to http://www.nabaza.com/support.htm and post your request there. 8. Don't trust any email (even if it's an email message coming from your trusted friend) message that has .exe file attachment. Chances are it came from a malicious programmer and this .exe file already spreadand infected/duplicated in all email addresses in your addressbook including yours. For antivirus information, go tohttp://www.nabaza.com/antivirus.htm Nabaza.comspecializes in building, designing, implementing, managing and maintaining corporate website to boost sales of your company. Email william@nabaza.com for information on functional, dynamic webpage designing with affordable packages. Subscribe for free! http://www.nabaza.com/subscribe.htm Rebrandable ebooks, software for free
MORE RESOURCES: Should iPhone users use security keys and Advanced Data Protection? The Washington Post Former top security official: If Abbas’s PA won’t fight terror, why should it exist? The Times of Israel U.S. military poised to secure new access to key Philippine bases The Washington Post Open Source Security Index Lists Top Projects | eSecurityPlanet eSecurity Planet New Study Reveals Americans' Top Home Security Concerns Security Sales & Integration Security officers coming back to East Lansing High School, other ... Lansing State Journal Sweden has a chance to transform European security—even before ... Atlantic Council A first-hand look inside Walmart's robust security operations Cybersecurity Dive RSF School board approves new safety and security positions Rancho Santa Fe Review Microsoft surpasses $20B in security revenue as enterprise ... Cybersecurity Dive CISA establishes new office to ‘operationalize’ supply chain security Federal News Network Turner finds security in new deal, Pacers add flexibility The Associated Press - en Español Editorial: Courthouse security should be top priority | Editorials ... Greensburg Daily News JD Sports Hack Highlights UK Cyber Security Concerns The Motley Fool Smuggler tells U.S. jury he paid off ex-Mexico security chief Los Angeles Times Expanded safety, security measures coming to City Hall Vallejo Times-Herald Abbas assures US security ties with Israel only partially cut, can be restored - The Times of Israel Abbas assures US security ties with Israel only partially cut, can be restored The Times of Israel National Association of Counties and Election Security Government Technology USENIX Security ’22 – Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols’ Security Boulevard Bloomfield, N.J. synagogue raises security after suspect threw Molotov cocktail at front door CBS News Three Star General Speaks with National Security Fellowship Seton Hall University Utah Food Security Council based at USU | UPR Utah Public Radio Utah Public Radio Secretary of Homeland Security speaks to migrant crisis and new parole program ABC Action News Tampa Bay Erdoğan’s security advisor says it’s time to stop purchasing ... Nordic Research and Monitoring Network Homeland Security investigating suicide of Streetsboro teen after alleged sextortion News 5 Cleveland WEWS Is the UK the Security Leader Europe Needs? The National Interest Online Joint Statement of the Security Consultative Committee (“2+2 ... Department of State Security Heightened After New Jersey Temple Attack NBC New York Unlawful Southwest Border Crossings Plummet Under New Border ... Homeland Security Biden Administration Announces Additional Security Assistance for ... Department of Defense The Definitive Browser Security Checklist The Hacker News How Schools Have Boosted Security as Shootings Become More Common The New York Times More Than $3 Billion in Additional Security Assistance for Ukraine Department of Defense DHS Continues to Prepare for End of Title 42; Announces New ... Homeland Security USPS tightens online security after fraudsters steal employees ... Federal News Network At Marine Raiders' homicide trial, questions center on security video Marine Corps Times Musk's Twitter still violates FTC security pact, new whistleblower says The Washington Post Remarks by President Biden on Border Security and Enforcement The White House Identity Thieves Bypassed Experian Security to View Credit Reports ... Krebs on Security Microsoft ends Windows 7 extended security updates on Tuesday BleepingComputer |
![]() |
![]() |
![]() |
RELATED ARTICLES
How Can Someone Get Private Information From My Computer? From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts.Dear Booster,How can someone get private information from my computer?Thank you,Evan S. Crack The Code - Thats A Direct Challenge I Challenge You To Crack The Code-------------------------------------I had quite an interesting experience recently. I was hired by a company to perform a vulnerability assessment and penetration test on their network. Five Excellent Indie Encryption And Security Solutions You Have Not Heard About 1. Geek Superherohttp://www. Phishing-Based Scams: A Couple of New Ones Phishing in its "classic" variant is relatively well-known. Actually, 43. Cyber Crooks Go Phishing "Phishing," the latest craze among online evil-doers, has nothing to do with sitting at the end of a dock on a sunny afternoon dangling a worm to entice hungry catfish.But, if you take their bait, this new breed of online con artist will hook you, reel you in, and take you for every dollar you have. Cybercriminals Trick: Targeted Trojan-Containing Emails Threats we ordinary Web users face online leave us no choice but learn. Haven't you noticed how many new things you learned lately? We are much better informed about malicious programs than just a year ago. Is The Internet Over Regulated Today's Internet or World Wide Web is being over regulated.But, are you being taken for a ride, are you lead to believe that Governments World Wide are creating new legislation for your benefit or are there underlying factors that these laws are more beneficial to Governments and big business?First we had the Can-Spam and other laws passed regulating the sending of unsolicited commercial e-mail, that contains false or deceptive subject information, or that is sent from invalid e-mail addresses, but for me, my inbox still seems to always be full of junk mail. Backup and Save your business! There you are busily typing away on your PC or yourLaptop, and all of a sudden the strangest thing happens.The screen goes black, extinquished like a candle in thewind. Computer Viruses - How to Remove a Computer Virus from Your Computer Computer viruses infect millions of computers every day. Viruses can destroy data, steal important information, and even make a computer completely unusable. Message Board Security Problems Security leaks can be a big problem for any site using a message board. Hackers can actually use your message board to go in and change things on your site. Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc. Adware. Spyware. Dont Get Hacked - A Guide to Protecting Your Business from Thieves You've seen it in the news - 40 million credit cards exposed!With all the news about web sites being hacked and cyberthieves stealing credit card numbers and other personal data,it's no wonder that some shoppers are still hesitant to providepayment information online. You don't have to be. Desktop Security Software Risks - Part 1 This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #2: the Desktop Security Software RisksThe risks of placing software on the desktop are such that I will be breaking this article into two parts. How to Protect Yourself Against Online Criminals Credit card fraud is a growing problem for online businesses and can hurt your business in many ways.Fraudulent credit card transactions are costing e-commerce businesses many millions of dollars annually. Reclaim Your PC from the Internet Spies Viruses are, however, not the only malicious software programs out there. The newest addition to the evil software family is the so called Spywares and a good anti-virus program or firewall is not enough to safeguard against these clever programs. Dont be a Dork - Protect Yourself There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc. Hacking the Body Via PDA Wireless Device First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body. Another Fine Mess! I'm in the Anti-Spyware business, and I'm doing a lot of advertising to promote my website, but here I am online and on the phone, giving my personal information to.. Dont Miss Information Because of Misinformation It has been said that with the wealth of information, freely available, the Internet has the ability to make you smarter, faster, than any other medium on the planet. Of course with an equal amount of mis-information, it also has the ability to make you dumber, faster, than any other medium on the planet. Free Ways to Tackle Threats to Your Computer Protect Your PCHaving problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet?Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either. ![]() |
home | site map |
© 2006 |