Solutions for recovering stolen laptop

Data privacy and protection are the two main concerns faced by the mobile users today. Although, laptops have been around, it’s not until recently that it has generated quite a buzz in terms of ease and mobility. Some of you who have laptops will surely be worried about the surge in the theft of laptops. Even I was wondering on the technologies that could track stolen laptops and computing devices. Some of the things I could think of were – GPS dots (inspired by Hollywood movies), IMEI numbers as found in Mobiles or stealth softwares that would send the owner some email blah blah… . . . . → Read More: Solutions for recovering stolen laptop

How to keep passwords safe



Don’t just store your passwords:

-On a notepad and change the extension or hide notepad!

-On a Sticky note

-On the Outlook’s post it note, even if you have password protected the PST file. They are still readable.

-Email them to your Yahoo, Gmail or other email ids

-On your Mobile phone notes / SMS, unless encrypted and password protected

-Post it note and hide below your desk!

Store your Passwords safe and Secure:– Use a tool like Keepass, Lastpass, These are free/paid open source utilities

-USB thumb drives with built-in software that has . . . → Read More: How to keep passwords safe

How Not to Follow a Fake Profile on Twitter


Here are some tips that will help you in determining if the Twitterati that you want to follow on Twitter is real or fake. 1. Is it a Verified Account 2. What is the Web page of the Account holder? 3. Look at the Tweet times. . . . → Read More: How Not to Follow a Fake Profile on Twitter

Social Engineering Countermeasures


Tring Tring !!

Sir, I am calling on behalf of Moneywise bank.

You have been selected as the most popular customer in our group at As you can see the prize is US$10000 and we would soon be transferring this amount to your account. In this regards, we would need to validate your credentials….Please provide your name as printed on the card, Date of Expiry, Card number.

Our ‘Mr Social Networker’ is on the cloud seven as he happily reads out the details.

Couple of weeks later he is dumbfounded to find all the hard earned . . . → Read More: Social Engineering Countermeasures

Claim your undelivered package…hmm malware

As if malicious emails promising freebies are not enough, some scamsters have hit upon using unclaimed parcels as a bait for sending malwares (viruses, worms and trojans) through emails. I received one such email stating that the parcel I sent could not be delivered and I had to collect from their department by printing the attached invoice. Coincidentally, I had indeed sent one parcel but later realised that it was through a different vendor and just for the heck of it went through the email.

As expected the email was indeed a malware carrier. Though the FROM address looked . . . → Read More: Claim your undelivered package…hmm malware

Use Now, Dispose Later….Your Email Addresses

Well, use and throw phenomenon seems to have hit web too. Now you can dispose of email addresses that you no longer wish to use…What? Yes, ………………….but why would I want to do that?

Simple, say you are about to buy something on the web or you found some interesting article and for that information to reach you, they normally ask you for the email address. You gave, it was good for sometime but now you are receiving unwanted emails from them, their partners, etc etc as well? The innumerable Unsubscribe requests have not yielded desired results and you . . . → Read More: Use Now, Dispose Later….Your Email Addresses

Tips To Select AntiVirus (AV)

So you made the decision to buy an AntiVirus (AV) to safeguard your system. But stuck with what to look for in the AV?

Here are some of the tips that will help you in selecting the best AV for your computer:

– Load on System

– Frequency of the definitions or updates

– Type of subscription

– Ease of Upgradation

– Technical Support

Load on System

One of the common complaints from the users is that AV is taking lot of system resources. I think the problem could be caused at . . . → Read More: Tips To Select AntiVirus (AV)

How I Passed CISSP exam successfully!

Here are my thoughts on planning and successfully passing the CISSP exam! . . . → Read More: How I Passed CISSP exam successfully