Although the concept of hacking has been used from a long time in Hollywood movies, its adoption in the Indian mainstream movies has been relatively low profile. One of the most famous hacking scene must be Trinity (Carie Annie Moss) firing up nmap in the cult movie The Matrix Reloaded to figure out open ports on one of the power grids control machine. There have been notable other scenes and hacking concepts used in Hollywood like Wargames, Swordfish, Takedown, The Girl with the Dragon Tattoo, Independence day (probably the dumbest hacking scene in movie history – infecting alien systems with virus) and others. Kahaani, an Indian movie has lot of geek stuff like hacking and social engineering used in it. But the hacking scenes could have been made more authentic. This post is as attempt on this lines . . . → Read More: How Kahaani Could Have Been Hackers Cult Movie
Data privacy and protection are the two main concerns faced by the mobile users today. Although, laptops have been around, it’s not until recently that it has generated quite a buzz in terms of ease and mobility. Some of you who have laptops will surely be worried about the surge in the theft of laptops. Even I was wondering on the technologies that could track stolen laptops and computing devices. Some of the things I could think of were – GPS dots (inspired by Hollywood movies), IMEI numbers as found in Mobiles or stealth softwares that would send the owner some email blah blah… . . . . → Read More: Solutions for recovering stolen laptop
Don’t just store your passwords:
-On a notepad and change the extension or hide notepad!
-On a Sticky note
-On the Outlook’s post it note, even if you have password protected the PST file. They are still readable.
-Email them to your Yahoo, Gmail or other email ids
-On your Mobile phone notes / SMS, unless encrypted and password protected
-Post it note and hide below your desk!
Store your Passwords safe and Secure:– Use a tool like Keepass, Lastpass, These are free/paid open source utilities
-USB thumb drives with built-in software that has . . . → Read More: How to keep passwords safe
As if malicious emails promising freebies are not enough, some scamsters have hit upon using unclaimed parcels as a bait for sending malwares (viruses, worms and trojans) through emails. I received one such email stating that the parcel I sent could not be delivered and I had to collect from their department by printing the attached invoice. Coincidentally, I had indeed sent one parcel but later realised that it was through a different vendor and just for the heck of it went through the email.
As expected the email was indeed a malware carrier. Though the FROM address looked . . . → Read More: Claim your undelivered package…hmm malware