How not to infect infected sites and viruses - sandboxie

How not to infect infected sites and viruses - sandboxie
4.2 (14) 84.29%

How not to get infected on infected sites and virus applications - sandboxie How not to get infected on infected sites and virus applications - sandboxie In recent years people have been dealing more with viruses, spyware but also other malicious programs of new type that have become more and more sophisticated, and which can hardly be intercepted by an antivirus. Antivirus programs treat us like sheep! I don't know if you have any idea how an antivirus program works. If you do not know I will tell you, because it is quite interesting method applied by the major IT security companies. First of all we are treated like a flock of sheep, and the wolf is the virus. We are collateral victims. From a few flocks, the virus will attack one computer at a time. The infected computers will report back to the base, and the specialists there will try to find solutions to eliminate the virus as soon as possible. More precisely, the sheep from the edge are sacrificed, in order to live the ones from ... [Read more...]

USB stick password - portable safety

USB stick password - portable safety
4.5 (12) 90%

Password on USB stick Password on USB stick - portable security The need for data security is becoming increasingly important, especially in the context of data leakage, unlimited data collection or computer attacks of any kind. Our data is almost 100% in digital format People are beginning to realize (about late) that the data they generate every second is in the possession of other entities every day. From files stored locally on the PC, we migrated to "nonsensical" in the cloud. Now almost all our data is on Facebook, Google, Microsoft, Apple, Amazon, etc. Local files - what's in your hand, not a lie! I think we still need to keep certain files on the premises, and in order for them to be as safe as possible, we have to use encryption methods. The problem is that these encryption systems are either too free and complicated, or simple but expensive. What does the world say ... than to complicate myself with this encryption, better ... [Read more...]

How do you stop collecting Windows 10 data - it's like a shredder

How do you stop collecting Windows 10 data - it's like a shredder
4.4 (24) 88.33%

How do you stop collecting Windows 10 data, which came as a swipe. Data are collected by any method. Data collection has become a global sport, competing with the largest internet service providers. In the 1 place is Google, followed by Facebook and Microsoft, after which, more timid are those from Apple, Twitter, Amazon, etc ... eee, I let them recover. Like I talked about privacy on Windows 10? Some time ago I presented the settings that we should stop on Windows 10, which we can turn off. Unfortunately with every major update, Microsoft gives us a few more holes in the system, through which our data is leaked. We have also tried with applications to close "Windows 10 ears! We also presented applications with which you can stop certain settings, in the article STOP the violation of privacy on WINDOWS 10 by Microsoft. Unfortunately, these applications become useless after updating. The major windows in Windows. We also have ... [Read more...]

Anti ransomware anti-encryption NEW files in Windows Defender

Anti ransomware anti-encryption NEW files in Windows Defender
3.6 (13) 72.31%

NEW in Windows Defender anti ransomware anti file encryption Hello friends, in today's tutorial we will talk about the security of important or precious files. Specifically, we will see how we can protect our precious files from ransomware infections which, once infected by our computer, will encrypt all the files and thus lose it. Controlled folder access It is a new layer of protection added in Windows Defender with the major new update of Windows 10, Fall Creators Update which is already available from 17 October for the Windows 10 operating system. If you do not have the update to Fall Creators Update, you will not benefit from the new security layer "Controlled folder access" What does Controlled folder access do? Through it we have two features called Protected Folders and Allow an app through Controlled folder access. What does Protected Folders do or is it? Well, this feature allows us to add a ... [Read more...]

The Best Free Backup Program - AOMEI

The Best Free Backup Program - AOMEI
4.3 (24) 85.83%

The best free backup program - AOMEI Backup is probably the most important activity for data security. Unfortunately, not all of us back up as we should, and end up losing our data, often without being able to recover it. Why to back up - The best free backup program - AOMEI - To keep your data safe from hard disk failure - To be safe in case your data is encrypted by ransomware - To be able to come back quickly at work in case of software errors - Protection against any software infection Best security in case of ransomware infection - Best free backup program - AOMEI Backup is the best protection weapon in case of ransomware infection. For those who don't know, ramsomware is a type of mallware hidden in a worm, trojan or other virtual vehicle that encrypts the files of infected computers. In the Wannacry tutorial, I showed you how an infection presents itself ... [Read more...]

Infection live with WANNA CRY Ransomware and methods of protection

Infection live with WANNA CRY Ransomware and methods of protection
4.4 (19) 87.37%

Live infection with WANNA CRY Ransomware and methods of protection The most destructive computer infection in recent years is a Ransomware called WannaCry. Where did WannaCry come from? Where it came from is not exactly known, but it is known to have been built on the stage of spyware tools stolen from the NSA (the SRI of Americans), which the NSA used for espionage. Tools that were based on Windows vulnerabilities, which the NSA did not report to Microsoft, were stolen and put on the Dark Web, where some of the ideas were put to work. Very suspicious fact! Image credit securelist.com WannaCry has hardly affected the American continent. How does a Ransomware work? Simple: NEVER. You're infected with 1. Your files are 2 encrypted. You have to pay if you want to decrypt them. If you are a natural person and you have two three self-moored PCs, not a big problem, but if you are a big company and your entire database is encrypted, ... [Read more...]

Vault Gallery, Securing and hiding private photos from your phone

Vault Gallery, Securing and hiding private photos from your phone
3.2 (5) 64%

Gallery Vault, parsing and hiding private photos from your phone - Android application Today, when privacy is virtually gone, it is very difficult to keep your private data away from the curious eyes of the cloud or your neighbors. Let's say you take a picture with your phone when you're in an intimate setting. The picture is saved in the phone memory, which can then be automatically moved to the cloud, depending on the settings you have made. Google, Facebook, Dropbox, OneDrive, and many other applications have access to your photos, all for the "share" god. If you feel like some parts of your life should be kept private, you should use an application such as Gallery Vault, which locks the pictures on your phone What is Gallery Vault doing? It will help you keep a second gallery parallel to the one on the phone, where you can keep your photos, videos and files private. It is a digital safe in the phone A very interesting option of the application ... [Read more...]

Recover accidentally deleted photos and files

Recover accidentally deleted photos and files
3.7 (11) 74.55%

Recovering deleted photos and files Recovering deleted pictures or files is a serious problem, especially nowadays, when any digital document is stored on a hard disk, SSD, CD, DVD or USB stick. Sooner or later each of us will make the mistake, accidentally delete important files. Fortunately, the data deleted from a hdd, ssd, stick, are not permanently deleted, they can still be found on that storage medium, and can be recovered with specialized data recovery software. Recuva is a free software for recovering photos and deleted files, software that we talked about on another occasion, but it is worth reminding you about its existence, because this program really does its job, and I can say with all conviction, that it works more good than in the past. If Recuva can't help you, on videotutorial.ro you can find other tutorials with other recovery software: Data security tutorials, recovery, backup, secure deletion (more ... [Read more...]

Automatic saving photos and documents safe with SyncToy

Automatic saving photos and documents safe with SyncToy
4.3 (4) 85%

... Updated tutorial ... Automatically save photos and documents, safe with SyncToy Hi friends, in this video tutorial we will talk about the SyncToy application, this folder synchronization software is produced by Microsoft and does not cost anything, anyone can do it download from the Microsoft site or from videotutorial.ro, at the end of this introductory text above the video tutorial. SyncToy helps us to synchronize folders in different places on the hard disk or hard drives in our computer, for example you want to copy all the documents you save on your desktop or in my documents, with SyncToy it is very easy to do this, and even more, you can schedule automatic synchronization at certain intervals, this with the help of Scheduled Tasks from Windows xp, vista or 7. Synchronizing data from certain folders puts important files in the shelter, so our data will be safe because it is in two different places, ideally it is… [Read more...]

Android permissions 6 Marshmallow

Android permissions 6 Marshmallow
2.8 (4) 55%

With the launch of Android 6 Marshmallow, this mobile operating system has received granular settings for permissions granted to applications; a long-awaited feature on Android; it was already on iOS. With the new settings, we can control in detail, how much the "tentacles" can extend their applications. Most of the time, applications ask for silly permissions, which are not necessarily required for immediate running. Permissions Android applications 6 Marshmallow When are permissions required? Android, before Marshmallow, notifies you before installing the applications, about the permissions to be granted to the installed application. Now nothing is announced, it is installed directly, and at the time of launching permission is required; on some applications, permissions may only be required when needed. However, some applications will require permission in advance; these are the applications of type chat, dialer, voip, etc. How can permissions be changed? In the … [Read more...]