Simple maximum security setting on Windows - the basis of a protected PC

Simple maximum security setting on Windows - the basis of a protected PC
4.1 (19) 82.11%

Setting simple maximum security on Windows What is the tutorial "Setting simple maximum security on Windows"? In this video tutorial you will see how to set up accounts on Windows so that the operating system is secure. Simple simple security setting on Windows. The mistake that many Windows users make. When installing the Windows operating system, users remain with the account created at installation and no longer bother to create other user accounts for family members or acquaintances who will use that PC. That account created during the installation has elevated rights by the Administrator. Why is it wrong to use the installation account? In fact, it is not wrong to use that user account that was created during the installation, but it is wrong to still use it with administrator rights. An Administrator rights account can do anything on the PC, from changing important settings to ... [Read more...]

How not to infect infected sites and viruses - sandboxie

How not to infect infected sites and viruses - sandboxie
4.2 (14) 84.29%

How not to get infected on infected sites and virus applications - sandboxie How not to get infected on infected sites and virus applications - sandboxie In recent years people have been dealing more with viruses, spyware but also other malicious programs of new type that have become more and more sophisticated, and which can hardly be intercepted by an antivirus. Antivirus programs treat us like sheep! I don't know if you have any idea how an antivirus program works. If you do not know I will tell you, because it is quite interesting method applied by the major IT security companies. First of all we are treated like a flock of sheep, and the wolf is the virus. We are collateral victims. From a few flocks, the virus will attack one computer at a time. The infected computers will report back to the base, and the specialists there will try to find solutions to eliminate the virus as soon as possible. More precisely, the sheep from the edge are sacrificed, in order to live the ones from ... [Read more...]

How can you find out if someone has been on the computer and what he did

How can you find out if someone has been on the computer and what he did
5 (9) 100%

How to find out if someone walked you in the computer and what they did Find out who someone walked you in the computer and what they did. Of course we all know we have to put the password on the computer, but most of the time to recognize that it is our hand to enter the password every time, so we leave the computer without the password and of course anyone can enter. How do you know if someone has used your PC in the absence. We have found three free applications, which are still portable (not installed), and that help us find the traces that are left in the computer after using it. We'll play detectives! These applications that help us find traces of computer usage, show us what applications have been opened, what has been searched through the PC, what has been searched on the web and the history of all web browsers, ie the list of visited sites. 1. Browsing History View This application extracts our history from all browsers installed on your PC and shows you the websites visited from any… [Read more...]

How to find out if your email and password are hackers

How to find out if your email and password are hackers
4.4 (11) 87.27%

How to find out if your email and password are hackers How to find out if your email and password are hackers Nowadays it's increasingly difficult to keep your data secure; especially the email address and password, which we use most everywhere. When we make an account, we trust blind Every time you make an account you must "legitimize" yourself with something, or your phone number, or email address, or your Google, Facebook, Twitter, etc. . They would all be fine if the site you were on was 100% focused on the security of the data in their possession. The worst thing is that all accounts are based on an email address. If you now want to log in to a site, you automatically log in with Facebook, but this Facebook is based on an email address, which you used - when you made your account. If a hacker is in possession of the email address, he has access to all your accounts, by resetting the password through ... [Read more...]

How do you stop collecting Windows 10 data - it's like a shredder

How do you stop collecting Windows 10 data - it's like a shredder
4.4 (24) 88.33%

How do you stop collecting Windows 10 data, which came as a swipe. Data are collected by any method. Data collection has become a global sport, competing with the largest internet service providers. In the 1 place is Google, followed by Facebook and Microsoft, after which, more timid are those from Apple, Twitter, Amazon, etc ... eee, I let them recover. Like I talked about privacy on Windows 10? Some time ago I presented the settings that we should stop on Windows 10, which we can turn off. Unfortunately with every major update, Microsoft gives us a few more holes in the system, through which our data is leaked. We have also tried with applications to close "Windows 10 ears! We also presented applications with which you can stop certain settings, in the article STOP the violation of privacy on WINDOWS 10 by Microsoft. Unfortunately, these applications become useless after updating. The major windows in Windows. We also have ... [Read more...]

PCs Worse Over Nights - Resolve Meltdown Update

PCs Worse Over Nights - Resolve Meltdown Update
4.9 (24) 98.33%

Why Weaker PCs Are Overnight - RESOLVING meltdown update How are things with Meltdown, Specter and PC performance? A few days ago I told you about the Meltdown and Specter vulnerabilities, after which Windows and Linux updates were released. System updates can only resolve the Meltdown vulnerability, with manufacturers of motherboards, systems or laptops providing BIOS updates that will address Specter vulnerability. Performance loss quite important! Intel processors older than the 4 generation (Haswell) may suffer quite significant performance losses. For me (Ivy Bridge) feels extremely powerful the loss of performance. if before some web pages opened in 2 seconds, now the same pages are over 5 seconds when loading. How do we solve the loss of performance? We have two solutions, and in both we will lose "protection" for… [Read more...]

Infection live with WANNA CRY Ransomware and methods of protection

Infection live with WANNA CRY Ransomware and methods of protection
4.4 (19) 87.37%

Live infection with WANNA CRY Ransomware and methods of protection The most destructive computer infection in recent years is a Ransomware called WannaCry. Where did WannaCry come from? Where it came from is not exactly known, but it is known to have been built on the stage of spyware tools stolen from the NSA (the SRI of Americans), which the NSA used for espionage. Tools that were based on Windows vulnerabilities, which the NSA did not report to Microsoft, were stolen and put on the Dark Web, where some of the ideas were put to work. Very suspicious fact! Image credit securelist.com WannaCry has hardly affected the American continent. How does a Ransomware work? Simple: NEVER. You're infected with 1. Your files are 2 encrypted. You have to pay if you want to decrypt them. If you are a natural person and you have two three self-moored PCs, not a big problem, but if you are a big company and your entire database is encrypted, ... [Read more...]

Fixing screen in an application in Android - cure for the curious

Fixing screen in an application in Android - cure for the curious
3.6 (12) 71.67%

Locking the screen in an Android application is a function that allows us to lock the screen, stay in one application and we can not exit until we enter a password or fingerprint. On which phones can you fix the screen? This feature should be available on any phone with android 5.0 or higher. It now depends on the developer whether he has decided to keep the feature or disable it. How do I enable screen locking in an Android application? We find the setting in: Settings / Security / Screen lock Be careful: Remember to enable the password prompt. When is the screen lock feature useful in an Android application? 1. If you're showing the phone to a curious 2 friend. If you have a more paranoid 3 partner. If you give your child a phone How does screen locking work in an Android application? For example, if you give the phone to a child, normally, you do not want it to go crazy all over the phone but you want to ... [Read more...]

As you enter the account to someone else and read WhatsApp conversations

As you enter the account to someone else and read WhatsApp conversations
3.3 (165) 66.67%

How do you log into someone else's WhatsApp account to read their conversations? Hello friends, in today's tutorial we will see how we can read or spy on WhatsApp conversations of children, wife, friends, close friends. How to get into someone else's WhatsApp account Maybe we don't want to spy on someone but just monitor our children or grandchildren. What I will show you in today's tutorial is not a hack. We will not use special software and we will not need root. The method presented in this tutorial simply exploits a function that WhatsApp has; This is WhatsApp Web. Why we need to log into someone else's WhatsApp account All we need is to install on our phone (the one we want to spy on the victim) an application called WhatWeb For Whatsapp and have access to the victim's phone (which we want to download). we spy) for a maximum of 5 seconds. When will the WhatsApp spy method not work? 1 - if ... [Read more...]

As you can see passwords, pictures and pages to others - affected online stores

As you can see passwords, pictures and pages to others - affected online stores
4 (16) 80%

How do you see the passwords, pictures and pages of others - online stores affected Security! IT security is somewhat vague nowadays, when the average user does not differentiate between web and virus vulnerability. We tried to inform as soon as possible, but unfortunately the message did not seem to reach where it was needed. On the contrary, we see that very large online stores do not provide users with a secure environment for accessing accounts, which contain a lot of sensitive data. Why didn't we protect ourselves, what did we expect? Sometimes for different reasons, most often comfort or economy, we choose the simple way, ie we connect to the free wifi networks, which are made available through cafes or malls. Some time ago I explained to you how dangerous it is to connect to free Wi-Fi networks when I showed you how to intercept traffic with WireShark. ZANTI, a criminal application, on its own! Now I present an even more interesting application, which can initiate an attack ... [Read more...]