Gmail now blocking fake eBay, PayPal e-mails

5:10 PM Technology Enthusiast 0 Comments

Google on Tuesday said it is now using an e-mail authentication technology to keep phishers from luring Gmail users to fake eBay and PayPal Web pages in order to steal usernames and passwords.

The technology, DomainKeys, uses cryptography to verify the domain of the sender of an e-mail. It allows e-mail providers to validate the domain from which an e-mail originates, and it enables easier detection of phishing attempts by helping identify abusive domains.

Last October, Yahoo announced that it was protecting Yahoo Mail users with eBay and PayPal accounts from phishing attempts using the same technology.

The DomainKeys technology is covered by a patent assigned to Yahoo. The company released it under a dual-license scheme that allows the companies to use it royalty-free under the GNU General Public License (GPL 2.0), which enabled the Internet Engineering Task Force to approve it as a proposed Internet standard.

0 comments:

Installing Windows 2008 Server Core Domain Controller

5:07 PM Technology Enthusiast 0 Comments

To save you some time, I'd like to outline the steps I recently used to add Server Core DC's to an already existing WS08 forest environment:

  1. Install the default Server Core

    1. Insert the DVD, and follow defaults
  2. Change server name

    1. Type netdom renamecomputer <old machine name> /newname:<new machine name>
    2. Type shutdown /r, and then press ENTER.
  3. Change time zone & setup NTP synch

    1. Type control timedate.cpl and then press ENTER
    2. Open command prompt and type in: net time /setsntp:<PDC emulator FQDN>
  4. Change language and keyboard settings

    1. Type control intl.cpl and then press ENTER
  5. Configure IP details

    1. Type netsh interface ipv4 show interface, and then press ENTER
    2. Make a note of the number in the IDX column for the Local Area Connection. Make sure to use this number in steps below for the name="n" parameter
    3. Type netsh interface ipv4 set address name="n" source=static address=<server's IP address> mask=<subnet mask> gateway=<IP address>, and then press ENTER
    4. Type netsh interface ipv4 add dnsserver name="n" address=<Primary DNS Server> index=1, and then press ENTER
    5. Type netsh interface ipv4 add dnsserver name="n" address=<Secondary DNS Server> index=2, and then press ENTER
  6. Enable firewall rules for remote management

    1. The following has to be executed on BOTH the Server Core & the server that you will manage it from, open command prompt and type:

      1. Netsh advfirewall firewall set rule group="Windows Firewall Remote Management" new enable=yes
      2. Netsh advfirewall firewall set rule group="Remote Services Management" new enable=yes
      3. Netsh advfirewall firewall set rule group="Remote Event Log Management" new enable=yes
      4. Netsh advfirewall firewall set rule group="Remote Volume Management" new enable=yes
      5. Netsh advfirewall firewall set rule group="Remote Scheduled Task Management" new enable=yes
  7. Enable Windows Update

    1. Cscript c:\Windows\System32\SCregEdit.wsf /au 4 [Enter]
    2. Net stop wuauserv && net start wuauserv [Enter]
    3. Wuauclt /detecnow [Enter] – this starts the update process now, and does not wait till the default time of 3 am
  8. Add DNS role

    1. Type start /w ocsetup DNS-Server-Core-Role
  9. Add AD Replication components

    1. Remember that a pure WS08 AD environment by default uses DFS-R for replication, so this service needs to be added:

      1. Type start /w ocsetup DFRS-Infrastructure-ServerEdition
    2. For AD environments that are mixed (WS08 & W2K3) install the FRS replication component instead:

      1. Type start /w ocsetup FRS-Infrastructure
  10. Add Backup feature

    1. Type start /w ocsetup WindowsServerBackup
  11. Enable Terminal Services

    1. Type cscript c:\windows\system32\scregedit.wsf /ar 0, and then press ENTER
  12. Install Active Directory

    1. Create the following UNATTEND.TXT file as follows:

      [Unattended]

      Unattendmode=fullunattended

      [DCINSTALL]

      UserName=<username>

      Password=<password>

      UserDomain=<FQDN domain name>

      DatabasePath=<path, e.g. d:\windows\ntds>

      LogPath=<path, e.g. d:\windows\ntds>

      SYSVOLPath=<path, e.g. d:\windows\sysvol>

      SafeModeAdminPassword=<password>

      CriticalReplicationOnly

      SiteName=<Site Name, e.g. Default-First-Site-Name>

      ReplicaOrNewDomain=Replica

      ReplicaDomainDNSName=<FQDN domain name>

      ReplicationSourceDC=<FQDN source DC>

      ConfirmGc=yes

      RebootOnSuccess=yes

    2. Type dcpromo /unattend:unattend.txt, and then press ENTER
  13. Lastly, you may want to enable Bitlocker:

    1. manage-bde.wsf –on C: -RecoveryPassword –RecoveryKey F:\

      1. where C: is the volume to encrypt, and F:\ is a USB key or another volume where a copy of the recovery key will be stored (in binary format). You can also use a UNC path to store the recovery key on a network drive. A recovery password (in numeric text format) will also be generated and displayed. You might wish to add the –skiphardwaretest parameter if you are certain the hardware platform meets all BitLocker requirements.

And there you have it, a Server Core DC happy as a pig in ….

0 comments:

Installing Windows 7 or Windows Server 2008 R2 to a virtual hard disk (VHD) file

5:06 PM Technology Enthusiast 0 Comments

Windows 7 and Server 2008 R2 add the ability for an OS to be installed onto a virtual hard disk (VHD) file to boot physical hardware. To do this, perform the following steps:

  1. Boot from the Windows 7 or Server 2008 R2 media.
  2. Select language options and click Next.
  3. At the Install Now screen, press Shift and F10 simultaneously to open a command prompt window. You'll partition the disks and create your VHD file in this window.
  4. Select the disk and wipe all of its existing content using the following commands.
diskpart list disk select disk 0 clean



  1. Create a 200 MB system partition using the following commands. The Windows 7 and Server 2008 R2 installation procedures normally create this partition automatically.



create part primary size=200 format fs=ntfs label="System" quick active



  1. Create a partition using the rest of the space on the disk. This partition will hold the VHD files. You can call the partition Boot for now. Also, I've used the C drive, but when you boot to the VHD the drive letters will shift. If you assign a different letter, make sure to use the new letter in step 7.



create part primary format fs=ntfs label="Boot" quick assign letter=C



  1. Create a VHD file on the C drive. In this example, I've created it as a 25 GB file that is an expandable disk. You can use "type=fixed" instead of "type=expandable" to create a fixed-size VHD. A fixed-size VHD will use space on the physical disk equal to its full size as soon as the VHD is created but will give better performance, so I recommend fixed-size disks for uses other than testing.



create vdisk file=c:\win7ult.vhd maximum=25000 type=expandable 


select vdisk file=c:\win7ult.vhd attach vdisk create partition primary 


format fs=ntfs label="Win7Boot" quick



  1. You can now list your volumes with the command



list vol



  1. Exit Diskpart and close the command prompt window by entering the "exit" twice.


  2. Proceed with the installation. When asked to select the installation target, choose the VHD partition you created earlier. The installer will warn that you cannot install it on the partition, but you can ignore this warning.



Installation will now progress as usual. Once installation is finished, you can see that the VHD partition is now the C drive while the partition containing the VHD files is demoted down to the D drive, as shown here. If you look at the contents of the drives, you'll see D contains the VHD file and C, the content of the VHD, looks like a standard drive with a Windows installation. The 200 MB partition you created doesn't have a drive letter and is essentially invisible to the OS.

0 comments:

Windows 7 Security

5:05 PM Technology Enthusiast 0 Comments

In response to complaints that Windows was not secure, Microsoft focused heavily on security when they built Windows Vista. BitLocker drive encryption, parental controls, built-in anti-malware (Windows Defender), improvements to the Windows firewall, Data Prevention Execution (DEP), protected mode IE, service hardening , new digital rights management features, an update to the Crypto API, Network Access Protection (NAP) client, and improvements to the Encrypting File System (EFS), software restriction policies and numerous other security enhancements were introduced in Vista. Service Pack 1 added more security-related improvements, including multifactor authentication for BitLocker, a redesigned Random Number Generator (RNG), signing of Remote Desktop Protocol (RDP) files, and more.

However, the security feature that users noticed (and hated) most was User Account Control (UAC), by which all user accounts, including administrative accounts, run in standard user mode by default and request elevation if higher privileges are needed. The “in your face” nature of UAC , along with the Secure Desktop feature that prevents malware from accessing the desktop during the prompt for administrative rights, but also annoyingly dims the display, was one of the chief complaints about Vista.

The challenge for the Windows 7 team was to make the OS as secure (or more secure) than Vista, while keeping the security more transparent to users.

Action Centre

The Security Center, accessed through Control Panel and intended to provide a centralized location for managing security-related settings, was introduced in Windows XP SP2 and carried over into Vista. With Windows 7, there is even more centralization. The Security Center is gone and a new Action Center takes its place. Here you will find alerts not only related to security but also regarding Windows Update, Diagnostics, NAP, Backup and Restore and troubleshooting issues.

UAC

In Vista, you could disable UAC through Group Policy, but that was not a good solution as it left you vulnerable to attack. Alternatively, you could set UAC to elevate without prompting, which is a better idea. However, the Home versions of Vista do not include the Group Policy editor, so you had to edit the registry to accomplish this. Microsoft has made it easier for users to control UAC’s behavior in Windows 7.

In the Action Center’s left pane, there is an option labeled User Account Control Settings.  UAC’s prompt behavior is adjusted via a slider bar that gives you a choice of four positions:

  • Always Notify: You will get the UAC prompt when you install software or make system changes

  • Notify Only When Programs Try to Make Changes:  You will get the prompt if I program requests elevated privileges, but not when you make changes to Windows settings (this is the default)

  • Notify Only When Programs Try to Make Changes (Do Not Dim the Desktop): same as the default except that Secure Desktop is disabled during the prompt

  • Never Notify: You would not get the prompt when you make changes to Windows settings nor when you install software (not recommended)

BitLocker

BitLocker, included in Vista Enterprise and Ultimate editions, allows you to encrypt entire volumes using AES, either utilizing the Trusted Platform Module (TPM) chip that comes in some computers, or using a USB key. This prevents booting into the operating system or accessing the data on the encrypted volume without authorization (for example, by installing a different instance of the OS and booting into that). It is especially useful for portable systems that may be lost or stolen.

In Vista, BitLocker originally could only be used to encrypt the volume on which the operating system was installed. Service Pack 1 added the ability to encrypt multiple fixed disks, but you could not use it to encrypt removable disks. In Windows 7, BitLocker has been enhanced to support encryption of portable hard disks and flash memory devices. This is being called “BitLocker to Go.” This is a feature that many companies have been wanting, since storage of sensitive data on USB keys has become popular.

AppLocker

Windows 7 gets another “locker”: AppLocker, which is a new feature of Group Policy. It lets admins control the versions of applications that users can install and use. This makes it possible to prevent users from installing and running older versions of applications that may have security holes.

Earlier versions of Windows used Software Restriction Policies control which programs users could run. AppLocker improves on that with easier configurability via three types of rules: Path, File Hash and Publisher. Publisher Rules replace the Certificate Rules in SRP, and give you more flexibility and options. They are also harder to circumvent.

Biometrics

In Vista, if you wanted to use fingerprint logon, you had to use software provided by the fingerprint sensor vendor. A new security feature in Windows 7 is the Biometric Framework, which provides native support for fingerprint devices and makes it easier for developers to put biometric security into their applications. You will find a new Control Panel applet called Biometric Devices that’s used for managing fingerprints.

Summary

With Windows 7, Microsoft has continued their efforts to provide a more secure operating system while listening to user input about how security should work behind the scenes instead of getting in your face. At the same time, they have improved some of the security features from previous operating systems from the perspective of the user experience, the admin experience and the level of security achieved. For most business users and network administrators, the security enhancements in Windows 7 are likely to make it well worth the upgrade.

0 comments:

Installing Oracle Identity Management 11g R1 (11.1.1.1)

10:57 AM Technology Enthusiast 0 Comments

Introduction:

Oracle Identity Management enables enterprises to manage the end-to-end lifecycle of user identities across all enterprise resources—both within and beyond the firewall. With Oracle Identity Management, you can deploy applications faster, apply the most granular protection to enterprise resources, automatically eliminate latent access privileges, and much more.

Oracle Identity Management 11g Release 1 (11.1.1) includes the following components:

  • Oracle Internet Directory
  • Oracle Directory Integration Platform
  • Oracle Virtual Directory
  • Oracle Directory Services Manager
  • Oracle Identity Federation

In this post we will see the installation of Oracle Identity Management 11g R1 (11.1.1.1). As mentioned before the approach for installing Oracle 11g FMW components is different then those of 10g components, I will mention the approach for installing Oracle Identity Management 11g.

Brief Installation Steps:

Following are the brief steps for installing Oracle Identity Management 11g

1) Install database 11g (11.1.0.6 / 11.1.0.7) including configuring TNS and listener

2) Create repository using Oracle RCU (Repository Creation Utility)

3) Install WLS (weblogic Server) and create a middleware home

4) Install Oracle Identity Management 11g inside middleware home

The installation will install and configure the complete Identity Management and provide the access URLs.

Download Locations:

You can download all the required software from following location

Oracle Database 11g (11.1.0.6/11.1.0.7) – http://www.oracle.com/technology/software/products/database/index.html

Oracle IDM 11g – http://www.oracle.com/technology/software/products/middleware/htdocs/111110_fmw.html (Download the product Identity Management)

Oracle RCU – http://www.oracle.com/technology/software/products/middleware/htdocs/111110_fmw.html

Oracle WLS 10.3.1 – http://www.oracle.com/technology/software/products/ias/htdocs/wls_main.html

Step 1) Install database 11g including configuring TNS and listener

For this you can  create a 11g database. Also create a listener on any available port and configure TNS for the database.

Step 2) Create repository using Oracle RCU (Repository Creation Utility)

Using RCU, you can create repository for IDM. You dont have to install RCU for using it. RCU comes as a zip file along with the identity management software download. Once you unzip you run <RCU_UNZIP>/bin/rcu binary

This will invoke a GUI. On the first page you can select “Create Repository” and click on next.

On the next page RCU will ask for database details in which you want to create the repository. The page will look as shown below

1

Once you connect to database, on the next page you need to select the repository that you want to create. Here you can select “Identity Management” as shown below. Also you can use any prefix for these schema. All these schema created will have the prefix string prefixed to it. In this case it will prepend DEV before each schema name. Note that it wont prefix anything before ODS schema. This schema is used for OID and SSO configuration.

2

Once you click on next, it will show the summary and will create tablespace if they dont exists. After tablespace creation, click on create and it will create the required repository schemas.

Step 3) Install WLS (weblogic Server) and create a middleware home

Next step is to install WLS server. Carry out the basic installation of WLS. You need to provide a new location for middleware home when asked for as shown below.

wls1

Next it will ask for the location of weblogic. Here you can accept the default value as it will be created inside middleware home.

wls2

Select all other values as default and install WLS.

Step 4) Installing IDM 11g.

IDM installation involves many steps and screens. Please follow the below screen shots for installing IDM

When you start the IDM installer, you will see a welcome screen. Click on next.

Next you will see “Install option” screen. In this screen select “Install and Configure”. Click on next.

The installer will perform the pre-requisite checks. Click on next.

In the next screen “Select Domain”, click on “Create new domain” as shown below

3

On the next screen, specify the install location inside middleware home.Click Next.

Select default values for next screen – Security Updates. Click Next.

On configure components screen, keep the default values. Click Next

On configure port  screen, you can choose Automatic port assignment. Click Next.

On “Specify Oracle Virtual Directory Information” page, provide the inputs as shown in the screen below

4

Here you need to specify the password for orcladmin. Remember the password you are setting here as you will need that at many places later. Click on Next.

On “Specify Schema Database” page, you can specify the ODS schema details that we created using repository creation utility (Step 2)). Also you need to provide ODS schema password you set while running RCU in step 2) as shown below

5

On “Create Oracle Internet Directory” screen, specify the Realm and orcladmin password. Note here that this orcladmin user is different then we say couple of screens back. This orcladmin user is for OID, where as the previous orcladmin user was for OVD.

6

Next, On “Specify OIF Details” page, specify the PKCS12 password and the domain name for OIF as shown below

7

On rest of the screen, you can specify the default value and submit the installation. The installation will complete in approximately 45 mins. Once the installation and all configuration assistants completes successfully, you can login to weblogic console.

The default port for weblogic console is 7001. So the console URL becomes

http://<hostname>:7001/console

user name : Weblogic

password : As specified while installing WLS in step 3)

8

Once you login, you will see the managed servers created for OID and OIF.

Hope this helps !!

0 comments:

!Optimize your Computers for Peak Performance!!!….

12:39 AM Abdulla Nabeel 0 Comments

Our personal computers are like fine automobiles—they need preventive maintenance to run efficiently and avoid major breakdowns.

Optimize your computer for peak performance

The following tips can help improve your computer's performance. These examples use Microsoft Windows XP. Some of the screens may differ from version to version, but overall you'll find these tips work for all versions of Windows, including Windows 95, Windows 98, Windows Millennium Edition (Me), Windows NT, Windows 2000, Windows XP, and Windows Vista.

By the way, in no way can you blow up your computer or files with any of these procedures. These tasks use utilities provided within the Windows operating systems to aid you in achieving the best system performance. This article does not address tinkering with the registry files.

Clean up disk errors

Run once a week

Whenever a program crashes, or you experience some power outage, your computer may create errors on your computer's hard disk. Over time, the errors can slow your computer. Luckily, the Windows operating system includes a Disk Check program to check and clean any errors on your computer and keep it running smoothly.

To run Disk Check:
  1. In your Start menu, click My Computer.

  2. In the My Computer dialog box, right-click on the drive you wish to check for errors (for most of us this will be the C: drive, unless you have multiple drives on your computer), and click Properties.

  3. In the Properties dialog box, click the Tools tab. In the Error-Checking section, press the Check Now… button. A Check Disk dialog box displays, as shown below.

    Image of the Check Local Disk (C:) dialog box

    Access Check Disk to check for errors on your computer.

  4. In the Check Disk dialog box, check all the check boxes. Click Start.

  5. You will see a message box that says you can schedule the disk check to start the next time you restart your computer. Click Yes. The next time you restart your computer, it will automatically run through a disk check before displaying your login screen. After the disk check finishes, Windows will automatically bring you to your login screen.

    Note: Check Disk can take more than an hour to check and clean errors on your computer.

Remove temporary files

Run once a week

Your computer can pick up and store temporary files when you're looking at Web pages and even when you're working on files in programs, such as Microsoft Word. Over time, these files will slow your computer's performance. You can use the Windows Disk Cleanup screen to rid your computer of these deadbeat files.

To run Disk Cleanup:
  1. In your Start menu, click My Computer.

  2. In the My Computer dialog box, right-click on the drive you wish to check for errors (for most of us this will be the C: drive, unless you have multiple drives on your computer), and click Properties.

  3. In the Properties dialog box, click Disk Cleanup.

    Image of the Local Disk (C:) Properties dialog box

    Use Disk Cleanup to help clear unused files from your computer.

  4. Disk Cleanup will calculate how much space you can free up on your hard drive. After its scan, the Disk Cleanup dialog box reports a list of files you can remove from your computer, as pictured below. This scan can take a while depending on how many files you have lying around on your computer.

    Image of the Disk Cleanup for (C:) dialog box

    View results from the Disk Cleanup dialog box.

  5. After the scan is complete, in the Disk Cleanup dialog box, click View Files to see what Disk Cleanup will throw out once you give it the go ahead. You can check and uncheck boxes to define what you wish to keep or discard. When you're ready, click OK.

  6. You can also select the More Options tab within the Disk Cleanup screen to look for software programs you don't use much anymore. You then have the choice to remove these unused programs.

Rearrange your data

Run once a month

Don't be shocked, but your computer can get sloppy. Your computer often breaks files side by side to increase the speed of access and retrieval. However, as files are updated, your computer saves these updates on the largest space available on the hard drive, often found far away from the other adjacent sectors of the file.

The result: a fragmented file. Fragmented files cause slower performance. This is because your computer must now search for all of the file's parts. In other words, your computer knows where all the pieces are, but putting them back together, and in the correct order when you need them, can slow your computer down.

Windows includes a Disk Defragmenter program to piece all your files back together again (if only Humpty-Dumpty had been so lucky) and make them quicker to open.

To run the Disk Defragmenter:
  1. In your Start menu, click My Computer.

  2. In the My Computer dialog box, right-click on the drive you wish to check for errors (for most of us this will be the C: drive, unless you have multiple drives on your computer), and click Properties.

  3. In the Properties dialog box, click the Tools tab, and then in the Defragmentation section, click Defragment Now….

  4. In the Disk Defragmenter dialog box, select the Volume (most likely your Local Disk C:) at the top of the screen, and then click Analyze.

  5. After analyzing your computer, the Disk Defragmenter displays a message stating whether you should defragment your computer. Press Defragment to clean up your computer if necessary. The Disk Defragmenter will reorganize files by placing together and organizing them by program and size, as shown in Figure 5.

    Image of the Disk Defragmenter dialog box

    Files being reorganizing with the Disk Defragmenter.

Make Internet Explorer run faster

The Web is a sparkling achievement of modern society. It's everywhere—from the home to the classroom. We use it to communicate, to work, to play—even to waste time when there's nothing else to do.

Yet there's nothing more frustrating than having this technical marvel at our fingertips 24 hours a day, 7 days a week, only to watch our computers access the Internet at a crawling pace. Thankfully, Microsoft Internet Explorer provides some useful options for quicker Web surfing. Let's look at these options now.

Reduce the size of your Web page history

Internet Explorer stores visited Web pages to your computer, organizing them within a page history by day. While it's useful to keep a couple days of Web history within your computer, there's no need to store more than a week's worth. Any more than that and you're collecting Web pages that will slow down your computer's performance.

To reduce your Web page history:
  1. In Internet Explorer, on the Tools menu, click Internet Options.

  2. In the Internet Options dialog box, in the History section, find the Days to keep pages in history: box. Type "1" in this box, as pictured in the image below. Click OK.

    Image of the Internet Options dialog box

    Reduce the number of days to keep pages in history.

Don't save encrypted Web pages

Encrypted Web pages ask for usernames and passwords. These pages scramble information to prevent the reading of this sensitive information. You can define Internet Explorer to not save these types of pages. You'll free up space by saving fewer files to your computer, as well as keeping secure information off your computer.

To not save encrypted Web pages:
  1. In Internet Explorer, on the Tools menu, click Internet Options.

  2. In the Internet Options dialog box, click the Advanced tab.

  3. In the Settings section, scroll down to the Security section. Check the "Do not save encrypted pages to disk" option, as shown in the figure below. Click OK.

    Image of the Advanced tab of the Internet Options dialog box

    Set up Internet Explorer so that you do not save encrypted Web pages.

Automate Microsoft Update

Configure once

Microsoft works constantly to release updates to Windows and other Microsoft products, including Office. At Microsoft Update, you can find and install all these updates?not just the critical ones. Often, these updates will improve your computer's performance.

You can make life easier by automating Microsoft Update so your computer downloads and installs all the updates without you having to worry about them.

To automate Microsoft Update:
  1. In your Start menu, click Control Panel.

  2. In the Automatic Updates dialog box, check the Automatic (Recommended) check box. You can define the time of day when your computer checks for updates. If the computer finds any updates, it will download and install them automatically for you.

  3. Click OK.

    Image of the Automatic Updates dialog box

    Automate Microsoft Update to keep your computer up to date.

Install antivirus and antispyware programs

Computer viruses and spyware (hidden software that gathers information about you without your knowledge or consent when you're using a computer) both reduce system performance. Computer viruses can not only reduce performance, but they can also destroy data. Any computer that accesses the Internet should have antivirus and antispyware programs installed.

Hope this helps!…

0 comments:

How Strong is your Password!…

12:28 AM Abdulla Nabeel 0 Comments

If someone steals your passwords, they can use your name to open new credit card accounts, apply for a mortgage, or pose as you in online transactions. To prevent this, you can do the following

  • Follow 6 steps to build a strong password
  • Learn what makes strong passwords
  • Avoid common password strategies that fail

6 steps to build a strong password

The strongest passwords look like a random string of characters to attackers. But random strings of characters are hard to remember.

Make a random string of characters based on a sentence that is memorable to you but is difficult for others to guess.

  1. Think of a sentence that you will remember
    Example: "My son Aiden is three years old."
  2. Turn your sentence into a password
    Use the first letter of each word of your memorable sentence to create a string, in this case: "msaityo".
  3. Add complexity to your password or pass phrase
    Mix uppercase and lowercase letters and numbers. Introduce intentional misspellings.
    For example, in the sentence above, you might substitute the number 3 for the word "three", so a password might be "MsAi3yo".
  4. Substitute some special characters
    Use symbols that look like letters, combine words, or replace letters with numbers to make the password complex.
    Using these strategies, you might end up with the password "M$8ni3y0."
  5. Test your new password with Password Checker
    Password Checker evaluates your password's strength as you type.
  6. Keep your password a secret
    Treat your passwords with as much care as the information that they protect. For more information, see 5 tips to help keep your passwords secret.

Qualities of strong passwords

Length
  • Each character you add to your password increases the protection it provides.
  • 8 or more characters are the minimum for a strong password; 14 characters or longer are ideal.
Complexity
  • The greater variety of characters that you have in your password, the harder it is to guess.
  • An ideal password combines both length and different types of symbols.
  • Use the entire keyboard.
Easy to remember, hard to guess
  • The easiest way to remember your passwords is to write them down.
  • It is OK to write passwords down, but keep them secret so they remain secure and effective.

Password strategies to avoid

To avoid weak, easy-to-guess passwords:

  • Avoid sequences or repeated characters
    "12345678," "222222," "abcdefg," or adjacent letters on your keyboard do not make secure passwords.
  • Avoid using only look-alike substitutions of numbers or symbols
    Criminals will not be fooled by common look-alike replacements, such as to replace an 'i' with a '1' or an 'a' with '@' as in "M1cr0$0ft" or "P@ssw0rd".
    These substitutions can be effective when combined with other measures, such as length, misspellings, or variations in case.
  • Avoid your login name
    Don't use any part of your name, birthday, social security number, or similar information for your loved ones.
    This type of information is one of the first things criminals will try, and they can find it easily online from social networking sites, online resumes, and other public sources of data.
  • Avoid dictionary words in any language
    Criminals use sophisticated tools that can rapidly guess passwords that are based on words in multiple dictionaries, including words spelled backwards, common misspellings, profanity, and substitutions.
  • Avoid using only one password for all your accounts
    If your password is compromised on any one of the computers or online systems that use it, you should consider all of your other information protected by that password compromised as well.
    It is critical to use different passwords for different systems.
  • Be careful with password recovery questions
    Many Web sites offer a "password " service that lets you provide the answer to a secret question. If you forget your password, the service will send it to you if you can remember the answer to your secret question.
    The questions are often random, but sometimes the answers to these questions are freely available on the Web. Choose your questions carefully or make up the answers.
  • Avoid using online storage
    If criminals find your passwords stored online or on a networked computer, they have access to all your information.

0 comments:

5 ways to speed up your PC

12:25 AM Abdulla Nabeel 0 Comments

By following a few simple guidelines, you can maintain your computer and keep it running smoothly. This article discusses how to use the tools available in Windows XP Service Pack 3 (SP3) and Windows Vista to more efficiently maintain your computer and safeguard your privacy when you're online.

1. Free up disk space

By freeing disk space, you can improve the performance of your computer. The Disk Cleanup tool helps you free up space on your hard disk. The utility identifies files that you can safely delete, and then enables you to choose whether you want to delete some or all of the identified files.
Use Disk Cleanup to:

  • Remove temporary Internet files.

  • Remove downloaded program files (such as Microsoft ActiveX controls and Java applets).

  • Empty the Recycle Bin.

  • Remove Windows temporary files.

  • Remove optional Windows components that you don't use.

  • Remove installed programs that you no longer use.

Tip: Typically, temporary Internet files take the most amount of space because the browser caches each page you visit for faster access later.

To use Disk Cleanup

  1. Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Cleanup. If several drives are available, you might be prompted to specify which drive you want to clean.

    Image of Disk Cleanup dialog box

  2. In the Disk Cleanup for dialog box, scroll through the content of the Files to delete list.

    Image of Disk Cleanup for dialog box

    Choose the files that you want to delete.

  3. Clear the check boxes for files that you don't want to delete, and then click OK.

  4. When prompted to confirm that you want to delete the specified files, click Yes.

After a few minutes, the process completes and the Disk Cleanup dialog box closes, leaving your computer cleaner and performing better.

2. Speed up access to data

Disk fragmentation slows the overall performance of your system. When files are fragmented, the computer must search the hard disk when the file is opened to piece it back together. The response time can be significantly longer.

Disk Defragmenter is a Windows utility that consolidates fragmented files and folders on your computer's hard disk so that each occupies a single space on the disk. With your files stored neatly end-to-end, without fragmentation, reading and writing to the disk speeds up.

When to run Disk Defragmenter
In addition to running Disk Defragmenter at regular intervals—monthly is optimal—there are other times you should run it too, such as when:

  • You add a large number of files.

  • Your free disk space totals 15 percent or less.

  • You install new programs or a new version of Windows.

To use Disk Defragmenter:

  1. Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Defragmenter.

    Image of the Disk Defragmenter dialog box

    Click Analyze to start the Disk Defragmenter.

  2. In the Disk Defragmenter dialog box, click the drives that you want to defragment, and then click the Analyze button. After the disk is analyzed, a dialog box appears, letting you know whether you should defragment the analyzed drives.

    Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.

  3. To defragment the selected drive or drives, click the Defragment button. Note: In Windows Vista, there is no graphical user interface to demonstrate the progress—but your hard drive is still being defragmented.

    After the defragmentation is complete, Disk Defragmenter displays the results.

  4. To display detailed information about the defragmented disk or partition, click View Report.

  5. To close the View Report dialog box, click Close.

  6. To close the Disk Defragmenter utility, click the Close button on the title bar of the window.

3. Detect and repair disk errors

In addition to running Disk Cleanup and Disk Defragmenter to optimize the performance of your computer, you can check the integrity of the files stored on your hard disk by running the Error Checking utility.

As you use your hard drive, it can develop bad sectors. Bad sectors slow down hard disk performance and sometimes make data writing (such as file saving) difficult, or even impossible. The Error Checking utility scans the hard drive for bad sectors, and scans for file system errors to see whether certain files or folders are misplaced.

If you use your computer daily, you should run this utility once a week to help prevent data loss.

To run the Error Checking utility:

  1. Close all open files.

  2. Click Start, and then click My Computer.

  3. In the My Computer window, right-click the hard disk you want to search for bad sectors, and then click Properties.

  4. In the Properties dialog box, click the Tools tab.

  5. Click the Check Now button.

  6. In the Check Disk dialog box, select the Scan for and attempt recovery of bad sectors check box, and then click Start.

    Image of Check Disk dialog box

  7. If bad sectors are found, choose to fix them.

Tip: Only select the "Automatically fix file system errors" check box if you think that your disk contains bad sectors.

4. Protect your computer against spyware

Spyware collects personal information without letting you know and without asking for permission. From the Web sites you visit to usernames and passwords, spyware can put you and your confidential information at risk. In addition to privacy concerns, spyware can hamper your computer's performance. To combat spyware, you might want to consider using Microsoft Windows Defender, which is included in Windows Vista, and is available as a free download for Microsoft XP SP2. Alternatively, there are other free anti-spyware software programs available.

5. Learn all about ReadyBoost

If you're using Windows Vista, you can use ReadyBoost to speed up your system. A new concept in adding memory to a system, it allows you to use non-volatile flash memory—like a USB flash drive or a memory card—to improve performance without having to add additional memory. Learn more.

0 comments: