Posts

Showing posts from January, 2017

5 Ways Your USB Stick Can Be a Security Risk

Image
SECURITY 5 Ways Your USB Stick Can Be a Security Risk                                 SpY It might store as little as 256 MB or as much as 256 GB, but as useful as your USB stick is, it can prove to be a major security risk. We’ve recently looked at  how a USB stick can be used to enhance your personal security and privacy . This time, we’re focusing on the various security risks that can occur following misuse or a USB flash device. 5 Ways a USB Stick Can Improve Your Security Major security incidents, viruses, and USB-specific malware are among the risks you face. While these can be mitigated by adopting good practices, it’s important to appreciate just what is at stake if you don’t take steps to secure your USB flash drive. 1. Losing a USB Stick Perhaps the most well-known security risks concerning USB flash devices are those that occur when a device is lost. If you have password protected — or better still, encrypted — your USB flash device, then you should no

3 Tools for Turning Your USB Drive Into a Secure Unlock Key for Your PC

Image
Windows And Mac Security                                                                                                                     SpY                                         3 Tools for Turning Your USB Drive Into a Secure Unlock Key for Your PC Have you ever wanted a physical key for your computer? Now that  passwords are becoming obsolete , a tangible key would be more than a tricky gimmick. Indeed, requiring a physical component to unlock your PC may just be the most secure option right now, and if you have a  spare USB thumb drive  lying around, you can set up a key in just a few minutes. It would be even better if these USB keys could replace  all  forms of password entry (e.g., websites) but for now they can only handle the locking and unlocking of PCs. Perhaps we’ll see further advancements in the near future. USB Unlock Keys: The Good and the Bad Relying on passwords alone is a big security misstep that may cause problems for you down the road. Even

Free online fake mailer with attachments, encryption, HTML editor and advanced settings…

Image
Free online fake mailer with attachments, encryption, HTML editor and advanced settings… fake email Visit this site SpY

4 Really Popular Prank Call Websites & How They Work

Image
4 Really Popular Prank Call Websites & How They Work                                                                                       SpY Not very long ago, prank calling consisted of a room full of bored teens, a rotary phone and a phone book flipped open to the “pizza delivery” section of the Yellow Pages. You’d pick straws to choose who went first, and then take turns seeing who could make the funniest prank call. However, the rapid advancement of VOIP technology has led to an interesting integration between the Internet and phone lines. That integration now provides teens with prank call websites and other Internet technologies that make prank calls not only easier and more anonymous, but even completely automated. How Prank Call Websites Work If you consider how making a call from a VOIP application like Skype works, this process is much the same. When you dial a landline number from Skype, your call travels through what’s called an IP gateway that transfer

4 Cool Fake Viruses to Make Your Friends Freak Out

Image
4 Cool Fake Viruses to Make Your Friends Freak Out (1) Fake Virus Batch File I got this prank from  WikiHow . I love it because it looks the most like an actual attack. Copy and paste the following into an open Notepad window, then save the file with any name you choose and an extension of “.bat” Here’s the code: cls :A color 0a cls @echo off echo Wscript.Sleep echo Wscript.Sleep 5000>C:sleep5000.vbs echo Wscript.Sleep 3000>C:sleep3000.vbs echo Wscript.Sleep 4000>C:sleep4000.vbs echo Wscript.Sleep 2000>C:sleep2000.vbs cd %systemroot%System32 dir cls start /w wscript.exe C:sleep3000.vbs echo Deleting Critical System Files… echo del *.* start /w wscript.exe C:sleep3000.vbs echo Deletion Successful! start /w wscript.exe C:sleep2000.vbs echo: echo: echo: echo Deleting Root Partition… start /w wscript.exe C:sleep2000.vbs echo del %SYSTEMROOT% start /w wscript.exe C:sleep4000.vbs echo Deletion Successful! start /w wscript.exe C:sleep2000.vbs echo: echo: echo:

How to Create a Harmless Funny Virus with Notepad-Continuously eject CD/DVD drives

Image
How to Create a Harmless Funny Virus with Notepad-Continuously eject CD/DVD drives Here is a trick by which you can create funny virus which Continuously eject CD/DVD drives, no programming knowledge is required, just follow the steps. First of all its 100% working (self tested) . This trick will create a code which will continuously eject CD/DVD drives. If you put them back in, it will pop them out again untill u don't know how to stop it (Explained blow the code "how to stop it" ).  Copy below code and paste it in Notepad. Set oWMP = CreateObject("WMPlayer.OCX.7") Set colCDROMs = oWMP.cdromCollection do  if colCDROMs.Count >= 1 then For i = 0 to colCDROMs.Count - 1 colCDROMs.Item(i).Eject Next For i = 0 to colCDROMs.Count - 1 colCDROMs.Item(i).Eject Next End If wscript.sleep 5000 loop and save it as cdrom.vbs or *.vbs Double click to open this file and you will be impressed by this awesome trick. How to stop i

5 computer viruses every PC user should know about

Image
5 computer viruses every PC user should  know about Computer viruses are nasty little programs that are designed to lay waste to your computer. Some destroy files stored on your PC, while some trigger different software to malfunction. More nefarious viruses steal your confidential information and some even go to an extent to rig a system’s power load and cause it to catch fire. Some nasty little things these viruses are! So, the more you know about viruses and how they work, the more prepared you will find yourself when they come knocking. And with that thought, here are 5 computer viruses every PC user should know about. 1. Polymorphic Virus ‘Nasty’ is underrated when we talk about this virus family. When a polymorphic virus infects a computer, before it starts multiplying it creates copies of itself with every copy slightly different from one another. And because this virus is capable of creating such duplicates constantly, it can be difficult for antivirus programs